1. G. T. Becker 2013 . Test Vector Leakage Assessment (TVLA) methodology in practice . In International Cryptographic Module Conference. G. T. Becker et al. 2013. Test Vector Leakage Assessment (TVLA) methodology in practice. In International Cryptographic Module Conference.
2. Correlation Power Analysis with a Leakage Model
3. I. Buhan etal 2021. SoK: Design Tools for Side-Channel-Aware Implementions. arXiv preprint arXiv:2104.08593 (2021). I. Buhan et al. 2021. SoK: Design Tools for Side-Channel-Aware Implementions. arXiv preprint arXiv:2104.08593 (2021).
4. T. El Motassadeq . 2011 . CCS vs NLDM comparison based on a complete automated correlation flow between PrimeTime and HSPICE. In 2011 Saudi International Electronics , Communications and Photonics Conference (SIECPC). IEEE, 1--5. T. El Motassadeq. 2011. CCS vs NLDM comparison based on a complete automated correlation flow between PrimeTime and HSPICE. In 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC). IEEE, 1--5.
5. A Statistics-based Fundamental Model for Side-channel Attack Analysis;Fei Y.;IACR Cryptol. ePrint Arch.,2014