1. Cédric Archambeau, Eric Peeters, François-Xavier Standaert, and Jean-Jacques Quisquater. 2006. Template Attacks in Principal Subspaces. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES'06). Springer, 1--14.
2. Deep learning for side-channel analysis and introduction to ASCAD database
3. Correlation Power Analysis with a Leakage Model
4. S. Chari, J. R Rao, and P. Rohatgi. 2003. Template Attacks. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES'03). Springer, 13--28.
5. Wei Cheng, Yi Liu, Sylvain Guilley, and Olivier Rioul. 2022. Attacking Masked Cryptographic Implementations: Information-Theoretic Bounds. In 2022 IEEE International Symposium on Information Theory (ISIT'22). IEEE, 654--659.