1. Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems;P. C. Kocher
2. Differential power analysis;P. C. Kocher
3. Electromagnetic analysis: concrete results;K. Gandolfi
4. RSA key extraction via low-bandwidth acoustic cryptanalysis;D. Genkin
5. A testing methodology for side-channel resistance validation;G. Goodwill