1. Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J., Seurin, Y., and Vikkelsoe, C. (2007, January 10–13). PRESENT: An ultra-lightweight block cipher. Proceedings of the Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International Workshop, Vienna, Austria. Proceedings 9.
2. A primer on hardware security: Models, methods, and metrics;Rostami;Proc. IEEE,2014
3. Knechtel, J., Kavun, E.B., Regazzoni, F., Heuser, A., Chattopadhyay, A., Mukhopadhyay, D., Dey, S., Fei, Y., Belenky, Y., and Levi, I. (2020, January 9–13). Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA. Proceedings of the Design, Automation & Test in Europe Conference (DATE), Grenoble, France.
4. Regazzoni, F., Breveglieri, L., Ienne, P., and Koren, I. (2012). Fault Analysis in Cryptography, Springer.
5. Joye, M. (1999, January 18–21). Security paradoxes: How improving a cryptosystem may weaken it. Proceedings of the National Conference on Information Security, Arlington, VA, USA.