1. Kocher P, Jaffe J, Jun B. Differential power analysis [C]//Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1999: 388–397.
2. Timing attacks on implementations of diffie-hellman, rsa, des,and other systems;Paul,1996
3. Cryptographic Hardware and Embedded Systems - CHES 2004
4. Innovative method of the power analysis;Martinasek;Radioengineering,2013
5. Breaking Cryptographic Implementations Using Deep Learning Techniques in Security, Privacy, and Applied Cryptography Engineering;Maghrebi,2016