1. Bartkewitz, T., Lemke-Rust, K., 2013. Efficient template attacks based on probabilistic multi-class support vector machines. LNCS, 7771: 263–276. http://dx.doi.org/10.1007/978-3-642-37288-9_18
2. Blake, I.F., Seroussi, G., Smart, N., 1999. Elliptic Curves in Cryptography. Cambridge University Press. http://dx.doi.org/10.1017/CBO9781107360211
3. Cybenko, G., 1989. Approximation by superpositions of a sigmoidal function. Math. Contr. Signals Syst., 2(4): 303–314. http://dx.doi.org/10.1007/BF02551274
4. de Mulder, E., Buysschaert, P., Ors, S.B., et al., 2005. Electromagnetic analysis attack on an FPGA implementation of an elliptic curve cryptosystem. Int. Conf. on Computer as a Tool, p.1879–1882. http://dx.doi.org/10.1109/EURCON.2005.1630348
5. Duda, R.O., Hart, P.E., Stork, D.G., 2011. Pattern Classification. John Wiley & Sons.