1. [1] P. Kocher, J. Jaffe, and B. Jun, “Differential power Analysis,” Proc. 1999 International Cryptology Conference (CRYPTO 1999), LNCS 1666, pp.388-397, 1999.
2. [2] E. Brier, C. Clavier, and F. Olivier, “Correlation power analysis with a leakage model,” Proc. 2004 Intl. Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), LNCS 3156, pp.16-29, 2004.
3. [3] S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks, Springer Science Business Media, LLC, 2007.
4. [4] D. Hwang, K. Tiri, A. Hodjat, B-C. Lai, S. Yang, P. Schaumount, and I. Verbauwhede, “AES-based security coprocessor IC in 0.18-µm CMOS with resistance to differential power analysis side-channel attacks,” IEEE J. Solid-State Circuits, vol.41, no.4, pp.781-792, April 2006.
5. [5] K. Tiri and I. Verbauwhede, “A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation,” Proc. Design, Automation and Test in Europe Conference (DATE 2004), pp.246-251, 2004.