1. [1] K. Gandol, C. Mourtel, and F. Olivier, “Eectromagnetic analysis: Concrete results,” Proc. CHES 2001, Lect. Notes Comput. Sci., vol.2162, pp.251-261, 2001.
2. [2] D. Agrawal, B. Archambeault, and J.R. Rao, “The EM side channel(s),” Proc. CHES 2002, Lect. Notes Comput. Sci., vol.2523, pp.29-45, 2002.
3. [3] C.H. Gebotys, S. Ho, and C.C. Tiu, “EM analysis of rijndael and ECC on a wireless java-based PDA,” Proc. CHES 2005, Lect. Notes Comput. Sci., vol.3659, pp.250-264, 2005.
4. [4] H. Tanaka, “Evaluation of information leakage via electromagnetic emanation and effectiveness of tempest,” IEICE Trans. Inf. & Syst., vol.E91-D, no.5, pp.1439-1446, May 2008.
5. [5] T.-H. Le, C. Servière, and J. Cledière, “Noise reduction in the side channel attack using fourth order cumulants,” IEEE Trans. Inf. Forensic Security, vol.2, no.4, pp.710-720, 2007.