1. [1] J. Katz, A.J. Menezes, P.C. Van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
2. [2] A. Joseph and V. Sundaram, “Cryptography and steganography: A survey,” Int. J. Comp. Tech. Appl., vol.2, no.3, pp.626-630, 2011.
3. [3] M. Agrawal and P. Mishra, “A comparative survey on symmetric key encryption techniques,” International Journal on Computer Science and Engineering, vol.4, no.5, p.877, 2012.
4. [4] P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,” Proc. Advances in Cryptology (CRYPTO '99), ed. M. Wiener, Berlin, Heidelberg, pp.388-397, Springer Berlin Heidelberg, 1999. 10.1007/3-540-48405-1_25
5. [5] P. Kocher, J. Jaffe, B. Jun, and P. Rohatgi, “Introduction to differential power analysis,” J. Cryptogr. Eng., vol.1, no.1, pp.5-27, April 2011. 10.1007/s13389-011-0006-y