1. [1] P. Kocher, et al.: “Differential power analysis,” CRYPTO (1999) 388 (DOI: 10.1007/3-540-48405-1_25).
2. [2] J.-S. Coron and I. Kizhvatov: “Analysis and improvement of the random delay countermeasure of CHES 2009,” CHES (2010) 95 (DOI: 10.1007/978-3-642-15031-9_7).
3. [3] N. Veyrat-Charvillon, et al.: “Shuffling against side-channel attacks: A comprehensive study with cautionary note,” Proc. of the 18th International Conference on The Theory and Application of Cryptology and Information Security (2012) 740 (DOI: 10.1007/978-3-642-34961-4_44).
4. [4] C. Clavier, et al.: “Differential power analysis in the presence of hardware countermeasures,” CHES (2000) 252 (DOI: 10.1007/3-540-44499-8_20).
5. [5] P. C. Kocher, et al.: U.S. Patent 7587044 (2009).