[1]
Kocher P., Jaffe J., and Jun B., Differential power analysis, in Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO), Santa Barbara, CA, USA, 1999, pp. 388-397.
[2]
Mangard S., Oswald E., and Popp T., Power Analysis Attacks: Revealing the Secrets of Smart Cards. Boston, MA, USA: Springer, 2007.
[3]
Moradi A., Kasper M., and Paar C., Black-box side-channel attacks highlight the importance of countermeasures—An analysis of the Xilinx Virtex-4 and Virtex-5 bitstream encryption mechanism, Lecture Notes in Computer Science, vol. 7178, pp. 1–18, 2012.
[4]
Eisenbarth T., Kasper T., Moradi A., Paar C., Salmasizadeh M., and Shalmani M. M., On the power of power analysis in the real world: A complete break of the KEELOQ code hopping scheme, in Proceedings of the 28th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO), Santa Barbara, CA, USA, 2008, pp. 203-220.
[5]
Oswald D. and Paar C., Breaking Mifare DESFire MF3ICD40: Power analysis and templates in the real world, Lecture Notes in Computer Science, vol. 6917, pp. 207–222, 2011.
[6]
Le T. H., Clediere J., Serviere C., and Lacoume J. L., Noise reduction in side channel attack using fourth-order cumulant, IEEE Transactions on Information Forensics & Security (TIFS), vol. 2, no. 4, pp. 710–720, 2007.
[7]
Clavier C., Coron J. S., and Dabbous N., Differential power analysis in the presence of hardware countermeasures, Lecture Notes in Computer Science, vol. 1965, pp. 252–263, 2000.
[8]
Charvet X. and Pelletier H., Improving the DPA attack using wavelet transform, in NIST Physical Security Testing Workshop, Honolulu, HI, USA, 2005.
[9]
Woudenberg J. J., Witteman M., and Bakker B., Improving differential power analysis by elastic alignment, Lecture Notes in Computer Science, vol. 6558, pp. 104–119, 2011.
[10]
Plos T., Hutter M., and Feldhofer M., Evaluation of side-channel preprocessing techniques on cryptographic-enabled HF and UHF RFID tag prototypes, in Workshop on RFID Security, Budapest, Hungary, 2008, pp. 114-127.
[11]
Brier E., Clavier C., and Olivier F., Correlation power analysis with a leakage model, Lecture Notes in Computer Science, vol. 3156, pp. 16–29, 2004.
[12]
U.S. Department of Commerce and NIST, Fips pub 46-3: data encryption standard (DES), 1999.