?Differential Power Analysis? Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference Proceedings, volume 1666 of Lecture Notes in Computer Science, pp.388-397, 1999. ,
A Very Compact ???Perfectly Masked??? S-Box for AES, Applied Cryptography and Network Security, pp.446-459, 2006. ,
DOI : 10.1007/978-3-540-68914-0_27
On Second-Order Differential Power Analysis, Cryptographic Hardware and Embedded Systems, pp.293-308, 2005. ,
DOI : 10.1007/11545262_22
Golic and C. Tymen. ?Multiplicative Masking and Power Analysis of AES?, Workshop on Cryptographic Hardware and Embedded Systems CHES 2002, volume LNCS 2523, pp.198-212, 2002. ,
A Side-Channel Analysis Resistant Description of the AES S-Box, International Workshop on Fast Software Encryption FSE 2005, pp.413-423, 2005. ,
DOI : 10.1007/11502760_28
?Towards Sound Approaches to Counteract Power-Analysis Attacks,? Advances inCryptology?Proc, Int'l Crytology Conf. (CRYPTO '99), M. Wiener, pp.398-412, 1999. ,
Using Second-Order Power Analysis to Attack DPA Resistant Software, Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems, pp.238-251, 2000. ,
DOI : 10.1007/3-540-44499-8_19
?Template Attacks on Masking-Resistance is Futile,? Topics in Cryptology?Proc. Cryptographers' Track (CT)- RSA, pp.562-567, 2007. ,