C. Paul, J. Kocher, B. Jaffe, and . Jun, ?Differential Power Analysis? Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference Proceedings, volume 1666 of Lecture Notes in Computer Science, pp.388-397, 1999.

D. Canright and L. Batina, A Very Compact ???Perfectly Masked??? S-Box for AES, Applied Cryptography and Network Security, pp.446-459, 2006.
DOI : 10.1007/978-3-540-68914-0_27

M. Joye, P. Paillier, and B. Schoenmakers, On Second-Order Differential Power Analysis, Cryptographic Hardware and Embedded Systems, pp.293-308, 2005.
DOI : 10.1007/11545262_22

J. Dj, Golic and C. Tymen. ?Multiplicative Masking and Power Analysis of AES?, Workshop on Cryptographic Hardware and Embedded Systems CHES 2002, volume LNCS 2523, pp.198-212, 2002.

E. Oswald, S. Mangard, N. Pramstaller, and V. Rijmen, A Side-Channel Analysis Resistant Description of the AES S-Box, International Workshop on Fast Software Encryption FSE 2005, pp.413-423, 2005.
DOI : 10.1007/11502760_28

S. Chari, C. Jutla, J. Rao, and P. Rohatgi, ?Towards Sound Approaches to Counteract Power-Analysis Attacks,? Advances inCryptology?Proc, Int'l Crytology Conf. (CRYPTO '99), M. Wiener, pp.398-412, 1999.

T. Messerges, Using Second-Order Power Analysis to Attack DPA Resistant Software, Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems, pp.238-251, 2000.
DOI : 10.1007/3-540-44499-8_19

E. Oswald and S. Mangard, ?Template Attacks on Masking-Resistance is Futile,? Topics in Cryptology?Proc. Cryptographers' Track (CT)- RSA, pp.562-567, 2007.