5Verbauwhede I,Tiri K.Circuits and design techniques for secure ICs resistant to side channel attacks. International Conference on Integrated Circuit Design and Technology . 2006
6Lawson N.Side-Channel Attacks on Cryptographic Software. IEEE Security and Privacy . 2009
7Martin Vuagnoux,Sylvain Pasini.Compromising Electromagnetic Emanations of Wired and Wireless Keyboards. http://lasecwww.epfl.ch/keyboard/ . 2008
8Mayes K,Markantonakis K.Smart Cards,Tokens,Security and Applications. . 2008
5Coron J,Naccache D,Kocher P.Statistics and information leakage[J].ACM Transactions on Embedded Computing Systems,2004,3(3):492-508.
6Thomas S Messerges,Ezzy A Dabbish,Robert H Sloan.Investigations of power analysis attacks on smartcards[C].Proceedings of the USENIX Workshop on Smartcard Technology,1999.151-161.
7Paul Kocher,Joshua Jaffe,Benjamin Jun.Differential power analysis[C].Preceeding of CR YP TO,1999.388-397.
8Biham E,Shemir A.Differential fault analysis of secret key cryptosystems[C].Proc Advances in Cryptology,1997.513-525.