5Coron J,Naccache D,Kocher P.Statistics and information leakage[J].ACM Transactions on Embedded Computing Systems,2004,3(3):492-508.
6Thomas S Messerges,Ezzy A Dabbish,Robert H Sloan.Investigations of power analysis attacks on smartcards[C].Proceedings of the USENIX Workshop on Smartcard Technology,1999.151-161.
7Paul Kocher,Joshua Jaffe,Benjamin Jun.Differential power analysis[C].Preceeding of CR YP TO,1999.388-397.
8Biham E,Shemir A.Differential fault analysis of secret key cryptosystems[C].Proc Advances in Cryptology,1997.513-525.