P. Kocher, J. Jaffe, and B. Jun, “Differential Power Analysis,” in Advances in Cryptology CRYPTO’99, vol.1666, pp.388-397, Springer-Verlag, Dec. 1999.
S. Chari, C. Jutla, J. Rao, and P. Rohatgi, “Towards Sound Approaches to Counteract Power-Analysis Attacks,” in Advances in Cryptology CRYPTRO’ 99, vol. 1666, pp. 398-412, Aug. 1999.
E. Brier, C. Clavier, and F. Olivier,“Correlation Power Analysis with a Leakage Model,” in Proc.Cryptographic Hardware and Embedded Systems, Chap.2, Springer, Berlin, Heidelberg, 2007.
G. Hospodar, B. Gierlichs, E. D. Mulder, I. Verbauwhede, J. Vandewalle,“Machine learning in side-channel analysis: a first study,” Journal of Cryptographic Engineering, 1(4), pp. 293-302, Oct. 2011.
F. Hu, H. Wang, and J, Wang, “Multi-Leak Deep-Learning Side-Channel Analysis,” IEEE Access, pp. 22610-22621, 2022.