REFERENCES
- Muir, James Alexander, Techniques of Side Channel Cryptanalysis, Master of Mathematics Thesis, University of Waterloo, Canada, 2001
- Wright, P, Spy Catcher: The Candid Autobiography of a Senior Intelligence Officer, Viking, 1987
- Kelsey, J, et al, Side Channel Cryptanalysis of Product Ciphers. Journal of Computer Security, 8(2-3):141–158, 2000. Available from http://www.counterpane.com/sidechannel.html.
- Kocher, P, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems, Advances in Cryptology. CRYPTO '96, volume 1109 of LNCS, pages 104–113. Springer-Verlag, August 1996. An alternate version is available from http://www.crvptography.com/timingattack/paper.html.
- Kocher, P, et al, Introduction to Differential Power Analysis and Related Attacks, Technical Report, Cryptography Research Inc., 1998. Available from http://www.crvptographv.com/dpa/technical/index.html.
- Aho, Kristi A, RSA: Overview, Analysis, and Implications for the Future, February 16, 2001 Available from http://rr.sans.org/encryption/RSA.php.
- Boneh, D, DeMillo, R, & Lipton, R, On the Importance of Checking Cryptographic Protocols for Faults. Advances in Cryptology -EUROCRYPT '97, vol 1233 of LNCS, pp 37–51. Springer-Verlag, May 1997.