S. Gilles-barthe, F. Bela¨?dbela¨?d, P. Dupressoir, B. Fouque, and . Grégoire, Compositional verification of higher-order masking: Application to a verifying masking compiler, Cryptology ePrint Archive, vol.506, 2015.

A. Battistello, J. Coron, E. Prouff, R. Bauer, E. Jaulmes et al., Horizontal side-channel attacks and countermeasures on the ISW masking scheme Cryptology ePrint Archive http://eprint.iacr.org/. Full version of this paper Horizontal and vertical side-channel attacks against secure RSA implementations, Topics in Cryptology -CT-RSA 2013 -The Cryptographers' Track at the RSA Conference 2013 Proceedings Blakely. Safeguarding cryptographic keys. In National Comp. Conf., volume, pp.1-17, 1979.

D. Chaum, C. Crépeau, and I. Damgård, Multiparty unconditionally secure protocols (extended abstract), Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pp.11-19, 1988.
DOI : 10.1007/3-540-48184-2_43

C. Clavier, B. Feix, G. Gagnerot, V. Myì-ene-roussellet, and . Verneuil, Horizontal Correlation Analysis on Exponentiation, Information and Communications Security -12th International Conference Proceedings, pp.46-61, 2010.
DOI : 10.1007/978-3-642-17650-0_5

URL : https://hal.archives-ouvertes.fr/inria-00540384

S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology -CRYPTO '99, 19th Annual International Cryptology Conference Proceedings, pp.398-412, 1999.
DOI : 10.1007/3-540-48405-1_26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.8951

A. Duc, S. Dziembowski, and S. Faust, Unifying Leakage Models: From Probing Attacks to Noisy Leakage., Advances in Cryptology - EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings, pp.423-440, 2014.
DOI : 10.1007/978-3-642-55220-5_24

A. Duc, S. Faust, and F. Standaert, Making masking security proofs concrete -or how to evaluate the security of any leaking device, Advances in Cryptology -EUROCRYPT 2015 -34th Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, Part I, pp.401-429, 2015.

S. Faust, T. Rabin, L. Reyzin, E. Tromer, and V. Vaikuntanathan, Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases, Advances in Cryptology -EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera. Proceedings, pp.135-156, 2010.
DOI : 10.1007/978-3-642-13190-5_7

S. Guilley, A. Heuser, and O. Rioul, A key to success -success exponents for side-channel distinguishers, Progress in Cryptology -INDOCRYPT 2015 -16th International Conference on Cryptology in India Proceedings, volume 9462 of Lecture Notes in Computer Science, pp.270-290, 2015.

Y. Ishai, A. Sahai, and D. Wagner, Private Circuits: Securing Hardware against Probing Attacks, Advances in Cryptology -CRYPTO 2003, 23rd Annual International Cryptology Conference Proceedings, pp.463-481, 2003.
DOI : 10.1007/978-3-540-45146-4_27

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.9436

Y. Oren, M. Renauld, F. Standaert, and A. Wool, Algebraic side-channel attacks beyond the hamming weight leakage model Masking against side-channel attacks: A formal security proof Provably secure higher-order masking of AES, Cryptographic Hardware and Embedded Systems -CHES 2012 -14th International Workshop Proceedings, volume 7428 of Lecture Notes in Computer Science Advances in Cryptology -EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop Proceedings, pp.140-154, 2010.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

F. Standaert, N. Veyrat-charvillon, E. Oswald, B. Gierlichs, M. Medwed et al., The World Is Not Enough: Another Look on Second-Order DPA, Advances in Cryptology -ASIACRYPT 2010 -16th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, pp.112-129, 2010.
DOI : 10.1007/978-3-642-17373-8_7

N. Veyrat-charvillon, B. Gérard, and F. Standaert, Soft Analytical Side-Channel Attacks, Advances in Cryptology -ASIACRYPT 2014 -20th International Conference on the Theory and Application of Cryptology and Information
DOI : 10.1007/978-3-662-45611-8_15

URL : https://hal.archives-ouvertes.fr/hal-01096218