S. Mangard, E. Oswald, and T. Popp, Power analysis attacks -revealing the secrets of smart cards, 2007.

H. Bar-el, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, pp.370-382, 2006.
DOI : 10.1109/JPROC.2005.862424

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5258

E. Brier and M. Joye, Weierstra? Elliptic Curves and Side-Channel Attacks, Proc. Public Key Cryptography -PKC, pp.335-345, 2002.
DOI : 10.1007/3-540-45664-3_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.273

J. Coron, Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems, Proc. Cryptographic Hardware and Embedded Systems-CHES, pp.292-302, 1999.
DOI : 10.1007/3-540-48059-5_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5695

I. Biehl, B. Meyer, and V. Müller, Differential Fault Attacks on Elliptic Curve Cryptosystems, Proc. Advances in Cryptology -CRYPTO, pp.131-146, 2000.
DOI : 10.1007/3-540-44598-6_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.3920