M. A. Aabid, S. Guilley, and P. Hoogvorst, Template Attacks with a Power Model, Cryptology ePrint Archive Report, vol.443443, 2007.

M. A. Aabid, O. Meynard, S. Guilley, and J. Danger, Combined Side-Channel Attacks, WISA, pp.175-190, 2010.

D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi, The EM Side???Channel(s), CHES '02: Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems, pp.29-45, 2003.
DOI : 10.1007/3-540-36400-5_4

D. Agrawal, J. R. Rao, and P. Rohatgi, Multi-channel Attacks, CHES, pp.2-16, 2003.
DOI : 10.1007/978-3-540-45238-6_2

A. Amarilli, S. Müller, D. Naccache, D. Page, P. Rauzy et al., Can Code Polymorphism Limit Information Leakage?, WISTP, pp.1-21, 2011.
DOI : 10.1007/978-3-642-21040-2_1

URL : https://hal.archives-ouvertes.fr/hal-01110259

J. A. Ambrose, R. G. Ragel, and S. Parameswaran, A smart random code injection to mask power analysis based side channel attacks, Proceedings of the 5th IEEE/ACM international conference on Hardware/software codesign and system synthesis , CODES+ISSS '07, pp.51-56, 2007.
DOI : 10.1145/1289816.1289832

M. Aminghafari, N. Cheze, and J. Poggi, Multivariate denoising using wavelets and principal component analysis, Computational Statistics & Data Analysis, vol.50, issue.9, pp.2381-2398, 2006.
DOI : 10.1016/j.csda.2004.12.010

S. Anderson, Statistical methods for comparative studies: techniques for bias reduction, Wiley series in probability and mathematical statistics: Applied probability and statistics, 1980.
DOI : 10.1002/9780470316498

C. Archambeau, ´. E. Peeters, F. Standaert, and J. Quisquater, Template Attacks in Principal Subspaces, CHES, pp.1-14, 2006.
DOI : 10.1007/11894063_1

L. Avendano, Improvement of an extended kalman filter power line interference suppressor for ecg signals

B. R. Bakshi, Multiscale PCA with application to multivariate statistical process monitoring, AIChE Journal, vol.36, issue.7, pp.1596-1610, 1998.
DOI : 10.1002/aic.690440712

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.658

Y. Bar-shalom, X. Li, and T. Kirubarajan, Estimation with applications to tracking and navigation, 2001.
DOI : 10.1002/0471221279

L. Batina, B. Gierlichs, and K. Lemke-rust, Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip, ISC, pp.341-354, 2008.
DOI : 10.1007/978-3-540-85886-7_24

R. Bevan, E. Knudsen, S. Bhasin, J. Danger, F. Flament et al., Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow, in ReConFig, Seoul, Korea. REFERENCES [21], pp.327-342, 2002.

A. Bos, Parameter estimation for scientists and engineers, 2007.

P. Brasseur, Ocean Weather Forecasting. An Integrated View of Oceanography, 2006.

E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, CHES, pp.16-29, 2004.
DOI : 10.1007/978-3-540-28632-5_2

E. Brookner, Tracking and Kalman Filtering Made Easy, 2008.
DOI : 10.1002/0471224197

S. Broughton and K. Bryan, Discrete Fourier Analysis and Wavelets: Applications to Signal and Image Processing, 2011.
DOI : 10.1002/9781118032442

J. Candy, Bayesian Signal Processing: Classical, Modern and Particle Filtering Methods, Adaptive and Learning Systems for Signal Processing, Communications and Control Series, 2011.

S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi, Towards Sound Approaches to Counteract Power-Analysis Attacks, CRYPTO, pp.3-540, 1999.
DOI : 10.1007/3-540-48405-1_26

S. Chari, J. R. Rao, and P. Rohatgi, Template Attacks, CHES, pp.13-28, 2002.
DOI : 10.1007/3-540-36400-5_3

A. C. Harvey, Forecasting,structural time series models and the Kalman filter, 2008.

C. Clavier, J. Coron, and N. Dabbous, Differential Power Analysis in the Presence of Hardware Countermeasures, CHES, pp.252-263, 2000.
DOI : 10.1007/3-540-44499-8_20

C. C. Consortium, Application of attack potential to smartcards v2- 5, 2008.

J. Coron and I. Kizhvatov, Analysis and Improvement of the Random Delay Countermeasure of CHES 2009, CHES, pp.95-109, 2009.
DOI : 10.1007/978-3-642-15031-9_7

P. Dagnelie, Statistique thorique et applique, Infrence statistique une et deux dimensions, 2006.

A. Das and C. Madhavan, Public-Key Cryptography: Theory and Practice, Pearson Education, 2009.

A. Dehbaoui, S. Tiran, P. Maurine, F. Standaert, and N. Veyrat-charvillon, Spectral Coherence Analysis -First Experimental Results -. Cryptology ePrint Archive, 2011.

L. Dempster and R. , Maximum likelihood from incomplete data via the em algorithm, Journal of the Royal Statistical Society, pp.39-40, 1977.

J. Doget, E. Prouff, M. Rivain, and F. Standaert, Univariate side channel attacks and leakage modeling, Journal of Cryptographic Engineering, vol.34, issue.9, pp.123-144, 2011.
DOI : 10.1007/s13389-011-0010-2

H. F. Durrant-whyte and T. C. Henderson, Multisensor data fusion, in pringer Handbook of, pp.585-610, 2008.

W. V. Eck, Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?, Computers Security, 1985.

J. S. Edward and W. Kamen, Introduction to optimal estimation Advanced textbooks in control and signal processing Control and Signal Processing Series, 1999.

D. Gabor, Theory of communication, Journal of the Institution of Electrical Engineers - Part I: General, vol.94, issue.73, pp.429-457, 1946.
DOI : 10.1049/ji-1.1947.0015

M. K. Georg, T. Becker, and C. Paar, Side-Channel based Watermarks for IP Protection, in COSADE, pp.47-50, 2010.

B. Gierlichs, L. Batina, B. Preneel, and I. Verbauwhede, Revisiting Higher-Order DPA Attacks:, CT- RSA, pp.221-234, 2010.
DOI : 10.1007/978-3-642-11925-5_16

B. Gierlichs, L. Batina, and P. Tuyls, Mutual Information Analysis ? A Universal Differential Side-Channel Attack, Cryptology ePrint Archive Report, 2007.

B. Gierlichs, L. Batina, P. Tuyls, and B. Preneel, Mutual Information Analysis, CHES, 10th International Workshop, pp.426-442, 2008.
DOI : 10.1007/978-3-540-85053-3_27

B. Gierlichs, E. De-mulder, B. Preneel, and I. Verbauwhede, Empirical comparison of side channel analysis distinguishers on DES in hardware, 2009 European Conference on Circuit Theory and Design, pp.391-394, 2009.
DOI : 10.1109/ECCTD.2009.5275003

C. W. Gini-light, R. J. Margolin, and B. H. , An Analysis of Variance for Categorical Data, Journal of the American Statistical Association, vol.20, issue.2, pp.534-544, 1912.
DOI : 10.1080/14786440009463897

F. Gravetter and L. Wallnau, Essentials of statistics for the behavioral sciences, 2008.

S. Guilley and E. Ltci, Geometrical Counter-Measures against Side-Channel Attacks, pp.2007-2010, 2007.

S. Guilley, S. Chaudhuri, L. Sauvage, P. Hoogvorst, R. Pacalet et al., Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks, IEEE Transactions on Computers, vol.57, issue.11, pp.1482-1497, 2008.
DOI : 10.1109/TC.2008.109

S. Guilley, P. Hoogvorst, and R. Pacalet, A Fast Pipelined Multi-Mode DES Architecture Operating in IP Representation, Integration, The VLSI Journal, pp.479-489, 2007.

S. Guilley, K. Khalfallah, V. Lomne, and J. Danger, Formal Framework for the Evaluation of Waveform Resynchronization Algorithms, WISTP, 2011.
DOI : 10.1007/978-3-642-21040-2_7

S. Guilley, L. Sauvage, J. Danger, and N. Selmane, Fault Injection Resilience, in FDTC, IEEE Computer Society, pp.51-65, 2010.

S. Guilley, L. Sauvage, J. Danger, N. Selmane, and R. Pacalet, Silicon-level Solutions to Counteract Passive and Active Attacks, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.3-17, 2008.
DOI : 10.1109/FDTC.2008.18

URL : https://hal.archives-ouvertes.fr/hal-00311431

L. Hemming and I. E. , Society, I. Antennas, and P. Society, Electromagnetic anechoic chambers: a fundamental design and specification guide, 2002.

N. Homma, S. Nagashima, Y. Imai, T. Aoki, and A. Satoh, High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching, CHES, pp.187-200, 2006.
DOI : 10.1007/11894063_15

P. Hoogvorst, The Variance Power Attack, COSADE, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00479595

Y. Ishai, A. Sahai, and D. Wagner, Private Circuits: Securing Hardware against Probing Attacks, CRYPTO, pp.463-481, 2003.
DOI : 10.1007/978-3-540-45146-4_27

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.9436

A. Jakulin and I. Bratko, Analyzing Attribute Dependencies, PKDD 2003, volume 2838 of LNAI, pp.229-240, 2003.
DOI : 10.1007/978-3-540-39804-2_22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.7148

G. M. James, Curve alignment by moments, The Annals of Applied Statistics, vol.1, issue.2, pp.480-501, 2007.
DOI : 10.1214/07-AOAS127

J. J. Boutros, A tutorial on iterative probabilistic decoding and channel estimation: Graph representation, information flow and probabilistic algorithm in decoding and communication, 2005.

A. Juels, D. Molnar, and D. Wagner, Security and privacy issues in epassports, Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp.74-88, 2005.

E. Kamen and J. Su, Introduction to optimal estimation, Advanced textbooks in control and signal processing, 1999.

W. Klecka, Discriminant analysis, Quantitative applications in the social sciences, 1980.

P. C. Kocher, J. Jaffe, and B. Jun, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Proceedings of CRYPTO'96, pp.104-113, 1996.
DOI : 10.1007/3-540-68697-5_9

I. Koichi, T. Masahiko, and T. Naoya, Encryption secured against DPA, 2008.

L. Batina and B. Gierlichs, Differential Cluster Analysis, Cryptographic Hardware and Embedded Systems ? CHES 2009, pp.112-127, 2009.
DOI : 10.1007/978-3-642-04138-9_9

T. Le, J. Cledire, C. Servire, and J. Lacoume, Higher order statistics for side channel analysis enhancement, in e-Smart, 2006.

D. S. Lee, J. M. Park, and P. A. Vanrolleghem, Adaptive multiscale principal component analysis for on-line monitoring of a sequencing batch reactor, Journal of Biotechnology, vol.116, issue.2, pp.195-210, 2005.
DOI : 10.1016/j.jbiotec.2004.10.012

Y. Li, K. Sakiyama, L. Batina, D. Nakatsu, and K. Ohta, Power Variance Analysis Breaks a Masked ASIC Implementation of AES, in DATE'10, IEEE Computer Society, 2010.

Y. Li, K. Sakiyama, L. Batina, D. Nakatsu, and K. Ohta, Power Variance Analysis breaks a masked ASIC implementation of AES, in DATE, pp.1059-1064, 2010.

S. Lin and X. Huang, Advanced Research on Computer Education, Simulation and Modeling: International Conference, Proceedings, no. ptie. 2 in Communications in Computer and Information Science Series, 2011.

V. Lomn, A. Dehbaoui, P. Maurine, L. Torres, and M. Robert, Differential Power Analysis enhancement with statistical preprocessing, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010), 2010.
DOI : 10.1109/DATE.2010.5457007

H. Maghrebi, J. Danger, F. Flament, and S. Guilley, Evaluation of Countermeasures Implementation Based on Boolean Masking to Thwart First and Second Order Side-Channel Attacks, SCS, IEEE, pp.1-6, 2009.

T. Jerba, Complete version online

H. Maghrebi, J. L. Danger, F. Flament, and S. Guilley, Evaluation of Countermeasures Implementation Based on Boolean Masking to Thwart First and Second Order Side-Channel Attacks, SCS, IEEE, pp.1-6, 2009.

T. Jerba, Complete version online

H. Maghrebi, S. Guilley, J. Danger, and F. Flament, Entropy-based Power Attack, in HOST, IEEE Computer Society, pp.1-6, 2010.

S. Mangard, Hardware Countermeasures against DPA ??? A Statistical Analysis of Their Effectiveness, CT-RSA, pp.222-235, 2004.
DOI : 10.1007/978-3-540-24660-2_18

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006.

S. Mangard, E. Oswald, and F. Standaert, One for All -All for One: Unifying Standard DPA Attacks, Cryptology ePrint Archive Report, vol.449449, 2009.

S. Mangard and K. Schramm, Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations, CHES, pp.76-90, 2006.
DOI : 10.1007/11894063_7

E. Mateos and C. Geboty, Side channel analysis using giant magneto-resistive (gmr) sensors, in Cosade, 2011.

E. Mateos and C. H. Gebotys, A new correlation frequency analysis of the side channel, Proceedings of the 5th Workshop on Embedded Systems Security, WESS '10, pp.1-4, 2010.
DOI : 10.1145/1873548.1873552

E. Mateos and C. H. Gebotys, Side channel analysis using giant magnetoresistive ( gmr ) sensors, Design, 2011.

T. Messerges, E. Dabbish, and R. Sloan, Examining smart-card security under the threat of power analysis attacks, IEEE Transactions on Computers, vol.51, issue.5, pp.51-541, 2002.
DOI : 10.1109/TC.2002.1004593

T. S. Messerges, Using Second-Order Power Analysis to Attack DPA Resistant Software, Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems, CHES '00, pp.238-251, 2000.
DOI : 10.1007/3-540-44499-8_19

T. S. Messerges, E. A. Dabbish, and R. H. Sloan, Investigations of Power Analysis Attacks on Smartcards, USENIX ? Smartcard'99, pp.151-162, 1999.

T. Moon and W. Stirling, Mathematical methods and algorithms for signal processing, 2000.

U. London and . Kingdom, Also http://eprint.iacr.org, 2009.

D. Naccache, Why CIM-PACA?; www. arcsis. org/ uploads/ media

H. N. Nagaraja, Functions of concomitants of order statistics, Journal of the Indian Society for Probability and Statistics, vol.7, pp.15-32, 2003.

M. Nassar, S. Bhasin, J. Danger, G. Duc, and S. Guilley, BCDL: A high performance balanced DPL with global precharge and without earlyevaluation , in DATE'10, pp.849-854, 2010.

Y. Nievergelt, Wavelets made easy, 1999.
DOI : 10.1007/978-1-4612-0573-9

N. Csd, Data Encryption Standard. FIPS PUB 46-3 http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf, REFERENCES [105] , Advanced Encryption Standard (AES). FIPS PUB 197, 1999.

K. Pearson, Mathematical Contributions to the Theory of Evolution. III. Regression, Heredity, and Panmixia, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol.187, issue.0, pp.253-318, 1896.
DOI : 10.1098/rsta.1896.0007

F. Peeters, J. Standaert, and . Quisquater, Power and electromagnetic analysis: Improved model, consequences and comparisons, Integration, The VLSI Journal, special issue on " Embedded Cryptographic Hardware, pp.52-60, 2007.

H. Pelletier and X. Charvet, Improving the DPA attack using Wavelet transform, 2005.

T. Popp and S. Mangard, Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints, Proceedings of CHES'05, pp.172-186, 2005.
DOI : 10.1007/11545262_13

J. Proakis and M. Salehi, Digital communications, McGraw-Hill higher education, 2008.

E. Prouff and M. Rivain, Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis, LNCS, vol.5536, pp.499-518, 2009.

F. Rachidi, Compatibilit lectromagntique, Course note ofÉcoleof´ofÉcole Polytechnique Fdrale de Lausanne, 2006.

M. Rahman, Applications of Fourier Transforms to Generalized Functions, 2011.

C. Rechberger and E. Oswald, Practical Template Attacks, WISA, pp.443-457, 2004.
DOI : 10.1007/978-3-540-31815-6_35

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.6474

M. Rivain, E. Prouff, and J. Doget, Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers, CHES, pp.171-188, 2009.
DOI : 10.1007/978-3-642-04138-9_13

A. Roche, G. Malandain, X. Pennec, and N. Ayache, Multimodal image registration by maximization of the correlation ratio, 1998.
URL : https://hal.archives-ouvertes.fr/inria-00073311

J. L. Rodgers and A. W. Nicewander, Thirteen Ways to Look at the Correlation Coefficient, The American Statistician, pp.59-66, 1988.

J. L. Rodgers and W. A. Nicewander, Thirteen ways to look at the correlation coefficient, The American Statistician, pp.59-66, 1988.

B. Rosner, Fundamentals of biostatistics, Cole Cengage Learning, 2010.

R. Russo, Statistics for the behavioural sciences: an introduction, 2003.

A. Salomaa, Public-key cryptography, Texts in theoretical computer science, 1996.

G. Saporta, Data mining et statistique dcisionnelle. L'intelligence des donnes, 2010.

A. Satoh, Side-channel Attack Standard Evaluation Board, SASEBO (Project of the AIST); SASEBO-G experimental board ? http

L. Sauvage, S. Guilley, and Y. Mathieu, Electromagnetic Radiations of FPGAs, ACM Transactions on Reconfigurable Technology and Systems, vol.2, issue.1, pp.1-24, 2009.
DOI : 10.1145/1502781.1502785

URL : https://hal.archives-ouvertes.fr/hal-00319164

P. Schaumont and K. Tiri, Masking and Dual-Rail Logic Don???t Add Up, CHES, pp.95-106, 2007.
DOI : 10.1007/978-3-540-74735-2_7

W. Schindler, A Combined Timing and Power Attack, Public Key Cryptography, pp.263-279, 2002.
DOI : 10.1007/3-540-45664-3_19

W. Schindler, K. Lemke, and C. Paar, A Stochastic Model for Differential Side Channel Cryptanalysis, LNCS, vol.3659, pp.30-46, 2005.
DOI : 10.1007/11545262_3

L. Shang, J. Jaeger, and R. Krebs, Efficiency analysis of data compression of power system transients using wavelet transform, 2003 IEEE Bologna Power Tech Conference Proceedings,, p.6, 2003.
DOI : 10.1109/PTC.2003.1304802

A. Sharma and M. Prakash, Linear Transformation, 2007.

J. Shlens, A tutorial in Principal Component Analysis, 2005.

S. Kolenikov and G. Angeles, The use of discrete data in PCA for socioeconomic status evaluation, 2005.

P. S. Maybeck, Stochastic models, estimation, and control, 1979.

L. I. Smith, A tutorial in Principal Component Analysis, 2002.

D. Sorensen, D. Gianola, and . Likelihood, Bayesian and MCMC methods in quantitative genetics, Statistics for biology and health, 2002.

F. Standaert and C. Archambeau, Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, CHES. REFERENCES [143] F.-X. Standaert, P. Bulens, G. de Meulenaer, and N. Veyrat- Charvillon, Improving the Rules of the DPA Contest. Cryptology ePrint Archive, pp.411-425, 2008.
DOI : 10.1007/978-3-540-85053-3_26

F. Standaert, B. Gierlichs, and I. Verbauwhede, Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices, ICISC, pp.253-267, 2008.
DOI : 10.1007/11802839_42

F. Standaert, F. Koeune, and W. Schindler, How to Compare Profiled Side-Channel Attacks?, LNCS, vol.5536, pp.485-498, 2009.
DOI : 10.1007/978-3-642-01957-9_30

F. Standaert, T. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, pp.443-461, 2009.
DOI : 10.1007/978-3-540-85053-3_26

G. S. Tuffry, Data mining et statistique dcisionnelle. L'intelligence des donnes, 2010.

C. Thompson and L. Shure, Image Processing Toolbox: For Use with MAT- LAB;[user's Guide, 1995.

C. C. Tiu, A new frequency-based side channel attack for embedded systems. master degree thesis, deparment of electrical and computer engineering,university of waterloo, 2005.

P. Topiwala, Wavelet image and video compression, Kluwer international series in engineering and computer science, Kluwer Academic, 1998.

J. G. Van-woudenberg, M. F. Witteman, and B. Bakker, Improving Differential Power Analysis by Elastic Alignment, CT-RSA, pp.104-119, 2011.
DOI : 10.1007/978-3-642-00730-9_16

S. Yitzhaki, Gini's mean difference: a superior measure of variability for nonnormal distributions, International Journal of Statistics, vol.2, pp.285-316, 2003.

P. Zarchan and H. Musoff, Fundamentals of Kalman Filtering: A Practical Approach, 2006.

W. Zeng, H. Yu, and C. Lin, Multimedia security technologies for digital rights management, Electronics & Electrical, 2006.

H. Zeng-guang, PCA for data fusion and navigation of mobile robots, LNCS, vol.3495, pp.610-611, 2005.