O. Meynard, S. Guilley, J. Danger, and L. Sauvage, Far Correlation-based EMA with a precharacterized leakage model, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010), pp.977-980, 2010.
DOI : 10.1109/DATE.2010.5456906

L. Sauvage, O. Meynard, S. Guilley, and J. Danger, ElectroMagnetic Attacks Case Studies on Non-Protected and Protected Cryptographic Hardware Accelerators Special session #4 on Modeling/Simulation Validation and use of FSV, IEEE EMC, 2010.

S. Guilley, O. Meynard, L. Sauvage, and J. Danger, An Empirical Study of the EIS Assumption in Side Channel Attacks against Hardware Implementations, COSADE, 2010.

O. Meynard, S. Guilley, F. Flament, J. Danger, D. Réal et al., Characterization of the Electro-Magnetic Side Channel in Frequency Domain, InsCrypt LNCS, pp.175-190, 2010.

O. Meynard, S. Guilley, D. Réal, and J. Danger, Time Samples Correlation Attack, pp.67-72, 2011.

O. Meynard, D. Réal, S. Guilley, J. Danger, and N. Homma, Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques, 2011 Design, Automation & Test in Europe, 2011.
DOI : 10.1109/DATE.2011.5763163

O. Meynard, Y. Hayashi, N. Homma, and S. Guilley, Jean-Luc Danger , Identification of information leakage spots on a cryptographic device with an RSA processor [14001] Federal Information Processing Standards (FIPS) Publication 140-2, Security requirements for cryptographic modules, IEEE International Symposium on Electromagnetic Compatibility (EMC), pp.773-778, 2001.

[. Aabid, O. Meynard, S. Guilley, and J. Danger, Combined Side-Channel Attacks, pp.175-190, 2010.

[. Archambeau, É. Peeters, F. Standaert, and J. Quisquater, Template Attacks in Principal Subspaces, CHES, LNCS, vol.4249, issue.69, pp.1-14, 2006.
DOI : 10.1007/11894063_1

[. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, CHES LNCS, vol.3156, issue.29, pp.16-29, 2004.
DOI : 10.1007/978-3-540-28632-5_2

[. Boneh, R. A. Demillo, and R. J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Proceedings of Eurocrypt'97, pp.37-51, 1997.
DOI : 10.1007/3-540-69053-0_4

J. Daniel and . Bernstein, The Poly1305-AES Message-Authentication Code, FSE, pp.32-49, 2005.

[. Clavier, J. Coron, and N. Dabbous, Differential Power Analysis in the Presence of Hardware Countermeasures, CHES LNCS, pp.252-263, 2000.
DOI : 10.1007/3-540-44499-8_20

H. Vincent-carlier, E. Chabanne, H. Dottax, and . Pelletier, Electromagnetic Side Channels of an FPGA Implementation of AES, Cryptology ePrint Archive, Report, vol.145, 2004.

[. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi, Towards Sound Approaches to Counteract Power-Analysis Attacks , CRYPTO, LNCS, vol.1666, 1999.

P. C. Jean-sébastien-coron, D. Kocher, and . Naccache, Statistics and Secret Leakage, Lecture Notes in Computer Science, vol.1962, pp.157-173, 2000.
DOI : 10.1007/3-540-45472-1_12

[. Derbez, P. Fouque, and D. Leresteux, Meetin-the-middle and impossible differential fault analysis on aes, CHES, pp.274-291, 2011.

[. Eck, Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?, Computers Secutity, 1985.

[. Elaabid and S. Guilley, Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto- Accelerator, AFRICACRYPT, LNCS, vol.6055, pp.243-260, 2010.

X. Fan, Y. Zeng, and . Yu-greece, Gang Wang, and Qianling Zhang, A modified high-radix scalable Montgomery multiplier, ISCAS, 2006.

[. Gierlichs, E. D. Mulder, B. Preneel, and I. Verbauwhede, Empirical comparison of side channel analysis distinguishers on DES in hardware, 2009 European Conference on Circuit Theory and Design, pp.391-394, 2009.
DOI : 10.1109/ECCTD.2009.5275003

C. H. Gebotys, S. Ho, and C. C. Tiu, EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA, Cryptographic Hardware and Embedded Systems ? CHES 2005, pp.250-264, 2005.
DOI : 10.1007/11545262_19

[. Gierlichs, K. Lemke-rust, and C. Paar, Templates vs. Stochastic Methods, LNCS, vol.4249, pp.15-29, 2006.
DOI : 10.1007/11894063_2

K. Gandolfi, C. Mourtel, and F. Olivier, Electromagnetic Analysis: Concrete Results, Cryptographic Hardware and Embedded Systems -CHES 2001, pp.251-261, 2001.
DOI : 10.1007/3-540-44709-1_21

. Hhs-+-11-]-y, N. Hayashi, T. Homma, T. Sugawara, T. Mizuki et al., Non-invasive emi-based fault injection attack against cryptographic modules, Electromagnetic Compatibility (EMC), 2011 IEEE International Symposium on, aug, pp.763-767, 2011.

A. Homma, T. Miyamoto, A. Aoki, A. Satoh, and . Shamir, Comparative Power Analysis of Modular Exponentiation Algorithms, IEEE Transactions on Computers, vol.59, issue.6, pp.795-807, 2010.
DOI : 10.1109/TC.2009.176

[. Hutter, S. Mangard, and M. Feldhofer, Power and EM Attacks on Passive $13.56\,\textrm{MHz}$ RFID Devices, CHES '07: Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, pp.320-333, 2007.
DOI : 10.1007/978-3-540-74735-2_22

S. Homma, Y. Nagashima, T. Imai, A. Aoki, and . Satoh, High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching, CHES LNCS, vol.4249, pp.187-200, 2006.
DOI : 10.1007/11894063_15

M. Joye, P. Paillier, and B. Schoenmakers, On Second-Order Differential Power Analysis, CHES LNCS, vol.3659, pp.293-308, 2005.
DOI : 10.1007/11545262_22

M. Joye and S. Yen, The Montgomery Powering Ladder, Cryptographic Hardware and Embedded Systems -CHES 2002, pp.291-302, 2003.
DOI : 10.1007/3-540-36400-5_22

G. Markus, R. J. Kuhn, and . Anderson, Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations, Information Hiding, pp.124-142, 1998.

C. Paul, J. Kocher, and B. Jaffe, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, CRYPTO'96, pp.104-113, 1996.

M. G. Kuhn, compromising emanations, pp.60-70, 2003.
DOI : 10.1007/0-387-23483-7_74

T. Le, J. Clédière, C. Canovas, B. Robisson, C. Servière et al., A Proposition for Correlation Power Analysis Enhancement, CHES LNCS, vol.4249, issue.66, pp.174-186, 2006.
DOI : 10.1007/11894063_14

URL : https://hal.archives-ouvertes.fr/hal-00133098

[. Le, C. Canovas, and J. Clédière, An overview of side channel analysis attacks, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.33-43, 2008.
DOI : 10.1145/1368310.1368319

[. Li, A. T. Markettos, and S. Moore, Security Evaluation Against Electromagnetic Analysis at Design Time, Cryptographic Hardware and Embedded Systems ? CHES 2005, pp.280-292, 2005.
DOI : 10.1007/11545262_21

S. Mangard, Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness, CT-RSA, LNCS, vol.2964, pp.222-235, 2004.

T. S. Messerges, E. A. Dabbish, and R. H. Sloan, Investigations of Power Analysis Attacks on Smartcards, USENIX ? Smartcard'99, pp.151-162, 1999.

S. Thomas and . Messerges, Using Second-Order Power Analysis to Attack DPA Resistant Software, CHES LNCS, vol.1965, pp.238-251, 2000.

[. Meynard, S. Guilley, J. Danger, and L. Sauvage, Far Correlation-based EMA with a precharacterized leakage model, DATE'10, IEEE Computer Society, pp.977-980, 2010.

S. Olivier-meynard, F. Guilley, J. Flament, and . Danger, Denis Réal, and Frédéric Valette, Characterization of the Electro- Magnetic Side Channel in Frequency Domain, pp.175-190, 2010.

. Mhh-+-11-]-o, Y. Meynard, N. Hayashi, S. Homma, J. Guilley et al., Identification of information leakage spots on a cryptographic device with an rsa processor, IEEE International Symposium on, aug, pp.773-778, 2011.

[. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, p.29, 2006.

M. Meynard, D. Réal, and S. Guilley, Jean-Luc Danger, and Naofummi Homma, Enhancement of Simple Electro-Magnetic Attacks by Pre-characterization in Frequency Domain and Demodulation Techniques , DATE, 2011.

[. Peeters, Towards Security Limits of Embedded Hardware Devices: from Practice to Theory, 2006.

[. Plos, M. Hutter, and M. Feldhofer, Evaluation of side-channel preprocessing techniques on cryptographic-enabled hf and uhf rfid-tag prototypes, Workshop on RFID Security, pp.114-127, 2008.

M. Prouff, R. Rivain, and . Bevan, Statistical Analysis of Second Order Differential Power Analysis, IEEE Transactions on Computers, vol.58, issue.6, pp.799-811, 2009.
DOI : 10.1109/TC.2009.15

[. Peeters, F. Standaert, and J. Quisquater, Power and electromagnetic analysis: Improved model, consequences and comparisons, Integration, the VLSI Journal, vol.40, issue.1, pp.52-60, 2007.
DOI : 10.1016/j.vlsi.2005.12.013

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.1619

[. Peeters, F. Standaert, and J. Quisquater, Power and electromagnetic analysis: Improved model, consequences and comparisons, Integration, The VLSI Journal, special issue on " Embedded Cryptographic Hardware, pp.52-60, 2007.

[. Quisquater and D. Samyde, ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards, Smart Card Programming and Security (E-smart 2001) (I. Attali and T. P
DOI : 10.1007/3-540-45418-7_17

C. [. Radasky, M. W. Baum, and . Wik, Introduction to the special issue on high-power electromagnetics (hpem) and intentional electromagnetic interference (iemi), Electromagnetic Compatibility, IEEE Transactions on, vol.46, issue.3, pp.314-321, 2004.

[. Rivain, Differential Fault Analysis on DES Middle Rounds, Differential Fault Analysis on DES Middle Rounds, CHES, Lecture Notes in Computer Science, vol.5747, pp.457-469, 2009.
DOI : 10.1007/978-3-642-04138-9_32

P. Sergei, R. J. Skorobogatov, and . Anderson, Optical fault induction attacks, Cryptographic Hardware and Embedded Systems -CHES 2002, pp.2-12, 2003.

[. Standaert and C. Archambeau, Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, CHES, Lecture Notes in Computer Science, vol.5154, pp.411-425, 2008.
DOI : 10.1007/978-3-540-85053-3_26

[. Standaert and C. Archambeau, Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, Cryptographic Hardware and Embedded Systems ? CHES 2008, pp.411-425, 2008.
DOI : 10.1007/978-3-540-85053-3_26

A. Satoh, Side-channel Attack Standard Evaluation Board, SASEBO, Project of the AIST ? RCIS (Research Center for Information Security

S. Selmane, S. Bhasin, T. Guilley, J. Graba, and . Danger, WDDL is Protected Against Setup Time Violation Attacks, FDTC, conjunction with CHES'09, pp.73-83, 2009.

F. Standaert, L. Batina, E. D. Mulder, K. Lemke, N. Mentens et al., Report on DPA and EMA attacks on FPGAs European Network of Excellence in Cryptography, Deliverable D.VAM, vol.5, 2002.

O. Schimmel, P. Duplys, E. B. Hayek, and W. Rosenstiel, Correlation power analysis in frequency domain, COSADE, pp.1-3, 2010.

[. Standaert, B. Gierlichs, and I. Verbauwhede, Partition vs. Comparison Side-Channel Distinguishers: An Bibliography Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against, pp.253-267, 2008.

L. Sauvage, O. Meynard, S. Guilley, and J. Danger, ElectroMagnetic Attacks Case Studies on Non-Protected and Protected Cryptographic Hardware Accelerators Special session #4 on Modeling/Simulation Validation and use of FSV, IEEE EMC, 2008.

[. Smulders, The threat of information theft by reception of electromagnetic radiation from RS-232 cables, Computers & Security, vol.9, issue.1, pp.53-58, 1990.
DOI : 10.1016/0167-4048(90)90157-O

[. Standaert, T. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT LNCS, vol.28, issue.2, pp.443-461, 2009.
DOI : 10.1007/978-3-540-85053-3_26

[. Standaert, É. Peeters, G. Rouvroy, and J. Quisquater, An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays, Proceedings of the IEEE, pp.383-394, 2006.
DOI : 10.1109/JPROC.2005.862437

[. Tanaka, Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures, ICISS, pp.167-179, 2007.

F. Standaert, Mutual Information Analysis: How, When and Why?, CHES, LNCS, vol.5747, pp.429-443, 2009.

M. Vuagnoux and S. Pasini, Compromising Electromagnetic Emanations of Wired and Wireless Keyboards, Proceedings of the 18th USENIX Security Symposium, USENIX Association, pp.58-63, 2009.