C. Archambeau, É. Peeters, F. Standaert, and J. Quisquater, Template Attacks in Principal Subspaces, CHES, vol.4249, pp.1-14, 2006.

M. Bär, H. Drexler, and J. Pulkus, Improved Template Attacks, COSADE, pp.81-89, 2010.

G. Darmstadt,

S. Bhasin, J. Danger, S. Guilley, and Z. Najm, NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage, International Symposium on Electromagnetic Compatibility (EMC '14 / Tokyo, 2014.
URL : https://hal.archives-ouvertes.fr/hal-02412040

S. Bhasin, J. Danger, S. Guilley, and Z. Najm, Side-channel Leakage and Trace Compression Using Normalized Inter-class Variance, Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy, HASP '14, vol.7, pp.1-7, 2014.
URL : https://hal.archives-ouvertes.fr/hal-02412117

É. Brier, C. Clavier, and F. Olivier, Correlation power analysis with a leakage model, Cryptographic Hardware and Embedded Systems -CHES 2004: 6th International Workshop Cambridge, vol.3156, pp.16-29, 2004.
URL : https://hal.archives-ouvertes.fr/hal-02487026

N. Bruneau, S. Guilley, and A. Heuser, Less is More -Dimensionality Reduction from a Theoretical Perspective, Cryptographic Hardware and Embedded Systems -CHES 2015 -17th International Workshop, vol.9293, pp.22-41, 2015.
URL : https://hal.archives-ouvertes.fr/hal-02287177

N. Bruneau and S. Guilley, Annelie Heuser, Damien Marion, and Olivier Rioul. Optimal side-channel attacks for multivariate leakages and multiple models, J. Cryptographic Engineering, vol.7, issue.4, pp.331-341, 2017.

N. Bruneau, S. Guilley, A. Heuser, and O. Rioul, Masks Will Fall Off -Higher-Order Optimal Distinguishers
URL : https://hal.archives-ouvertes.fr/hal-02287072

T. Kaoshiung and R. O. , Advances in Cryptology -ASIACRYPT 2014 -20th International Conference on the Theory and Application of Cryptology and Information Security, vol.8874, pp.344-365, 2014.

S. Chari, J. R. Rao, and P. Rohatgi, Template attacks, Cryptographic Hardware and Embedded Systems -CHES 2002, 4th International Workshop, vol.2523, pp.13-28, 2002.

O. Choudary and M. G. Kuhn, Efficient template attacks, Smart Card Research and Advanced Applications -12th International Conference, vol.8419, pp.253-270, 2013.

C. Clavier, N. Jean-sébastien-coron, and . Dabbous, Differential Power Analysis in the Presence of Hardware Countermeasures, Lecture Notes in Computer Science, vol.1965, pp.252-263, 2000.
URL : https://hal.archives-ouvertes.fr/hal-02487059

L. Jean-sébastien-coron and . Goubin, On Boolean and Arithmetic Masking against Differential Power Analysis, CHES, pp.231-237, 1965.

. Springer, , 2000.

I. Jean-sébastien-coron and . Kizhvatov, An efficient method for random delay generation in embedded software, Cryptographic Hardware and Embedded Systems -CHES 2009, 11th International Workshop, Lausanne, vol.5747, pp.156-170, 2009.

P. Jean-sébastien-coron, C. Kumar-vadnala, E. Giraud, S. Prouff, M. Renner et al., Conversion of Security Proofs from One Model to Another: A New Issue, COSADE, 2012.

S. Éloi-de-chérisey, A. Guilley, O. Heuser, and . Rioul, On the optimality and practicability of mutual information analysis in some scenarios. Cryptography and Communications, 2017.

N. Debande, Y. Souissi, M. Elaabid, S. Guilley, and J. Danger, Wavelet transform based preprocessing for side channel analysis, 45th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2012, Workshops Proceedings, pp.32-38, 2012.
URL : https://hal.archives-ouvertes.fr/hal-02411932

F. Durvaux, M. Renauld, and F. Standaert, Loïc van Oldeneel tot Oldenzeel, and Nicolas Veyrat-Charvillon. Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models, Lecture Notes in Computer Science, vol.7771, pp.123-140, 2012.

M. , A. Elaabid, and S. Guilley, Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator, Progress in Cryptology -AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, vol.6055, pp.243-260, 2010.

A. Facon, S. Guilley, and M. Lec, Hvien, Damien Marion, and Thomas Perianin. Binary Data Analysis for Source Code Leakage Assessment, 11th International Conference, vol.01, pp.391-409, 2018.

G. Fan, Y. Zhou, H. Zhang, and D. Feng, How to Choose Interesting Points for Template Attacks More Effectively?, Trusted Systems -6th International Conference, vol.9473, pp.168-183, 2014.

A. Sylvain-guilley, M. Heuser, O. Tang, and . Rioul, Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition, Innovative Security Solutions for Information Technology and Communications -10th International Conference, vol.10543, pp.12-27, 2017.

S. Guilley, K. Khalfallah, V. Lomné, and J. Danger, Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication -5th IFIP WG 11.2 International Workshop, Proceedings, pp.100-115, 2011.

P. Guillot, G. Millérioux, B. Dravie, and N. E. Mrabet, Spectral Approach for Correlation Power Analysis, Codes, Cryptology and Information Security -Second International Conference, C2SI 2017, vol.10194, pp.238-253, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01652010

S. Hajra and D. Mukhopadhyay, Reaching the limit of nonprofiling DPA, IEEE Trans. on CAD of Integrated Circuits and Systems, vol.34, issue.6, pp.915-927, 2015.

I. T. Jolliffe, Principal Component Analysis, Springer Series in Statistics, p.387954422, 2002.

M. Joye, P. Paillier, and B. Schoenmakers, On Second-Order Differential Power Analysis, CHES, vol.3659, pp.293-308, 2005.

L. Lerman, R. Poussier, G. Bontempi, O. Markowitch, and F. Standaert, Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis), Constructive Side-Channel Analysis and Secure Design -6th International Workshop, pp.20-33, 2015.

V. Lomné, E. Prouff, and T. Roche, Behind the Scene of Side Channel Attacks, Lecture Notes in Computer Science, vol.8269, issue.1, pp.506-525, 2013.

H. Maghrebi and E. Prouff, On the Use of Independent Component Analysis to Denoise Side-Channel Measurements, Constructive Side-Channel Analysis and Secure Design -9th International Workshop, vol.10815, pp.61-81, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01973322

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006.

T. S. Messerges, Securing the AES Finalists Against Power Analysis Attacks, Fast Software Encryption'00, pp.150-164, 2000.

T. S. Messerges, Securing the AES finalists against power analysis attacks, Fast Software Encryption, 7th International Workshop, vol.1978, pp.150-164, 2000.

T. S. Messerges, E. A. Dabbish, and R. H. Sloan, Examining Smart-Card Security under the Threat of Power Analysis Attacks, IEEE Trans. Computers, vol.51, issue.5, pp.541-552, 2002.

G. D. Natale, M. Flottes, B. Rouzeyre, M. Valka, and D. Réal, Power consumption traces realignment to improve differential power analysis, DDECS, pp.201-206, 2011.
URL : https://hal.archives-ouvertes.fr/lirmm-00592005

E. Oswald and S. Mangard, Template Attacks on Masking -Resistance Is Futile, Lecture Notes in Computer Science, vol.4377, pp.243-256, 2007.

E. Prouff, M. Rivain, and R. Bevan, Statistical Analysis of Second Order Differential Power Analysis, IEEE Trans. Computers, vol.58, issue.6, pp.799-811, 2009.

W. Schindler, K. Lemke, and C. Paar, A Stochastic Model for Differential Side Channel Cryptanalysis, LNCS, vol.3659, pp.30-46, 2005.

K. Schramm and C. Paar, Higher Order Masking of the AES, LNCS, vol.3860, pp.208-225, 2006.

X. François, C. Standaert, and . Archambeau, Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages, CHES, pp.411-425

. Springer, , 2008.

F. Standaert, N. Veyrat-charvillon, E. Oswald, B. Gierlichs, M. Medwed et al., ASIACRYPT, vol.6477, pp.112-129, 2010.

G. J. Jasper, M. F. Van-woudenberg, B. Witteman, and . Bakker, Improving Differential Power Analysis by Elastic Alignment, Lecture Notes in Computer Science, vol.6558, pp.104-119, 2011.

V. Vassilevska and W. , Multiplying matrices faster than coppersmith-winograd, STOC'12 Proceedings of the fortyfourth annual ACM symposium on Theory of computing, pp.887-898, 2012.

H. Zhang and Y. Zhou, How many interesting points should be used in a template attack, Journal of Systems and Software, vol.120, pp.105-113, 2016.

H. Zhang, Y. Zhou, and D. Feng, Mahalanobis distance similarity measure based distinguisher for template attack. Security and Communication Networks, vol.8, pp.769-777, 2015.

Y. Zheng, Y. Zhou, Z. Yu, C. Hu, and H. Zhang, How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice?, Information and Communications Security -16th International Conference, ICICS 2014, vol.8958, pp.200-214, 2014.