Android Security: Defending Your Users
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
Recommendation for Key Management
aes in fpga.pdf
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
Roger Harris Joelle Loretta -or- Paranoia for Fun and Profit.
Developing IV&V Information Assurance Analysis Techniques
Differential Power Analysis