S. Belaïd, F. Benhamouda, A. Passelègue, E. Prouff, A. Thillard et al., Private multiplication over finite fields, Proceedings, Part III, volume 10403 of LNCS, pp.397-426, 2017.

R. Bloem, H. Groß, R. Iusupov, B. Könighofer, S. Mangard et al., Formal Verification of Masked Hardware Implementations in the Presence of Glitches, Advances in Cryptology -EURO-CRYPT 2018, vol.10821, pp.321-353, 2018.

A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann et al., PRESENT: An Ultra-Lightweight Block Cipher, CHES, vol.4727, pp.450-466, 2007.

É. Brier, C. Clavier, and F. Olivier, Correlation power analysis with a leakage model, Cryptographic Hardware and Embedded Systems -CHES 2004: 6th International Workshop, vol.3156, pp.16-29, 2004.
URL : https://hal.archives-ouvertes.fr/hal-02487026

K. A. Browning, J. F. Dillon, M. T. Mcquistan, and A. J. Wolfe, An APN permutation in dimension six, The 9th Conference on Finite Fields and Applications -Fq9, vol.518, pp.33-42, 2010.

P. Camion, C. Carlet, P. Charpin, and N. Sendrier, On correlation-immune functions, Proceedings of CRYPTO'91, vol.576, pp.86-100, 1991.

C. Carlet, On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks, Progress in Cryptology -IN-DOCRYPT 2005, 6th International Conference on Cryptology in India, vol.3797, pp.49-62, 2005.

C. Carlet, Boolean functions for cryptography and error correcting codes, Boolean Models and Methods in Mathematics, vol.2, pp.257-397, 2010.

C. Carlet, Vectorial Boolean Functions for Cryptography, Chapter of the monography Boolean Models and Methods in Mathematics, pp.398-469, 2010.
URL : https://hal.archives-ouvertes.fr/hal-02060699

C. Carlet, A. Heuser, and S. Picek, Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience, Applied Cryptography and Network Security -15th International Conference, vol.10355, pp.393-414, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01629879

C. Carlet and S. Mesnager, On Semi-bent Boolean Functions, IEEE Transactions on Information Theory, vol.58, issue.5, pp.3287-3292, 2012.

K. Chakraborty, S. Sarkar, S. Maitra, B. Mazumdar, D. Mukhopadhyay et al., Redefining the transparency order, Des. Codes Cryptography, vol.82, issue.1-2, pp.95-115, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01399584

P. Charpin and E. Pasalic, On Propagation Characteristics of Resilient Functions. Selected Areas in Cryptography, Lecture Notes in Computer Science, vol.2595, pp.175-195, 2002.
URL : https://hal.archives-ouvertes.fr/inria-00072051

S. Eloi-de-chérisey, O. Guilley, and . Rioul, Confused yet successful: -theoretical comparison of distinguishers for monobit leakages in terms of confusion coefficient and SNR, Information Security and Cryptology -14th International Conference, vol.11449, pp.533-553, 2018.

S. Eloi-de-chérisey, O. Guilley, P. Rioul, and . Piantanida, Best Information is Most Successful Mutual Information and Success Rate in Side-Channel Analysis, IACR Trans. Cryptogr. Hardw. Embed. Syst, vol.2019, issue.2, pp.49-79, 2019.

J. F. Dillon, Elementary Hadamard difference sets, 1974.

H. Dobbertin, Construction of bent functions and balanced Boolean functions with high nonlinearity. FSE 1994, vol.1008, pp.61-74, 1995.

M. , A. Elaabid, and S. Guilley, Portability of templates, Journal of Cryptographic Engineering, vol.2, issue.1, pp.63-74

Y. Fei, Q. Luo, and A. A. Ding, A Statistical Model for DPA with Novel Algorithmic Confusion Analysis, LNCS, vol.7428, pp.233-250, 2012.

W. Fischer, M. Berndt, and . Gammel, Masking at Gate Level in the Presence of Glitches, CHES, vol.3659, pp.187-200, 2005.

A. Sylvain-guilley, O. Heuser, and . Rioul, A Key to Success -Success Exponents for Side-Channel Distinguishers, Progress in Cryptology -INDOCRYPT 2015, vol.9462, pp.270-290, 2015.

P. Sylvain-guilley, R. Hoogvorst, and . Pacalet, Differential Power Analysis Model and Some Results, Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), vol.153, pp.127-142, 2004.

A. Heuser, O. Rioul, and S. Guilley, A Theoretical Study of Kolmogorov-Smirnov Distinguishers -Side-Channel Analysis vs. Differential Cryptanalysis, Constructive Side-Channel Analysis and Secure Design -5th International Workshop, vol.8622, pp.9-28, 2014.
URL : https://hal.archives-ouvertes.fr/hal-02286939

A. Heuser, O. Rioul, and S. Guilley, Good Is Not Good Enough -Deriving Optimal Distinguishers from Communication Theory, Cryptographic Hardware and Embedded Systems -CHES 2014 -16th International Workshop, vol.8731, pp.55-74, 2014.
URL : https://hal.archives-ouvertes.fr/hal-02286943

S. Kavut, Results on rotation-symmetric S-boxes, Information Sciences, vol.201, pp.93-113, 2012.

S. Kavut, M. Diker, and Y. , A new algorithm for the design of strong Boolean functions (in Turkish), Proceedings of the First National Cryptology Symposium, pp.95-105, 2005.

S. Kavut, M. Diker, and Y. , Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions -9 Variable Boolean Functions with Nonlinearity 242, 17th International Applied Algebra, Algebraic Algorithms, and Error Correcting Codes Symposium, vol.4851, pp.321-329, 2007.

C. Paul, J. Kocher, and B. Jaffe, Differential power analysis, Lecture Notes in Computer Science, vol.1666, pp.388-397, 1999.

Y. Li and M. Wang, Constructing differentially 4-uniform permutations over GF (2 2m ) from quadratic APN permutations over GF (2 2m+1 ), Des. Codes Cryptogr, vol.72, issue.2, pp.249-264, 2014.

R. Lidl and H. Niederreiter, Finite fields, 1983.

H. Liu, G. Qian, S. Goto, and Y. Tsunoo, Correlation Power Analysis Based on Switching Glitch Model, Lecture Notes in Computer Science, vol.6513, pp.191-205, 2010.

R. L. Mcfarland, A family of difference sets in non-cyclic groups, Journal of Combinatorial Theory, Series A, vol.15, issue.1, pp.1-10, 1973.

H. Maghrebi, O. Rioul, S. Guilley, and J. Danger, Comparison between Side-Channel Analysis Distinguishers, LNCS, vol.7618, pp.331-340, 2012.
URL : https://hal.archives-ouvertes.fr/hal-02299929

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006.

S. Mangard and K. Schramm, Pinpointing the side-channel leakage of masked AES hardware implementations, Cryptographic Hardware and Embedded Systems -CHES 2006, 8th International Workshop, vol.4249, pp.76-90, 2006.

L. Mariot, S. Picek, A. Leporati, and D. Jakobovic, Cellular automata based S-boxes, Cryptography and Communications, vol.11, issue.1, pp.41-62, 2019.

J. L. Massey, SAFER K-64: A byte-oriented block-ciphering algorithm, Fast Software Encryption, Cambridge Security Workshop, vol.809, pp.1-17, 1993.

S. Mesnager, Bent functions: fundamentals and results, pp.1-544, 2016.

A. Moradi, S. Guilley, and A. Heuser, Detecting Hidden Leakages, Applied Cryptography and Network Security -12th International Conference, ACNS 2014, vol.8479, pp.324-342, 2014.

D. P. Montminy, R. O. Baldwin, M. A. Temple, and E. D. Laspe, Improving cross-device attacks using zero-mean unit-variance normalization, J. Cryptographic Engineering, vol.3, issue.2, pp.99-110, 2013.

M. Nassar, Y. Souissi, S. Guilley, and J. Danger, RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs, 2012 Design, Automation & Test in Europe Conference & Exhibition, DATE 2012, pp.1173-1178, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00666337

S. Nikova, C. Rechberger, and V. Rijmen, Threshold Implementations Against Side-Channel Attacks and Glitches, ICICS, vol.4307, pp.529-545, 2006.

S. Nikova, M. Vincent-rijmen, and . Schläffer, Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches, ICISC, vol.5461, pp.218-234, 2008.

, NIST. AES Proposal: Rijndael (now FIPS PUB 197), 2003.

K. Nyberg, Differentially uniform mappings for cryptography. EUROCRYPT'93, vol.765, pp.55-64, 1994.

S. Picek, B. Mazumdar, D. Mukhopadhyay, and L. Batina, Modified Transparency Order Property: Solution or Just Another Attempt, Security, Privacy, and Applied Cryptography Engineering -5th International Conference, vol.9354, pp.210-227, 2015.

, Lecture Notes in Computer Science, vol.3557, pp.424-441, 2005.

, Constructive Side-Channel Analysis and Secure Design -5th International Workshop, Lecture Notes in Computer Science, vol.8622, 2014.

O. Reparaz, B. Gierlichs, and I. Verbauwhede, A note on the use of margins to compare distinguishers, Prouff [48], pp.1-8

. Rijmen, . Vincent, P. S. Barreto, G. Filhob, and L. Dcio, Rotation symmetry in algebraically generated cryptographic substitution tables, Inf. Process. Lett, vol.106, issue.6, pp.246-250, 2008.

C. E. Shannon, Communication theory of secrecy systems, Bell system technical journal, vol.28, pp.656-715, 1949.

W. Schindler, K. Lemke, and C. Paar, A Stochastic Model for Differential Side Channel Cryptanalysis, LNCS, vol.3659, pp.30-46, 2005.

F. Standaert, T. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, EUROCRYPT, vol.5479, pp.443-461, 2009.

N. Veyrat-charvillon and F. Standaert, Mutual Information Analysis: How, When and Why?, Cryptographic Hardware and Embedded Systems -CHES 2009, 11th International Workshop, vol.5747, pp.429-443, 2009.

C. Whitnall and E. Oswald, A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework, Lecture Notes in Computer Science, vol.6841, pp.316-334, 2011.

C. Whitnall and E. Oswald, A Fair Evaluation Framework for Comparing Side-Channel Distinguishers, J. Cryptographic Engineering, vol.1, issue.2, pp.145-160, 2011.

X. Zhang and Y. Zheng, GAC ? the criterion for global avalanche characteristics of cryptographic functions, Journal of Universal Computer Science, vol.1, issue.5, pp.320-337, 1995.

H. Zhao, Y. Zhou, F. Standaert, and H. Zhang, Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers, Lecture Notes in Computer Science, vol.7863, p.63, 2013.

S. , , vol.58, p.63

S. , , vol.33, p.63, 2003.

S. , , vol.33, p.63, 2003.