These are my notes for an introductory lecture covering efficient implementation as well as implementation attacks (side channels, faults). It is by far not completely covering this much more complex field, but should give a decent overview and pointers for further reading.
These lectures notes are under the Creative Commons "Attribution-ShareAlike 3.0 Unported" (CC BY-SA 3.0
) license. See https://creativecommons.org/licenses/by-sa/3.0/ for details.
Please create a Pull Request and/or contact me directly. Your changes will be under the same license as these notes.
Maybe later, would take some time and effort to properly prepare that for making it public.