E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, CRYPTO '97: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, pp.513-525, 1997.
DOI : 10.1007/BFb0052259

D. Boneth, R. A. Demillo, L. Richard, and J. , On the importance of checking cryptographic protocols for faults, Advances in Cryptology EURO- CRYPT'97, pp.37-51, 1997.

H. Choukri and M. Tunstall, Round reduction using faults, Proc. Second Int'l Workshop Fault Diagnosis and Tolerance in Cryptography (FDTC '05), 2005.

J. Daemen and V. Rijmen, Aes proposal: Rijndael, 1998.

P. Dusart, G. Letourneux, and O. Vivolo, Differential Fault Analysis on A.E.S, ACNS: applied cryptography and network security, pp.293-306, 2003.
DOI : 10.1007/978-3-540-45203-4_23

T. Fukunaga and J. Takahashi, Practical Fault Attack on a Cryptographic LSI with ISO/IEC 18033-3 Block Ciphers, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.84-92, 2009.
DOI : 10.1109/FDTC.2009.34

C. Giraud and . Dfa, DFA on AES, Advanced Encryption Standard ? AES, pp.27-41, 2005.
DOI : 10.1007/11506447_4

S. Guilley, L. Sauvage, J. Danger, N. Selmane, and R. Pacalet, Silicon-level Solutions to Counteract Passive and Active Attacks, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.3-17, 2008.
DOI : 10.1109/FDTC.2008.18

URL : https://hal.archives-ouvertes.fr/hal-00311431

H. Choukri and H. Bar, The sorcerer's apprentice guide to fault attacks, In Special Issue on Cryptography and Security, vol.94, issue.2, pp.370-382, 2006.

M. Hutter and J. Schmidt, Optical and em fault-attacks on crt-based rsa: Concrete results, Proceedings of the 15th Austrian Workhop on Microelectronics, 2007.

G. Piret and J. Quisquater, A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad, Proc. Cryptographic Hardware and Embedded Systems (CHES '03), pp.77-88, 2003.
DOI : 10.1007/978-3-540-45238-6_7

J. Quisquater and D. Samyde, Eddy current for magnetic analysis with active sensor, Proceedings of ESmart 2002, p.185194, 2002.

B. Robisson and P. Manet, Differential Behavioral Analysis, Cryptographic Hardware and Embedded Systems, pp.413-426, 2007.
DOI : 10.1007/978-3-540-74735-2_28

URL : https://hal.archives-ouvertes.fr/emse-00481468

N. Selmane, S. Guilley, and J. Danger, Practical Setup Time Violation Attacks on AES, 2008 Seventh European Dependable Computing Conference, pp.91-96, 2008.
DOI : 10.1109/EDCC-7.2008.11

P. Sergei, R. J. Skorobogatov, and . Anderson, Optical fault induction attacks, Cryptographic Hardware and Embedded Systems ? CHES 2002, pp.2-12, 2002.

S. Yen and M. Joye, Checking before output may not be enough against fault-based cryptanalysis, IEEE Transactions on Computers, vol.49, pp.967-970, 2000.