[. Akkar, R. Bevan, P. Dischamp, and D. Moyart, Power analysis, what is now possible Evaluation of set and seu effects at multiple abstraction levels, ASIACRYPT '00: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security IEEE International On-Line Testing Symposium (IOLT), pp.489-502, 2000.

G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, and V. Piuri, On the propagation of faults and their detection in a hardware implementation of the Advanced Encryption Standard, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors, pp.303-312, 2002.
DOI : 10.1109/ASAP.2002.1030729

[. Bertoni, L. Breveglieri, I. Koren, V. P. , D. Boneh et al., Fault detection in the Advanced Encryption Standard On the importance of checking cryptographic protocols for faults, Proceedings of MPCS 2002 Advances in Cryptology ? EUROCRYPT '97, pp.37-51, 1997.

G. Bouesse, M. Renaudin, B. Robisson, E. Beigné, P. Liardet et al., DPA on quasi delay insensitive asynchronous circuits: Concrete. results, XIX Conference on Designof Circuits and Integrated Systems, 2004.
URL : https://hal.archives-ouvertes.fr/hal-01399172

E. Biham, A. Shamir, [. Chari, C. S. Jutla, J. R. Rao et al., Differential fault analysis of secret key cryptosystems, CCD01] Christophe Clavier, Jean-Sébastien Coron, and Nora Dabbous CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology Information Security and Privacy ? ACISP 2003, volume 2727 of Lecture Notes in Computer Science, pp.513-525252, 1965.
DOI : 10.1007/BFb0052259

P. Dusart, G. Letourneux, and O. Vivilo, Differential Fault Analysis on A.E.S, Applied Cryptography and Network Security ? ACNS 2003, pp.293-306, 2003.
DOI : 10.1007/978-3-540-45203-4_23

S. Guilley, P. Hoogvorst, Y. Mathieu, R. Pacalet, and J. Provost, CMOS structures suitable for secured hardware, Proceedings Design, Automation and Test in Europe Conference and Exhibition, 2004.
DOI : 10.1109/DATE.2004.1269113

[. Guilley, P. Hoogvorst, Y. Mathieu, and R. Pacalet, The ???Backend Duplication??? Method, CHES, pp.383-397, 2005.
DOI : 10.1007/11545262_28

C. Giraud and . Dfa, DFA on AES, Advanced Encryption Standard ? AES Cryptographic Hardware and Embedded Systems ? CHES 1999, pp.27-41, 1999.
DOI : 10.1007/11506447_4

C. Paul, J. Kocher, B. Jaffe, G. Mark, K. J. Karpovsky et al., Differential power analysis Robust protection against fault injection attacks on smart cards implementing the Advanced Encryption Standard Concurrent error detection scheme for fault-based side-channel cryptanalysis of symmetric block ciphers, CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology 2004 International Conference on Dependable Systems and Networks (DSN 2004), pp.388-397, 1999.

T. S. Messerges, A. Ezzat, R. H. Dabbish, S. Sloan-thomas, and . Messerges, Examining smart-card security under the threat of power analysis attacks, Cryptographic Hardware and Embedded Systems ? CHES 2000, pp.541-552, 2000.
DOI : 10.1109/TC.2002.1004593

[. Mitra and E. J. Mccluskey, Which concurrent error detection scheme to choose ?, Proceedings International Test Conference 2000 (IEEE Cat. No.00CH37159), pp.985-994, 2000.
DOI : 10.1109/TEST.2000.894311

G. Tal, F. Malkin, M. Standaert, F. Ors, E. Gürkaynak et al., A comparative cost/security analysis of fault attack countermeasures Power-analysis attack on an asic aes implementation, Cryptography (FDTC 2005) ITCC '04: Proceedings of the International Conference on Information Technology: Coding and Computing. [PQ03] Gilles Piret and Jean-Jacques Quisquater. A differential fault attack technique against SPN structures, with application to the AES and Khazad Cryptographic Hardware and Embedded Systems ? CHES 2003, pp.109-123, 2003.

P. Sergei, R. J. Skorobogatov, and . Anderson, Optical fault induction attacks, Cryptographic Hardware and Embedded Systems ? CHES 2002, pp.2-12, 2002.

A. Shamir, Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies, Cryptographic Hardware and Embedded Systems ? CHES 2000, pp.71-77, 2000.
DOI : 10.1007/3-540-44499-8_5