Differential Power Analysis, CRYPTO, pp.388-397, 1999. ,
Correlation Power Analysis with a Leakage Model, CHES, pp.16-29, 2004. ,
DOI : 10.1007/978-3-540-28632-5_2
Differential fault analysis of secret key cryptosystems, CRYPTO, pp.513-525, 1997. ,
DOI : 10.1007/BFb0052259
Fault Sensitivity Analysis, CHES, pp.320-334, 2010. ,
DOI : 10.1007/978-3-642-15031-9_22
Differential Behavioral Analysis, CHES, pp.413-426, 2007. ,
DOI : 10.1007/978-3-540-74735-2_28
URL : https://hal.archives-ouvertes.fr/emse-00481468
Physically Observable Cryptography, Cryptology ePrint Archive Report, vol.120, 2003. ,
DOI : 10.1007/978-3-540-24638-1_16
One for All - All for One: Unifying Standard DPA Attacks, Cryptology ePrint Archive Report, vol.449, 2009. ,
How to Compare Profiled Side-Channel Attacks?, Applied Cryptography and Network Security, pp.485-498, 2009. ,
DOI : 10.1007/978-3-642-01957-9_30
A formal practiceoriented model for the analysis of side-channel attacks. IACR e-print archive, 2006. ,
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Advances in Cryptology- Eurocrypt, pp.443-461, 2009. ,
DOI : 10.1007/978-3-540-85053-3_26
One for all ??? all for one: unifying standard differential power analysis attacks, IET Information Security, vol.5, issue.2, pp.100-110, 2011. ,
DOI : 10.1049/iet-ifs.2010.0096
Practical improvements of profiled side-channel attacks on a hardware crypto-accelerator, Progress in Cryptology? AFRICACRYPT 2010, pp.243-260, 2010. ,
The Myth of Generic DPA???and the Magic of Learning, IACR Cryptology ePrint Archive, p.256, 2012. ,
DOI : 10.1007/978-3-319-04852-9_10
The Fault Attack Jungle - A Classification Model to Guide You, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.3-8, 2011. ,
DOI : 10.1109/FDTC.2011.13
A Generalized Method of Differential Fault Attack Against AES Cryptosystem, Cryptographic Hardware and Embedded Systems-CHES 2006, pp.91-100, 2006. ,
DOI : 10.1007/11894063_8
Information-Theoretic Approach to Optimal Differential Fault Analysis, IEEE Transactions on Information Forensics and Security, vol.7, issue.1, pp.109-120, 2012. ,
DOI : 10.1109/TIFS.2011.2174984
Bruno Robisson and Assia Tria. A DFA on AES Based on the Entropy of Error Distributions, FDTC, pp.34-43, 2012. ,
Mutual Information Analysis - A Universal Differential Side-Channel Attack, IACR Cryptology ePrint Archive, p.198, 2007. ,
An exploration of the kolmogorov-smirnov test as a competitor to mutual information analysis, Smart Card Research and Advanced Applications, pp.234-251, 2011. ,
Differential Cluster Analysis, Cryptographic Hardware and Embedded Systems-CHES 2009, pp.112-127, 2009. ,
DOI : 10.1007/978-3-642-04138-9_9
Jean-Luc Danger and Florent Flament. First Principal Components Analysis: A New Side Channel Distinguisher, ICISC, pp.407-419, 2010. ,
Linear Discriminant Analysis -A Brief Tutorial. Institute for Signal and Information Processing, 1998. ,
Comparison between Side-Channel Analysis Distinguishers, ICICS, pp.331-340, 2012. ,
DOI : 10.1007/978-3-642-34129-8_30
Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures, Proceedings of the IEEE, pp.3056-3076, 2012. ,
DOI : 10.1109/JPROC.2012.2188769
URL : https://hal.archives-ouvertes.fr/hal-01110932
Analyse Sécuritaire desÉmanationsÉlectromagnétiquesdes´desÉmanationsdesÉmanations´desÉmanationsÉlectromagnétiques des Circuits Intégrés, 2011. ,
JessyClédì ere and Assia Tria. Power supply glitch induced faults on FPGA: An in-depth analysis of the injection mechanism, IOLTS, pp.110-115, 2013. ,
Analysis of the fault injection mechanism related to negative and positive power supply glitches using an on-chip voltmeter, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.130-135, 2014. ,
DOI : 10.1109/HST.2014.6855583
URL : https://hal.archives-ouvertes.fr/emse-01099010
DFA on AES, Advanced Encryption Standard -AES, pp.27-41, 2005. ,
DOI : 10.1007/11506447_4
Denis Réal and Frédéric Valette. Defeating any secret cryptography with SCARE attacks, Progress in Cryptology? LATINCRYPT 2010, pp.273-293, 2010. ,
FIRE: fault injection for reverse engineering. Information Security Theory and Practice, Security and Privacy of Mobile Devices in Wireless Communication, pp.280-293, 2011. ,