C. Paul, J. Kocher, B. Jaffe, and . Jun, Differential Power Analysis, CRYPTO, pp.388-397, 1999.

E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, CHES, pp.16-29, 2004.
DOI : 10.1007/978-3-540-28632-5_2

E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, CRYPTO, pp.513-525, 1997.
DOI : 10.1007/BFb0052259

Y. Li, K. Sakiyama, S. Gomisawa, T. Fukunaga, J. Takahashi et al., Fault Sensitivity Analysis, CHES, pp.320-334, 2010.
DOI : 10.1007/978-3-642-15031-9_22

B. Robisson and P. Manet, Differential Behavioral Analysis, CHES, pp.413-426, 2007.
DOI : 10.1007/978-3-540-74735-2_28

URL : https://hal.archives-ouvertes.fr/emse-00481468

S. Micali and L. Reyzin, Physically Observable Cryptography, Cryptology ePrint Archive Report, vol.120, 2003.
DOI : 10.1007/978-3-540-24638-1_16

S. Mangard, E. Oswald, and F. Standaert, One for All - All for One: Unifying Standard DPA Attacks, Cryptology ePrint Archive Report, vol.449, 2009.

F. Standaert, F. Koeune, and W. Schindler, How to Compare Profiled Side-Channel Attacks?, Applied Cryptography and Network Security, pp.485-498, 2009.
DOI : 10.1007/978-3-642-01957-9_30

F. Standaert, G. Tal, M. Malkin, and . Yung, A formal practiceoriented model for the analysis of side-channel attacks. IACR e-print archive, 2006.

F. Standaert, T. Malkin, G. Moti, and . Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Advances in Cryptology- Eurocrypt, pp.443-461, 2009.
DOI : 10.1007/978-3-540-85053-3_26

S. Mangard, E. Oswald, and F. Standaert, One for all ??? all for one: unifying standard differential power analysis attacks, IET Information Security, vol.5, issue.2, pp.100-110, 2011.
DOI : 10.1049/iet-ifs.2010.0096

M. Abdelaziz, S. Elaabid, and . Guilley, Practical improvements of profiled side-channel attacks on a hardware crypto-accelerator, Progress in Cryptology? AFRICACRYPT 2010, pp.243-260, 2010.

C. Whitnall, E. Oswald, and F. Standaert, The Myth of Generic DPA???and the Magic of Learning, IACR Cryptology ePrint Archive, p.256, 2012.
DOI : 10.1007/978-3-319-04852-9_10

I. Verbauwhede, D. Karaklajic, and J. Schmidt, The Fault Attack Jungle - A Classification Model to Guide You, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.3-8, 2011.
DOI : 10.1109/FDTC.2011.13

A. Moradi, T. Mohammad, M. Shalmani, and . Salmasizadeh, A Generalized Method of Differential Fault Attack Against AES Cryptosystem, Cryptographic Hardware and Embedded Systems-CHES 2006, pp.91-100, 2006.
DOI : 10.1007/11894063_8

K. Sakiyama, Y. Li, M. Iwamoto, and K. Ohta, Information-Theoretic Approach to Optimal Differential Fault Analysis, IEEE Transactions on Information Forensics and Security, vol.7, issue.1, pp.109-120, 2012.
DOI : 10.1109/TIFS.2011.2174984

R. Lashermes, G. Reymond, J. Dutertre, and J. Fournier, Bruno Robisson and Assia Tria. A DFA on AES Based on the Entropy of Error Distributions, FDTC, pp.34-43, 2012.

B. Gierlichs, L. Batina, and P. Tuyls, Mutual Information Analysis - A Universal Differential Side-Channel Attack, IACR Cryptology ePrint Archive, p.198, 2007.

W. Carolyn, O. Elisabeth, and M. Luke, An exploration of the kolmogorov-smirnov test as a competitor to mutual information analysis, Smart Card Research and Advanced Applications, pp.234-251, 2011.

L. Batina, B. Gierlichs, and K. Lemke-rust, Differential Cluster Analysis, Cryptographic Hardware and Embedded Systems-CHES 2009, pp.112-127, 2009.
DOI : 10.1007/978-3-642-04138-9_9

Y. Souissi, M. Nassar, and S. Guilley, Jean-Luc Danger and Florent Flament. First Principal Components Analysis: A New Side Channel Distinguisher, ICISC, pp.407-419, 2010.

S. Balakrishnama and A. Ganapathiraju, Linear Discriminant Analysis -A Brief Tutorial. Institute for Signal and Information Processing, 1998.

H. Maghrebi, O. Rioul, S. Guilley, and J. Danger, Comparison between Side-Channel Analysis Distinguishers, ICICS, pp.331-340, 2012.
DOI : 10.1007/978-3-642-34129-8_30

A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache, Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures, Proceedings of the IEEE, pp.3056-3076, 2012.
DOI : 10.1109/JPROC.2012.2188769

URL : https://hal.archives-ouvertes.fr/hal-01110932

A. Dehbaoui, Analyse Sécuritaire desÉmanationsÉlectromagnétiquesdes´desÉmanationsdesÉmanations´desÉmanationsÉlectromagnétiques des Circuits Intégrés, 2011.

L. Zussa and J. Dutertre, JessyClédì ere and Assia Tria. Power supply glitch induced faults on FPGA: An in-depth analysis of the injection mechanism, IOLTS, pp.110-115, 2013.

L. Zussa, J. Dutertre, J. Ere, and B. Robisson, Analysis of the fault injection mechanism related to negative and positive power supply glitches using an on-chip voltmeter, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.130-135, 2014.
DOI : 10.1109/HST.2014.6855583

URL : https://hal.archives-ouvertes.fr/emse-01099010

C. Giraud and . Dfa, DFA on AES, Advanced Encryption Standard -AES, pp.27-41, 2005.
DOI : 10.1007/11506447_4

S. Guilley, L. Sauvage, and J. Micolod, Denis Réal and Frédéric Valette. Defeating any secret cryptography with SCARE attacks, Progress in Cryptology? LATINCRYPT 2010, pp.273-293, 2010.

M. Manuel-san-pedro, S. Soos, and . Guilley, FIRE: fault injection for reverse engineering. Information Security Theory and Practice, Security and Privacy of Mobile Devices in Wireless Communication, pp.280-293, 2011.