M. Agoyan, J. M. Dutertre, D. Naccache, B. Robisson, and A. Tria, When Clocks Fail: On Critical Paths and Clock Faults, CARDIS. Lecture Notes in Computer Science, vol.6035, pp.182-193, 2010.
DOI : 10.1007/978-3-642-12510-2_13

URL : https://hal.archives-ouvertes.fr/emse-00505344

G. Barthe, F. Dupressoir, P. A. Fouque, B. Grégoire, and J. C. Zapalowicz, Synthesis of Fault Attacks on Cryptographic Implementations, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, p.436, 2014.
DOI : 10.1145/2660267.2660304

URL : https://hal.archives-ouvertes.fr/hal-01094034

E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, CHES. Lecture Notes in Computer Science, vol.3156, pp.16-29, 2004.
DOI : 10.1007/978-3-540-28632-5_2

S. H. Cha, Comprehensive survey on distance/similarity measures between probability density functions, International Journal of Mathematical Models and Methods in Applied Sciences, vol.1, issue.4, pp.300-307, 2007.

S. Chari, J. R. Rao, P. Rohatgi, B. S. Jr, . Etin-kaya-koç et al., Template Attacks, CHES '02: Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems, pp.13-28, 2002.
DOI : 10.1007/3-540-36400-5_3

F. Durvaux, F. X. Standaert, and N. Veyrat-charvillon, How to Certify the Leakage of a Chip?, Lecture Notes in Computer Science, vol.8441, pp.459-476, 2014.
DOI : 10.1007/978-3-642-55220-5_26

C. Giraud, DFA on AES, Lecture Notes in Computer Science, vol.3373, pp.27-41, 2005.
DOI : 10.1007/11506447_4

P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, Lecture Notes in Computer Science, vol.1666, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

R. Lashermes, G. Reymond, J. M. Dutertre, J. Fournier, B. Robisson et al., A DFA on AES Based on the Entropy of Error Distributions, 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.34-43, 2012.
DOI : 10.1109/FDTC.2012.18

URL : https://hal.archives-ouvertes.fr/emse-00742642

Y. Li, S. Endo, N. Debande, N. Homma, T. Aoki et al., Exploring the Relations between Fault Sensitivity and Power Consumption, COSADE. Lecture Notes in Computer Science, vol.7864, pp.137-153, 2013.
DOI : 10.1007/978-3-642-40026-1_9

Y. Li, Y. Ichi-hayashi, A. Matsubara, N. Homma, T. Aoki et al., Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts, FPS. Lecture Notes in Computer Science, vol.8352, pp.272-287, 2013.
DOI : 10.1007/978-3-319-05302-8_17

Y. Li, K. Sakiyama, S. Gomisawa, T. Fukunaga, J. Takahashi et al., Fault Sensitivity Analysis, Cryptographic Hardware and Embedded Systems, pp.320-334, 2010.
DOI : 10.1007/978-3-642-15031-9_22

S. Micali and L. Reyzin, Physically observable cryptography. IACR Cryptology ePrint Archive, 2003.
DOI : 10.1007/978-3-540-24638-1_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.6299

B. Robisson and P. Manet, Differential Behavioral Analysis, Cryptographic Hardware and Embedded Systems (CHES), pp.413-426, 2007.
DOI : 10.1007/978-3-540-74735-2_28

URL : https://hal.archives-ouvertes.fr/emse-00481468

T. Roche, V. Lomné, and K. Khalfallah, Combined Fault and Side-Channel Attack on Protected Implementations of AES, 2011.
DOI : 10.1007/978-3-642-27257-8_5

F. X. Standaert, T. Malkin, and M. Yung, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Lecture Notes in Computer Science, vol.28, issue.2, pp.443-461, 2009.
DOI : 10.1007/978-3-540-85053-3_26

N. Veyrat-charvillon and F. X. Standaert, Mutual Information Analysis: How, When and Why?, CHES. Lecture Notes in Computer Science, vol.5747, pp.429-443, 2009.
DOI : 10.1007/978-3-642-04138-9_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.178.6511