When Clocks Fail: On Critical Paths and Clock Faults, CARDIS. Lecture Notes in Computer Science, vol.6035, pp.182-193, 2010. ,
DOI : 10.1007/978-3-642-12510-2_13
URL : https://hal.archives-ouvertes.fr/emse-00505344
Synthesis of Fault Attacks on Cryptographic Implementations, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, p.436, 2014. ,
DOI : 10.1145/2660267.2660304
URL : https://hal.archives-ouvertes.fr/hal-01094034
Correlation Power Analysis with a Leakage Model, CHES. Lecture Notes in Computer Science, vol.3156, pp.16-29, 2004. ,
DOI : 10.1007/978-3-540-28632-5_2
Comprehensive survey on distance/similarity measures between probability density functions, International Journal of Mathematical Models and Methods in Applied Sciences, vol.1, issue.4, pp.300-307, 2007. ,
Template Attacks, CHES '02: Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems, pp.13-28, 2002. ,
DOI : 10.1007/3-540-36400-5_3
How to Certify the Leakage of a Chip?, Lecture Notes in Computer Science, vol.8441, pp.459-476, 2014. ,
DOI : 10.1007/978-3-642-55220-5_26
DFA on AES, Lecture Notes in Computer Science, vol.3373, pp.27-41, 2005. ,
DOI : 10.1007/11506447_4
Differential Power Analysis, Lecture Notes in Computer Science, vol.1666, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
A DFA on AES Based on the Entropy of Error Distributions, 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.34-43, 2012. ,
DOI : 10.1109/FDTC.2012.18
URL : https://hal.archives-ouvertes.fr/emse-00742642
Exploring the Relations between Fault Sensitivity and Power Consumption, COSADE. Lecture Notes in Computer Science, vol.7864, pp.137-153, 2013. ,
DOI : 10.1007/978-3-642-40026-1_9
Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts, FPS. Lecture Notes in Computer Science, vol.8352, pp.272-287, 2013. ,
DOI : 10.1007/978-3-319-05302-8_17
Fault Sensitivity Analysis, Cryptographic Hardware and Embedded Systems, pp.320-334, 2010. ,
DOI : 10.1007/978-3-642-15031-9_22
Physically observable cryptography. IACR Cryptology ePrint Archive, 2003. ,
DOI : 10.1007/978-3-540-24638-1_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.6299
Differential Behavioral Analysis, Cryptographic Hardware and Embedded Systems (CHES), pp.413-426, 2007. ,
DOI : 10.1007/978-3-540-74735-2_28
URL : https://hal.archives-ouvertes.fr/emse-00481468
Combined Fault and Side-Channel Attack on Protected Implementations of AES, 2011. ,
DOI : 10.1007/978-3-642-27257-8_5
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Lecture Notes in Computer Science, vol.28, issue.2, pp.443-461, 2009. ,
DOI : 10.1007/978-3-540-85053-3_26
Mutual Information Analysis: How, When and Why?, CHES. Lecture Notes in Computer Science, vol.5747, pp.429-443, 2009. ,
DOI : 10.1007/978-3-642-04138-9_30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.178.6511