On the importance of eliminating errors in cryptographic computations, vol.14, pp.101-119 ,
Optical and em faultattacks on crt-based rsa: Concrete results, Austrian Workhop on Microelectronics, pp.61-67 ,
Inducing local timing fault through EM injection, Proceedings of the Design Automation Conference, pp.1-6 ,
EM injection: Fault model and locality, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.3-13 ,
URL : https://hal.archives-ouvertes.fr/lirmm-01319078
Electromagnetic transient faults injection on a hardware and a software implementations of AES, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.7-15 ,
URL : https://hal.archives-ouvertes.fr/emse-00742639
Electromagnetic fault injection: Towards a fault model on a 32-bit microcontroller, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.77-88 ,
URL : https://hal.archives-ouvertes.fr/emse-00871218
All the AES you need on cortex-m3 and M4, Selected Areas in Cryptography, vol.10532, pp.180-194 ,
High precision fault injections on the instruction cache of armv7-m architectures, International Symposium on Hardware Oriented Security and Trust, pp.62-67 ,
Methodology for em fault injection: Charge-based fault model, Design, Automation Test in Europe Conference Exhibition, pp.256-259 ,
Studying EM pulse effects on superscalar microarchitectures at ISA level ,
URL : https://hal.archives-ouvertes.fr/hal-02102373
Fault-assisted side-channel analysis of masked implementations, International Symposium on Hardware Oriented Security and Trust, pp.57-64 ,
BADFET: defeating modern secure boot using second-order pulsed electromagnetic fault injection, USENIX Workshop on Offensive Technologies ,
Differential fault analysis of secret key cryptosystems, Advances in Cryptology -CRYPTO '97, vol.1294, pp.513-525 ,
From code review to fault injection attacks: Filling the gap using fault model inference, International Conference on Smart Card Research and Advanced Applications, vol.9514, pp.107-124 ,
Shedding too much light on a microcontroller's firmware protection, USENIX Workshop on Offensive Technologies ,
Persistent fault analysis on block ciphers, vol.2018, pp.150-172 ,