J. Dutertre, A. Mirbaha, D. Naccache, A. Ribotta, A. Tria et al., Fault round modification analysis of the advanced encryption standard, International Symposium on Hardware-Oriented Security and Trust, pp.140-145, 2012.
URL : https://hal.archives-ouvertes.fr/emse-00742567

A. Vasselle, H. Thiebeauld, Q. Maouhoub, A. Morisset, and S. Ermeneux, Laser-induced fault injection on smartphone bypassing the secure boot, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.41-48, 2017.

A. Sarafianos, C. Roscian, J. Dutertre, M. Lisart, and A. Tria, Electrical modeling of the photoelectric effect induced by a pulsed laser applied to an sram cell, Microelectronics Reliability, vol.53, issue.9, pp.1300-1305, 2013.
URL : https://hal.archives-ouvertes.fr/emse-01100724

J. Dutertre, V. Beroulle, P. Candelier, S. D. Castro, L. Faber et al., Laser fault injection at the CMOS 28 nm technology node: An analysis of the fault model, 2018.
URL : https://hal.archives-ouvertes.fr/emse-01856008

E. Trichina and R. Korkikyan, Multi fault laser attacks on protected CRT-RSA, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.75-86, 2010.

M. S. Kelly, K. Mayes, and J. F. Walker, Characterising a CPU fault attack model via run-time data analysis, International Symposium on Hardware Oriented Security and Trust, pp.79-84, 2017.

O. M. Guillen, M. Gruber, and F. D. Santis, Low-cost setup for localized semi-invasive optical fault injection attacks -how low can we go, In International Workshop on Constructive Side-Channel Analysis and Secure Design, vol.10348, pp.207-222, 2017.

D. Boneh, R. A. Demillo, and R. J. Lipton, On the importance of eliminating errors in cryptographic computations, Journal of Cryptology, vol.14, issue.2, pp.101-119, 2001.

H. Choukri and M. Tunstall, Round reduction using faults, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.13-24, 2005.

C. H. Kim and J. Quisquater, Fault attacks for CRT based RSA: new attacks, new results, and new countermeasures, Information Security Theory and Practices, vol.4462, pp.215-228, 2007.

J. Schmidt and C. Herbst, A practical fault attack on square and multiply, International Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.53-58, 2008.

J. G. Van-woudenberg, M. F. Witteman, and F. Menarini, Practical optical fault injection on secure microcontrollers, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.91-99, 2011.

A. Dehbaoui, J. Dutertre, B. Robisson, and A. Tria, Electromagnetic transient faults injection on a hardware and a software implementations of AES, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.7-15, 2012.
URL : https://hal.archives-ouvertes.fr/emse-00742639

J. Balasch, B. Gierlichs, and I. Verbauwhede, An in-depth and black-box characterization of the effects of clock glitches on 8-bit mcus, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.105-114, 2011.

J. Breier, D. Jap, and C. Chen, Laser profiling for the backside fault attacks: With a practical laser skip instruction attack on AES, Workshop on Cyber-Physical System Security, pp.99-103, 2015.

N. Selmane, S. Guilley, and J. Danger, Practical setup time violation attacks on AES, European Dependable Computing Conference, pp.91-96, 2008.

T. Korak and M. Hoefler, On the effects of clock and power supply tampering on two microcontroller platforms, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.8-17, 2014.

S. K. Bukasa, R. Lashermes, J. Lanet, and A. Legay, Let's shock our iot's heart: Armv7-m under (fault) attacks, International Conference on Availability, vol.33, pp.1-33, 2018.

N. Timmers, A. Spruyt, and M. Witteman, Controlling PC on ARM using fault injection, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.25-35, 2016.

N. Moro, A. Dehbaoui, K. Heydemann, B. Robisson, and E. Encrenaz, Electromagnetic fault injection: Towards a fault model on a 32-bit microcontroller, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.77-88, 2013.
URL : https://hal.archives-ouvertes.fr/emse-00871218

L. Rivière, Z. Najm, P. Rauzy, J. Danger, J. Bringer et al., High precision fault injections on the instruction cache of armv7-m architectures, International Symposium on Hardware Oriented Security and Trust, pp.62-67, 2015.

A. Barenghi, G. Bertoni, E. Parrinello, and G. Pelosi, Low voltage fault attacks on the RSA cryptosystem, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.23-31, 2009.

S. Ordas, L. Guillaume-sage, and P. Maurine, Electromagnetic fault injection: The curse of flip-flops, Journal of Cryptographic Engineering, vol.7, issue.3, pp.183-197, 2017.
URL : https://hal.archives-ouvertes.fr/lirmm-01430913

S. P. Skorobogatov and R. J. Anderson, Optical fault induction attacks, International Workshop on Cryptographic Hardware and Embedded Systems, vol.2523, pp.2-12, 2002.

S. Skorobogatov, Flash memory 'bumping' attacks, Cryptographic Hardware and Embedded Systems, vol.6225, pp.158-172, 2010.

, Optical fault masking attacks, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.23-29, 2010.

F. Cai, G. Bai, H. Liu, and X. Hu, Optical fault injection attacks for flash memory of smartcards, International Conference on Electronics Information and Emergency Communication, pp.46-50, 2016.

O. Colin, Z. Flynn, and . Chen, Chipwhisperer: An open-source platform for hardware embedded security research, International Workshop on Constructive Side-Channel Analysis and Secure Design, vol.8622, pp.243-260, 2014.

L. Dureuil, G. Petiot, M. Potet, T. Le, A. Crohen et al., FISSC: A fault injection and simulation secure collection, International Conference on Computer Safety, Reliability, and Security, vol.9922, pp.3-11, 2016.

P. C. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Annual International Cryptology Conference, vol.1666, pp.388-397, 1999.

J. Daemen and V. Rijmen, The Design of Rijndael: AES -The Advanced Encryption Standard, 2002.

C. Roscian, A. Sarafianos, J. Dutertre, and A. Tria, Fault model analysis of laser-induced faults in SRAM memory cells, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.89-98, 2013.
URL : https://hal.archives-ouvertes.fr/emse-01109133

J. Blömer and J. Seifert, Fault based cryptanalysis of the advanced encryption standard (AES), International Conference on Financial Cryptography, vol.2742, pp.162-181, 2003.