A. J. Menezes, P. C. Van-oorschot, and S. C. Vanstone, Handbook of Applied Cryptography, 1997.
DOI : 10.1201/9781439821916

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.99.2838

. Whelan, The sorcerer's apprentice guide to fault attacks, First Workshop on Fault Detection and Tolerance in Cryptography ? FDTC 2004

P. Montgomery, Modular multiplication without trial division, Mathematics of Computation, vol.44, issue.170, 1995.
DOI : 10.1090/S0025-5718-1985-0777282-X

R. J. Dan-boneh and R. Demillo, On the Importance of Checking Cryptographic Protocols for Faults, Advances in Cryptology, Proc. Eurocrypt, pp.37-51, 1997.

E. Biham, A. Shamir, and C. Giraud, Differential fault analysis of secret key cryptosystems, Advances in Cryptology ? CRYPTO Advanced Encryption Standard ? AES of Lecture Notes in Computer Science, pp.513-525, 1997.
DOI : 10.1007/BFb0052259

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.2571

G. Piret, J. Quisquater, G. Letourneux, and O. Vivilo, A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad, Cryptographic Hardware and Embedded Systems ? CHES Applied Cryptography and Network Security ? ACNS of Lecture Notes in Computer Science, pp.77-88, 2003.
DOI : 10.1007/978-3-540-45238-6_7

]. A. Moradi, M. T. Manzuri-shalmani, M. Salmasizadeh, and M. Joye, A Generalized Method of Differential Fault Attack Against AES Checking before output may not be enough against fault-based cryptanalysis, Cryptographic Hardware and Embedded Systems ? CHES, pp.91-100967, 2000.

J. Blömer, J. Choukri, M. Tunstall, G. Bertoni, L. Breveglieri et al., Fault based cryptanalysis of the Advanced Encryption Standard Round reduction using faults Designing Resistant Circuits against Malicious Faults Injection Using Asynchronous Logic An Efficient Hardware-Based Fault Diagnosis Scheme for AES: Performance and Cost, the proc. of DFT, pp.162-181, 2003.

]. R. Karri, K. Wu, P. Mishra, and Y. Kim, Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.21, issue.12, pp.1509-1517, 2002.
DOI : 10.1109/TCAD.2002.804378

F. Lima, L. Carro, and R. Reis, Designing fault tolerant systems into SRAM-based FPGAs, Proceedings of the 40th conference on Design automation , DAC '03, pp.650-655, 2003.
DOI : 10.1145/775832.775997

S. Guilley and P. Hoogvorst, The Proof by 2M-1: A Low-Cost Method to Check Arithmetic Computations, SEC 2005, 2005.
DOI : 10.1007/0-387-25660-1_39

O. Faurax, L. Freund, A. Tria, T. Muntean, and F. Bancel, A generic method for fault injection in circuits, 2006 6th International Workshop on System on Chip for Real Time Applications, pp.211-214
DOI : 10.1109/IWSOC.2006.348238

URL : https://hal.archives-ouvertes.fr/emse-00504714

J. Francq, P. Manet, and J. Rigaud, Material Emulation of Faults On Cryptoprocessors, Proc. of Sophia Antipolis forum of MicroElectronics, 2006.
URL : https://hal.archives-ouvertes.fr/emse-00494246