R. Anderson and M. Kuhn, Tamper Resistance a Cautionary Note The Second USENIX Workshop on Electronic Commerce Proceedings, 1996.

J. C. Bajard and N. Mrabet, Pairing in cryptography: an arithmetic point de view, Advanced Signal Processing Algorithms, Architectures, and Implementations XVI, part of SPIE, 2007.

D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, Crypto 2001, pp.213-229, 2001.

E. Brier and M. Joye, Fast Point Multiplication on Elliptic Curves through Isogenies, AAECC 2003, p.4350, 2003.
DOI : 10.1007/3-540-44828-4_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

D. Boneh, R. Demillo, and R. Lipton, On the importance of checking cryptographic protocols faults Advances in Cryptology Eurocrypt, Lecture Notes in Comput. Sci, vol.1233, p.3751, 1997.

H. Cohen and G. Frey, Handbook of elliptic and hyperelliptic curve cryptography, Discrete Math. Appl, vol.20051020, 2006.
DOI : 10.1201/9781420034981

B. Yang, K. Wu, and R. Karri, Scan Based Side Channel Attack on Dedicated Hardware Implementation of Data Encryption Standard Test Conference, pp.339-344, 2004.

H. Edwards, A normal Form for Elliptic Curve Bulletin of the, 2007.

D. H. Habing, The Use of Lasers to Simulate Radiation-Induced Transients in Semiconductor Devices and Circuits, IEEE Transactions On Nuclear Science, vol.39, pp.1647-1653, 1992.

N. Koblitz and A. J. Menezes, Pairing-Based Cryptography at High Security Levels, Proceedings of the Tenth IMA International Conference on Cryptography and Coding, pp.13-36, 2005.
DOI : 10.1007/11586821_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

F. J. Macwilliams and N. J. Sloane, The Theory of Error-Correcting Codes II North-Holland Mathematical Library, 1998.

A. Menezes, An introduction to pairing-based cryptography Notes from lectures given in Santander, Spain, 2005.

V. Miller, The Weil pairing and its ecient calculation, Journal of Cryptology, vol.17, pp.235-261, 2004.

P. Dan and V. Frederik, Fault and Side Channel Attacks on Pairing based Cryptography, IEEE Transactions on Computers, vol.55, issue.9, pp.1075-1080, 2006.

A. Shamir, Identity Based Cryptosystems and Signature Schemes Advances in Cryptology Crypto '84, LNCS, vol.196, pp.47-53, 1984.

C. Whelan and M. Scott, Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?, Lecture Notes in Computer Science, vol.4341, pp.99-114
DOI : 10.1007/11958239_7

C. Whelan and M. Scott, The Importance of the Final exponentiation in Pairings when considering Fault Attacks Lecture Notes in Computer Science, 2007.