D. G. Abraham, G. M. Dolan, G. P. Double, and J. V. Stevens, Transaction Security System, IBM Systems Journal, vol.30, issue.2, pp.206-229, 1991.
DOI : 10.1147/sj.302.0206

R. Anderson and M. Kuhn, Tamper Resistance ? a Cautionary Note, The Second USENIX Workshop on Electronic Commerce Proceedings, pp.1-11, 1996.

J. C. Bajard and N. Mrabet, Pairing in cryptography: an arithmetic point de view, Advanced Signal Processing Algorithms, Architectures, and Implementations XVI, p.part of SPIE, 2007.

D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, CRYPTO 2001, pp.213-229, 2001.

E. Brier and M. Joye, Fast Point Multiplication on Elliptic Curves through Isogenies, AAECC 2003, pp.43-50, 2003.
DOI : 10.1007/3-540-44828-4_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.6968

D. Boneh, R. Demillo, and R. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, EUROCRYPT 1997, pp.37-51, 1997.
DOI : 10.1007/3-540-69053-0_4

H. Cohen and G. Frey, Handbook of elliptic and hyperelliptic curve cryptography, Discrete Math. Appl. Chapman & Hall/CRC Boca Raton, vol.20051020, 2006.
DOI : 10.1201/9781420034981

B. Yang, K. Wu, and R. Karri, Scan Based Side Channel Attack on Dedicated Hardware Implementation of Data Encryption Standard, Test Conference, pp.339-344, 2004.

H. Edwards, A normal form for elliptic curves, Bulletin of the American Mathematical Society, vol.44, issue.03, 2007.
DOI : 10.1090/S0273-0979-07-01153-6

D. H. Habing, The Use of Lasers to Simulate Radiation-Induced Transients in Semiconductor Devices and Circuits, IEEE Transactions On Nuclear Science, vol.39, pp.1647-1653, 1992.

S. Ionica and A. Joux, Faster Pairing Computation on Edwards Curves, 2008.

N. Koblitz and A. J. Menezes, Pairing-Based Cryptography at High Security Levels, Cryptography and Coding 2005, pp.13-36, 2005.
DOI : 10.1007/11586821_2

F. J. Macwilliams and N. J. Sloane, The Theory of Error-Correcting Codes II, 1998.

A. Menezes, An introduction to pairing-based cryptography. Notes from lectures given in Santander, 2005.

V. Miller, The Weil Pairing, and Its Efficient Calculation, Journal of Cryptology, vol.17, issue.4, pp.235-261, 2004.
DOI : 10.1007/s00145-004-0315-8

P. Dan and V. Frederik, Fault and Side Channel Attacks on Pairing based Cryptography, IEEE Transactions on Computers, vol.55, issue.9, pp.1075-1080, 2006.

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, CRYPTO 1984, pp.47-53, 1985.
DOI : 10.1007/3-540-39568-7_5

C. Whelan and M. Scott, Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?, VIETCRYPT 2006, pp.99-114, 2006.
DOI : 10.1007/11958239_7

C. Whelan, M. Scott, T. Takagi, T. Okamoto, and E. Okamoto, The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks, Pairing 2007, pp.225-246, 2007.
DOI : 10.1007/978-3-540-73489-5_12