A5 (was: Hacking digital phones) Newsgroup Communication, 1994. ,
Differential fault analysis of secret key cryptosystems, CRYPTO, pp.513-525, 1997. ,
DOI : 10.1007/BFb0052259
An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm, ICISS, pp.143-155, 2007. ,
DOI : 10.1007/978-3-540-77086-2_11
The Block Cipher Rijndael, CARDIS, pp.277-284, 1998. ,
DOI : 10.1007/10721064_26
SCARE of the DES, ACNS (2005), pp.393-406 ,
DOI : 10.1007/11496137_27
Defeating Any Secret Cryptography with SCARE Attacks, LATINCRYPT, pp.273-293, 2010. ,
DOI : 10.1007/978-3-642-14712-8_17
The sorcerer's apprentice guide to fault attacks ,
La cryptographie militaire, Journal des sciences militaires IX, pp.5-83, 1883. ,
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, pp.104-113 ,
DOI : 10.1007/3-540-68697-5_9
Differential Power Analysis, In CRYPTO Lecture Notes in Computer Science, vol.1666, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad, Cryptographic Hardware and Embedded Systems -CHES 2003, pp.77-88, 2003. ,
DOI : 10.1007/978-3-540-45238-6_7
The DPA contest, 2008. ,