R. Anderson, A5 (was: Hacking digital phones) Newsgroup Communication, 1994.

E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, CRYPTO, pp.513-525, 1997.
DOI : 10.1007/BFb0052259

C. Clavier, An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm, ICISS, pp.143-155, 2007.
DOI : 10.1007/978-3-540-77086-2_11

J. Daemen and V. And-rijmen, The Block Cipher Rijndael, CARDIS, pp.277-284, 1998.
DOI : 10.1007/10721064_26

R. Daudigny, H. Ledig, F. Muller, and F. Valette, SCARE of the DES, ACNS (2005), pp.393-406
DOI : 10.1007/11496137_27

S. Guilley, L. Sauvage, J. Micolod, D. Réal, and F. Valette, Defeating Any Secret Cryptography with SCARE Attacks, LATINCRYPT, pp.273-293, 2010.
DOI : 10.1007/978-3-642-14712-8_17

H. B. Hamid, H. Choukri, D. N. Tunstall, and C. Whelan, The sorcerer's apprentice guide to fault attacks

A. Kerckhoffs, La cryptographie militaire, Journal des sciences militaires IX, pp.5-83, 1883.

P. C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, pp.104-113
DOI : 10.1007/3-540-68697-5_9

P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, In CRYPTO Lecture Notes in Computer Science, vol.1666, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

G. Piret and J. Quisquater, A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad, Cryptographic Hardware and Embedded Systems -CHES 2003, pp.77-88, 2003.
DOI : 10.1007/978-3-540-45238-6_7

T. Vlsi-research-group and . Paristech, The DPA contest, 2008.