F. Bao, R. Deng, Y. Han, A. Jeng, A. D. Narasimhalu et al., Breaking Public Key Cryptosystems an Tamper Resistance Devices in the Presence of Transient Fault, 5th Security Protocols Workshop, pp.115-124, 1997.

H. Bar-el, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, vol.94, issue.2, pp.370-382, 2006.
DOI : 10.1109/JPROC.2005.862424

. Bellcore, New Threat Model Breaks Crypto Codes. Press Release, 1996.

E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, Advances in Cryptology ? CRYPTO '97, pp.513-525, 1997.
DOI : 10.1007/BFb0052259

D. Boneh, R. Demillo, and R. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Advances in Cryptology ? EUROCRYPT '97, pp.37-51, 1997.
DOI : 10.1007/3-540-69053-0_4

E. Dottax, Fault Attacks on NESSIE Signature and Identification Schemes, NESSIE, 2002.

C. Giraud and E. Knudsen, Fault Attacks on Signature Schemes, Information Security and Privacy -9th Australasian Conference ? ACISP 2004, pp.478-491, 2004.
DOI : 10.1007/978-3-540-27800-9_41

C. Giraud and H. Thiebeauld, A Survey on Fault Attacks, Smart Card Research and Advanced Applications VI ? CARDIS 2004, pp.159-176, 2004.
DOI : 10.1007/1-4020-8147-2_11

M. Joye, A. Lenstra, and J. Quisquater, Chinese Remaindering Based Cryptosystems in the Presence of Faults, Journal of Cryptology, vol.12, issue.4, pp.241-245, 1999.
DOI : 10.1007/s001459900055

M. Joye, J. Quisquater, F. Bao, and R. Deng, RSA-type signatures in the presence of transient faults, Cryptography and Coding, pp.155-160, 1997.
DOI : 10.1007/BFb0024460

A. Lenstra, Memo on RSA Signature Generation in the Presence of Faults, 1996.

A. Lenstra and E. Verheul, An overview of the XTR public key system, Public Key Cryptography and Computational Number Theory, pp.151-180, 2000.
DOI : 10.1515/9783110881035.151

D. Naccache, P. Nguyen, M. Tunstall, and C. Whelan, Experimenting with Faults, Lattices and the DSA, Public Key Cryptography ? PKC 2005, pp.16-28, 2005.
DOI : 10.1007/978-3-540-30580-4_3

D. Saha, D. Mukhopadhyay, and D. Roychowdhury, A Diagonal Fault Attack on the Advanced Encryption Standard, Cryptology ePrint Archive Report, vol.581, 2009.

C. Schnorr, Efficient Identification and Signatures for Smart Cards, Advances in Cryptology ? CRYPTO '89, pp.239-251, 1989.