Breaking Public Key Cryptosystems an Tamper Resistance Devices in the Presence of Transient Fault, 5th Security Protocols Workshop, pp.115-124, 1997. ,
The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, vol.94, issue.2, pp.370-382, 2006. ,
DOI : 10.1109/JPROC.2005.862424
New Threat Model Breaks Crypto Codes. Press Release, 1996. ,
Differential fault analysis of secret key cryptosystems, Advances in Cryptology ? CRYPTO '97, pp.513-525, 1997. ,
DOI : 10.1007/BFb0052259
On the Importance of Checking Cryptographic Protocols for Faults, Advances in Cryptology ? EUROCRYPT '97, pp.37-51, 1997. ,
DOI : 10.1007/3-540-69053-0_4
Fault Attacks on NESSIE Signature and Identification Schemes, NESSIE, 2002. ,
Fault Attacks on Signature Schemes, Information Security and Privacy -9th Australasian Conference ? ACISP 2004, pp.478-491, 2004. ,
DOI : 10.1007/978-3-540-27800-9_41
A Survey on Fault Attacks, Smart Card Research and Advanced Applications VI ? CARDIS 2004, pp.159-176, 2004. ,
DOI : 10.1007/1-4020-8147-2_11
Chinese Remaindering Based Cryptosystems in the Presence of Faults, Journal of Cryptology, vol.12, issue.4, pp.241-245, 1999. ,
DOI : 10.1007/s001459900055
RSA-type signatures in the presence of transient faults, Cryptography and Coding, pp.155-160, 1997. ,
DOI : 10.1007/BFb0024460
Memo on RSA Signature Generation in the Presence of Faults, 1996. ,
An overview of the XTR public key system, Public Key Cryptography and Computational Number Theory, pp.151-180, 2000. ,
DOI : 10.1515/9783110881035.151
Experimenting with Faults, Lattices and the DSA, Public Key Cryptography ? PKC 2005, pp.16-28, 2005. ,
DOI : 10.1007/978-3-540-30580-4_3
A Diagonal Fault Attack on the Advanced Encryption Standard, Cryptology ePrint Archive Report, vol.581, 2009. ,
Efficient Identification and Signatures for Smart Cards, Advances in Cryptology ? CRYPTO '89, pp.239-251, 1989. ,