J. B. Almeida, M. Barbosa, G. Barthe, and F. Dupressoir, Certified computer-aided cryptography, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1217-1230, 2013.
DOI : 10.1145/2508859.2516652

R. J. Anderson and M. G. Kuhn, Low cost attacks on tamper resistant devices, Security Protocols Workshop, pp.125-136, 1997.
DOI : 10.1007/BFb0028165

C. Aumüller, P. Bier, W. Fischer, P. Hofreiter, and J. Seifert, Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures, CHES 2002, pp.260-275, 2002.
DOI : 10.1007/3-540-36400-5_20

G. Barthe, F. Dupressoir, P. Fouque, B. Grégoire, M. Tibouchi et al., Making RSA-PSS provably secure against non-random faults. Cryptology ePrint Archive, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01094057

G. Barthe, B. Grégoire, S. Heraud, and S. Z. Béguelin, Computer-Aided Security Proofs for the Working Cryptographer, LNCS, vol.6841, pp.71-90, 2011.
DOI : 10.1007/978-3-642-22792-9_5

URL : https://hal.archives-ouvertes.fr/hal-01112075

J. Blömer, M. Otto, and J. Seifert, A new CRT-RSA algorithm secure against Bellcore attacks, ACM Conference on Computer and Communications Security, pp.311-320, 2003.

D. Boneh, R. A. Demillo, and R. J. Lipton, On the Importance of Eliminating Errors in Cryptographic Computations, Journal of Cryptology, vol.14, issue.2, pp.101-119, 2001.
DOI : 10.1007/s001450010016

A. Boscher, H. Handschuh, and E. Trichina, Fault resistant RSA signatures: Chinese remaindering in both directions, IACR Cryptology ePrint Archive, p.38, 2010.

R. Canetti and S. Goldwasser, An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract), EUROCRYPT'99, pp.90-106, 1999.
DOI : 10.1007/3-540-48910-X_7

M. Christofi, B. Chetali, L. Goubin, and D. Vigilant, Formal verification of a CRT-RSA implementation against fault attacks, Journal of Cryptographic Engineering, vol.2009, issue.3, pp.157-167, 2013.
DOI : 10.1007/s13389-013-0049-3

M. Ciet and M. Joye, Practical fault countermeasures for Chinese remaindering based cryptosystems, pp.124-131, 2005.

J. Coron, C. Giraud, N. Morin, G. Piret, and D. Vigilant, Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.89-96, 2010.
DOI : 10.1109/FDTC.2010.9

J. Coron, A. Joux, I. Kizhvatov, D. Naccache, and P. Paillier, Fault Attacks on RSA Signatures with Partially Unknown Messages, CHES, pp.444-456, 2009.
DOI : 10.1007/978-3-642-04138-9_31

J. Coron and A. Mandal, PSS Is Secure against Random Fault Attacks, LNCS, vol.5912, pp.653-666, 2009.
DOI : 10.1007/978-3-642-10366-7_38

URL : http://orbilu.uni.lu/handle/10993/12503

J. Coron and A. Mandal, PSS Is Secure against Random Fault Attacks, ASIACRYPT, pp.653-666, 2009.
DOI : 10.1007/978-3-642-10366-7_38

URL : http://orbilu.uni.lu/handle/10993/12503

J. Coron, D. Naccache, and M. Tibouchi, Fault Attacks Against emv Signatures, CT-RSA, pp.208-220, 2010.
DOI : 10.1007/978-3-642-11925-5_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.4408

P. Fouque, N. Guillermin, D. Leresteux, M. Tibouchi, and J. Zapalowicz, Attacking RSA???CRT signatures with faults on montgomery multiplication, Journal of Cryptographic Engineering, vol.44, issue.6, pp.59-72, 2013.
DOI : 10.1007/s13389-013-0050-x

URL : https://hal.archives-ouvertes.fr/hal-01094316

C. Giraud, An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis, IEEE Transactions on Computers, vol.55, issue.9, pp.1116-1120, 2006.
DOI : 10.1109/TC.2006.135

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.667.9807

D. Le, M. Rivain, and C. H. Tan, On Double Exponentiation for Securing RSA against Fault Analysis, CT-RSA 2014, pp.152-168
DOI : 10.1007/978-3-319-04852-9_8

H. L. Montgomery, Topics in multiplicative number theory, 1971.
DOI : 10.1007/BFb0060851

P. L. Montgomery, Modular multiplication without trial division, Mathematics of Computation, vol.44, issue.170, pp.519-521, 1985.
DOI : 10.1090/S0025-5718-1985-0777282-X

N. Moro, K. Heydemann, E. Encrenaz, and B. Robisson, Formal verification of a software countermeasure against instruction skip attacks, Journal of Cryptographic Engineering, vol.100, issue.11, pp.1-12, 2014.
DOI : 10.1007/s13389-014-0077-7

URL : https://hal.archives-ouvertes.fr/emse-00869509

P. Rauzy and S. Guilley, A formal proof of countermeasures against fault injection attacks on CRT-RSA, Journal of Cryptographic Engineering, vol.21, issue.2, pp.1-13, 2013.
DOI : 10.1007/s13389-013-0065-3

URL : https://hal.archives-ouvertes.fr/hal-00863914

M. Rivain, Securing RSA against Fault Analysis by Double Addition Chain Exponentiation, LNCS, vol.52, issue.4, pp.459-480, 2009.
DOI : 10.1109/TC.2003.1190587

A. Shamir, Improved method and apparatus for protecting public key schemes from timing and fault attacks, pp.52319-52320, 1998.

E. Trichina and R. Korkikyan, Multi Fault Laser Attacks on Protected CRT-RSA, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography
DOI : 10.1109/FDTC.2010.14

D. Vigilant, RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks, LNCS, vol.5154, pp.130-145, 2008.
DOI : 10.1007/978-3-540-85053-3_9

S. Yen, S. Moon, and J. Ha, Permanent Fault Attack on the Parameters of RSA with CRT, ACISP 03, pp.285-296, 2003.
DOI : 10.1007/3-540-45067-X_25