P. Andriotis, T. Tryfonas, G. Oikonomou, Y. , and C. , A pilot study on the security of pattern screenlock methods and soft side channel attacks, Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, pp.1-6, 2013.

C. Archambeau, E. Peeters, F. Standaert, and J. Quisquater, Template Attacks in Principal Subspaces, Cryptographic Hardware and Embedded Systems-CHES 2006, pp.1-14
DOI : 10.1007/11894063_1

J. Bezanzon, S. Karpinski, V. Shah, and A. Edelman, Julia: A Fast Dynamic Language for Technical Computing

E. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, Cryptographic Hardware and Embedded Systems-CHES, pp.16-29, 2004.
DOI : 10.1007/978-3-540-28632-5_2

S. Chari, J. R. Rao, R. , and P. , Template Attacks, Cryptographic Hardware and Embedded Systems-CHES 2002, pp.13-28, 2003.
DOI : 10.1007/3-540-36400-5_3

O. Choudary and M. G. Kuhn, Efficient template attacks, Smart Card Research and Advanced Applications, pp.253-270, 2014.

M. A. Elaabid, S. Guilley, and P. Hoogvorst, Template Attacks with a Power Model, IACR Cryptology ePrint Archive, p.443, 2007.

L. Folkman, The use of a power analysis for influencing PIN verification on cryptographic smart card. Bakalásk práce, Masarykova univerzita, Fakulta in- formatiky, 2007.

F. Kune, D. Kim, and Y. , Timing attacks on pin input devices, Proceedings of the 17th ACM conference on Computer and communications security, pp.678-680, 2010.

P. C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Advances in Cryptology?CRYPTO'96, pp.104-113, 1996.
DOI : 10.1007/3-540-68697-5_9

Y. Linge, C. Dumas, L. Lacroix, and S. , Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis, Constructive Side-Channel Analysis and Secure Design -COSADE 2014, pp.199-213
DOI : 10.1007/978-3-319-10175-0_14

S. Mangard, A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion, Information Security and Cryptology?ICISC, pp.343-358, 2002.
DOI : 10.1007/3-540-36552-4_24

S. Mangard, E. Oswald, and T. Popp, Power analysis attacks: Revealing the secrets of smart cards, 2008.

S. Mangard, E. Oswald, and T. Popp, Power analysis attacks: Revealing the secrets of smart cards, 2008.

N. Moro, A. Dehbaoui, K. Heydemann, B. Robisson, and E. Encrenaz, Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.77-88
DOI : 10.1109/FDTC.2013.9

URL : https://hal.archives-ouvertes.fr/emse-00871218

E. Oswald and S. Mangard, Template Attacks on Masking???Resistance Is Futile, Topics in Cryptology?CT-RSA 2007, pp.243-256, 2006.
DOI : 10.1007/11967668_16

J. Quisquater and D. Samyde, ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards, Smart Card Programming and Security, pp.200-210, 2001.
DOI : 10.1007/3-540-45418-7_17

C. Rechberger and E. Oswald, Practical Template Attacks, Information Security Applications, pp.440-456, 2005.
DOI : 10.1007/978-3-540-31815-6_35

L. Riviere, Sécurité des implémentations logicielles face aux attaques par injection de faute sur systemes embarqués, 2015.

L. Riviere, Z. Najm, P. Rauzy, J. Danger, J. Bringer et al., High precision fault injections on the instruction cache of ARMv7-M architectures, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp.62-67
DOI : 10.1109/HST.2015.7140238

URL : https://hal.archives-ouvertes.fr/hal-01208378