M. Agoyan, J. Dutertre, D. Naccache, B. Robisson, and A. Tria, When Clocks Fail: On Critical Paths and Clock Faults, CARDIS, pp.182-193, 2010.
DOI : 10.1007/978-3-642-12510-2_13

URL : https://hal.archives-ouvertes.fr/emse-00505344

S. Bhasin, J. Danger, F. Flament, T. Graba, S. Guilley et al., Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow, 2009 International Conference on Reconfigurable Computing and FPGAs, pp.213-218, 2009.
DOI : 10.1109/ReConFig.2009.50

URL : https://hal.archives-ouvertes.fr/hal-00411843

S. Bhasin, J. Danger, S. Guilley, and Z. Najm, A low-entropy first-degree secure provable masking scheme for resource-constrained devices, Proceedings of the Workshop on Embedded Systems Security, WESS '13, pp.1-7, 2013.
DOI : 10.1145/2527317.2527324

E. Biham, A fast new DES implementation in software, Lecture Notes in Computer Science, vol.1267, pp.260-272, 1997.
DOI : 10.1007/BFb0052352

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3325

J. Blömer, J. Guajardo, and V. Krummel, Provably Secure Masking of AES, Selected Areas in Cryptography, pp.69-83, 2004.
DOI : 10.1007/978-3-540-30564-4_5

A. Boscher and H. Handschuh, Masking Does Not Protect Against Differential Fault Attacks. In FDTC, 5th Workshop on Fault Detection and Tolerance in Cryptography, IEEE-CS, vol.12, pp.35-40, 2008.
DOI : 10.1109/fdtc.2008.12

J. Bringer, H. Chabanne, and T. H. Le, Protecting AES against side-channel analysis using wire-tap codes, Journal of Cryptographic Engineering, vol.54, issue.8, pp.129-141, 2012.
DOI : 10.1007/s13389-012-0034-2

C. Carlet, Boolean Functions for Cryptography and Error-Correcting Codes, pp.257-397, 2010.
DOI : 10.1017/CBO9780511780448.011

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.2986

C. Carlet, J. Danger, S. Guilley, H. Maghrebi, and E. Prouff, Achieving side-channel high-order correlation immunity with leakage squeezing, Journal of Cryptographic Engineering, vol.58, issue.6, pp.1-15, 2014.
DOI : 10.1007/s13389-013-0067-1

C. Carlet and P. Guillot, A New Representation of Boolean Functions, Lecture Notes in Computer Science, vol.1719, pp.94-103, 1999.
DOI : 10.1007/3-540-46796-3_10

J. Coron, Higher Order Masking of Look-Up Tables, Cryptology ePrint Archive, vol.700, 2013.
DOI : 10.1007/978-3-642-55220-5_25

L. Jean-sébastien-coron and . Goubin, On Boolean and Arithmetic Masking against Differential Power Analysis, CHES, pp.231-237, 1965.

B. Debraize, Efficient and provable Secure Methods for Switching from Arithmetic to Boolean Masking, CHES, 2012.

L. Goubin and J. Patarin, DES and Differential Power Analysis, Cryptographic Hardware and Embedded Systems, pp.158-172, 1999.

M. Joye and M. Tunstall, Fault Analysis in Cryptography, 2011.
DOI : 10.1007/978-3-642-29656-7

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006.

S. Thomas and . Messerges, Securing the AES Finalists Against Power Analysis Attacks, Fast Software Encryption'00, pp.150-164, 2000.

A. Moradi, Statistical Tools Flavor Side-Channel Collision Attacks, Lecture Notes in Computer Science, vol.7237, pp.428-445, 2012.
DOI : 10.1007/978-3-642-29011-4_26

N. Csd, Advanced Encryption Standard (AES) FIPS PUB 197, 2001.

E. Prouff and M. Rivain, A Generic Method for Secure SBox Implementation, Lecture Notes in Computer Science, vol.4867, pp.227-244, 2007.
DOI : 10.1007/978-3-540-77535-5_17

M. Rivain, E. Dottax, and E. Prouff, Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. Fast Software Encryption FSE, pp.127-143, 2008.
DOI : 10.1007/978-3-540-71039-4_8

M. Rivain and E. Prouff, Provably Secure Higher-Order Masking of AES, CHES, pp.413-427, 2010.
DOI : 10.1007/978-3-642-15031-9_28

M. Tunstall, D. Mukhopadhyay, and S. Ali, Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault, Lecture Notes in Computer Science, vol.6633, pp.224-233, 2011.
DOI : 10.1007/978-3-642-21040-2_15

M. Tunstall, C. Whitnall, and E. Oswald, Masking Tables???An Underestimated Security Risk, IACR Cryptology ePrint Archive, p.735, 2013.
DOI : 10.1007/978-3-662-43933-3_22

P. Kumar, V. , and J. Großschädl, Algorithms for Switching between Boolean and Arithmetic Masking of Second Order, Lecture Notes in Computer Science, vol.8204, pp.95-110, 2013.

N. Veyrat-charvillon, M. Medwed, S. Kerckhof, and F. Standaert, Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note, Lecture Notes in Computer Science, vol.7658, pp.740-757, 2012.
DOI : 10.1007/978-3-642-34961-4_44

URL : http://hdl.handle.net/2078.1/130004

J. Waddle and D. Wagner, Towards Efficient Second-Order Power Analysis, CHES, pp.1-15, 2004.
DOI : 10.1007/978-3-540-28632-5_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.460.2991

X. Ye and T. Eisenbarth, On the Vulnerability of Low Entropy Masking Schemes, CARDIS, Lecture Notes in Computer Science, 2013.