On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract), LNCS, vol.1233, pp.37-51, 1997. ,
An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.105-114, 2011. ,
DOI : 10.1109/FDTC.2011.9
Electromagnetic Transient Faults Injection on a Hardware and a Software Implementations of AES, 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.7-15, 2012. ,
DOI : 10.1109/FDTC.2012.15
URL : https://hal.archives-ouvertes.fr/emse-00742639
Optical Fault Induction Attacks, CHES, volume 2523 of LNCS, pp.2-12, 2002. ,
DOI : 10.1007/3-540-36400-5_2
Differential fault analysis of secret key cryptosystems, Lecture Notes in Computer Science, vol.1294, pp.513-525, 1997. ,
DOI : 10.1007/BFb0052259
SmartCM a smart card fault injection simulator, 2011 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2011. ,
DOI : 10.1109/WIFS.2011.6123124
URL : https://hal.archives-ouvertes.fr/hal-00685220
High Level Model of Control Flow Attacks for Smart Card Functional Security, 2012 Seventh International Conference on Availability, Reliability and Security, pp.224-229, 2012. ,
DOI : 10.1109/ARES.2012.79
Formal verification of a CRT-RSA implementation against fault attacks, Journal of Cryptographic Engineering, vol.2009, issue.3, pp.157-167, 2013. ,
DOI : 10.1007/s13389-013-0049-3
The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, pp.370-382, 2006. ,
DOI : 10.1109/JPROC.2005.862424
Idea: Embedded Fault Injection Simulator on Smartcard, ESSoS, pp.222-229, 2014. ,
DOI : 10.1007/978-3-319-04897-0_15
URL : https://hal.archives-ouvertes.fr/hal-01099996
Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections, 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation, 2014. ,
DOI : 10.1109/ICST.2014.34
URL : https://hal.archives-ouvertes.fr/hal-01229274
Symbolic execution and program testing, Communications of the ACM, vol.19, issue.7, pp.385-394, 1976. ,
DOI : 10.1145/360248.360252
Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs, OSDI, pp.209-224, 2008. ,
Preuves de sécurité outillées d'implémentation cryptographiques, Laboratoire PRiSM, 2013. ,
The use of a power analysis for influencing PIN verification on cryptographic smart card. Bakalásk práce, Masarykova univerzita, Fakulta informatiky, 2007. ,
Etude et réalisation d'un environnement d'exprimentation et de modélisation pour la technologie Java Card : applicationàapplicationà la sécurité, 1-Informatique et Mathématiques, 2004. ,
Practical Optical Fault Injection on Secure Microcontrollers, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.91-99, 2011. ,
DOI : 10.1109/FDTC.2011.12