WDDL is Protected against Setup Time Violation Attacks, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2009. ,
DOI : 10.1109/FDTC.2009.40
URL : https://hal.archives-ouvertes.fr/hal-00410135
Fault Injection Resilience, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010. ,
DOI : 10.1109/FDTC.2010.15
URL : https://hal.archives-ouvertes.fr/hal-00482194
? Countering Early Evaluation: An Approach Towards Robust Dual- Rail Precharge Logic, 2010. ,
Optical Fault Induction Attacks . 2523 of LNCS, pp.2-12 ,
Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.21, issue.12, pp.1509-1517, 2002. ,
DOI : 10.1109/TCAD.2002.804378
Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard, International Conference on Dependable Systems and Networks, 2004, 2004. ,
DOI : 10.1109/DSN.2004.1311880
Differential Power Analysis, CHES99, pp.388-397, 1666. ,
DOI : 10.1007/3-540-48405-1_25
ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards, LNCS Springer, vol.140, pp.200-210, 2001. ,
DOI : 10.1007/3-540-45418-7_17
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES), SPRINGER, editor, Financial Cryptography, 2742 of LNCS, pp.162-181, 2003. ,
DOI : 10.1007/978-3-540-45126-6_12
On the Importance of Eliminating Errors in Cryptographic Computations, Journal of Cryptology, vol.14, issue.2, pp.101-119, 2001. ,
DOI : 10.1007/s001450010016
Copy protection for DVD video, Proceedings of the IEEE, pp.1267-1276, 1999. ,
A method for obtaining digital signatures and public-key cryptosystems, commun. ACM, vol.21, pp.120-126, 1978. ,
Elliptic Curves in Cryptography, 1999. ,
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Proceedings of CRYPTO'96, 1109 of LNCS, pp.104-113, 1996. ,
DOI : 10.1007/3-540-68697-5_9
Differential Power Analysis, Proceedings of CRYPTO'99, 1666 of LNCS, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smard Cards, Smart Card Programming and Security (E-smart 2001), 2140 of LNCS, pp.200-210, 2001. ,
The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, pp.370-382, 2006. ,
DOI : 10.1109/JPROC.2005.862424
Concrete results and prcatical countermeasures, p.3, 1996. ,
When Clocks Fail: On Critical Paths and Clock Faults, CARDIS, pp.182-193, 2010. ,
DOI : 10.1007/978-3-642-12510-2_13
URL : https://hal.archives-ouvertes.fr/emse-00505344
How to flip a bit? On-Line Testing Symposium, IEEE International, vol.0, pp.235-239, 2010. ,
Eddy current for Magnetic Analysis with Active Sensor, 2002. ,
fault attacks and countermeasures, 2004. ,
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD, AES) 4th international conference CHES, 2779 of LNCS, pp.27-41, 2003. ,
Differential fault analysis on AES key schedule and some countermeasures, SPRINGER, editor, Information Security and Privacy , 2727 of LNCS, pp.118-129, 2003. ,
Differential Fault Analysis on A.E.S, Applied Cryptography and Network Security, 2846 of LNCS, pp.293-306, 2003. ,
DOI : 10.1007/978-3-540-45203-4_23
A Generalized Method of Differential Fault Attack Against AES Cryptosystem, pp.91-100, 2006. ,
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault, Report, vol.575575, 2009. ,
DOI : 10.1007/978-3-642-21040-2_15
Differential Behavioral Analysis, CHES, 4727 of LNCS, pp.413-426, 2007. ,
DOI : 10.1007/978-3-540-74735-2_28
URL : https://hal.archives-ouvertes.fr/emse-00481468
Fault Sensitivity Analysis, CHES, 6225 of Lecture Notes in Computer Science, pp.320-334, 2010. ,
DOI : 10.1007/978-3-642-15031-9_22
DFA Mechanism on the AES Key Schedule, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), pp.62-74, 2007. ,
DOI : 10.1109/FDTC.2007.13
CMOS VLSI Design: A Circuits and Systems Perspective, 2004. ,
An Optimized S-Box Circuit Architecture for Low Power AES Design, Lecture Notes in Computer Science, vol.2523, issue.6, pp.271-295, 2003. ,
DOI : 10.1007/3-540-36400-5_14
Application Specific Integrated Circuits, 2009. ,
Security of several AES Implementations against Delay Faults, Proceedings of the 12th Nordic Workshop on Secure IT Systems, 2007. ,
URL : https://hal.archives-ouvertes.fr/emse-00494274
DSPs, BRAMs and a Pinch of Logic: New Recipes for AES on FPGAs, 2008 16th International Symposium on Field-Programmable Custom Computing Machines, pp.99-108, 2008. ,
DOI : 10.1109/FCCM.2008.42
Low voltage fault attacks to AES, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2010. ,
DOI : 10.1109/HST.2010.5513121
Robustness evaluation and improvements under laser-based fault attacks of an AES crypto-processor implemented on a SRAM-based FPGA, 2010 15th IEEE European Test Symposium, p.251, 2010. ,
DOI : 10.1109/ETSYM.2010.5512740
URL : https://hal.archives-ouvertes.fr/hal-00505094
A Comparative Cost/Security Analysis of Fault Attack Countermeasures, FDTC, 4236 of Lecture Notes in Computer Science, pp.159-172, 2006. ,
DOI : 10.1007/11889700_15
Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis, IEEE Trans. Computers, vol.49, issue.9, pp.967-970, 2000. ,
Leak-resistant cryptographic indexed key update, United States Patent, vol.6539, 1999. ,
An Information Theoretic Perspective on the Differential Fault Analysis against AES. Cryptology ePrint Archive, 2010. ,
An Efficient Hardware-Based Fault Diagnosis Scheme for AES. proceedings of DFT, pp.130-138, 2004. ,
Error analysis and detection procedures for a hardware implementation of the advanced encryption standard, IEEE Transactions on Computers, vol.52, issue.4, 2003. ,
DOI : 10.1109/TC.2003.1190590
Simple error detection methods for hardware implementation of Advanced Encryption Standard, IEEE transactions on computers, vol.55, issue.6, pp.720-731, 2006. ,
Differential Fault Analysis Attack Resistant Architectures for the Advanced Encryption Standard, 2004. ,
DOI : 10.1007/1-4020-8147-2_12
Double-Data-Rate Computation as a Countermeasure against Fault Analysis, IEEE Transactions on Computers, vol.57, issue.11, pp.1528-1539, 2008. ,
DOI : 10.1109/TC.2008.149
Tamper Resistance ? a Cautionary Note RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis, Proceedings of the Second USENIX Workshop ON Electronic Commerce, pp.1-11461, 1996. ,
On the Importance of Checking Cryptographic Protocols for Faults, Proceedings of Eurocrypt'97, 1233 of LNCS, pp.37-51, 1997. ,
DOI : 10.1007/3-540-69053-0_4
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering, TCC, 2951 of Lecture Notes in Computer Science, pp.258-277, 2004. ,
DOI : 10.1007/978-3-540-24638-1_15
Blinded Fault Resistant Exponentiation Revisited, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.3-9, 2009. ,
DOI : 10.1109/FDTC.2009.31
CRT RSA Algorithm Protected Against Fault Attacks, WISTP, 4462 of LNCS, pp.229-243, 2007. ,
DOI : 10.1007/11554868_13
Differential fault analysis of secret key cryptosystems, CRYPTO, 1294 of LNCS, pp.513-525, 1997. ,
DOI : 10.1007/BFb0052259
All-or-Nothing Transforms as a countermeasure to differential side-channel analysis, International Journal of Information Security, vol.94, issue.2, 2009. ,
DOI : 10.1007/s10207-013-0212-y
A differential side-channel analysis countermeasure, European Patent Application (EP 2148462 A1), 2010. ,
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices, AFRICACRYPT, 6055 of LNCS, pp.279-296 ,
DOI : 10.1007/978-3-642-12678-9_17
PSS Is Secure against Random Fault Attacks, ASIACRYPT, 5912 of LNCS, pp.653-666, 2009. ,
Combined countermeasures against perturbation & observation attacks, PASTIS (PAca Security Trends In embedded Security), Gardanne (École des Mines de Saint-Étienne), 2010. ,
Multiple-Valued Constant-Power Adder for Cryptographic Processors, 2009 39th International Symposium on Multiple-Valued Logic, pp.239-244, 2009. ,
DOI : 10.1109/ISMVL.2009.9
Improving smart card security using self-timed circuits, Proceedings Eighth International Symposium on Asynchronous Circuits and Systems, pp.211-218, 2002. ,
DOI : 10.1109/ASYNC.2002.1000311
Balanced self-checking asynchronous logic for smart card applications, Microprocessors and Microsystems, vol.27, issue.9, pp.421-430, 2003. ,
DOI : 10.1016/S0141-9331(03)00092-9
WDDL is Protected against Setup Time Violation Attacks, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.73-83, 2009. ,
DOI : 10.1109/FDTC.2009.40
URL : https://hal.archives-ouvertes.fr/hal-00410135
Case Study of a Fault Attack on Asynchronous DES Crypto-Processors, FDTC, 4236 of Lecture Notes in Computer Science, pp.88-97, 2006. ,
DOI : 10.1007/11889700_9
URL : https://hal.archives-ouvertes.fr/hal-00143431
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006. ,
Design and Analysis of Dual-Rail Circuits for Security Applications, IEEE Transactions on Computers, vol.54, issue.4, pp.449-460, 2005. ,
DOI : 10.1109/TC.2005.61
Overview of Dual Rail with Precharge Logic Styles to Thwart Implementation- Level Attacks on Hardware Cryptoprocessors, ? New Attacks and Improved Counter- Measures ? A Survey on Fault Attacks, KLUWER, editor, CARDIS, pp.1-8, 2004. ,
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style, CHES, 4249 of LNCS, pp.255-269 ,
DOI : 10.1007/11894063_21
Power Attacks on Secure Hardware Based on Early Propagation of Data, 12th IEEE International On-Line Testing Symposium (IOLTS'06), pp.131-138, 2006. ,
DOI : 10.1109/IOLTS.2006.49
A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation, Proceedings Design, Automation and Test in Europe Conference and Exhibition, pp.246-251, 2004. ,
DOI : 10.1109/DATE.2004.1268856
Private Circuits II: Keeping Secrets in Tamperable Circuits, EUROCRYPT, 4004 of Lecture Notes in Computer Science, pp.308-327, 2006. ,
DOI : 10.1007/11761679_19
Early Analysis of Fault-based Attack Effects in Secure Circuits, IEEE Transactions on Computers, vol.56, issue.10, pp.1431-1434, 2007. ,
DOI : 10.1109/TC.2007.1078
URL : https://hal.archives-ouvertes.fr/hal-00178989
Power Attacks Resistance of Cryptographic S-boxes with added Error Detection Circuits, 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2007), pp.508-516, 2007. ,
DOI : 10.1109/DFT.2007.61
Influence of error detecting or correcting codes on the sensitivity to DPA of an AES S-box, 2009 3rd International Conference on Signals, Circuits and Systems (SCS), pp.1-5, 2009. ,
DOI : 10.1109/ICSCS.2009.5412600
URL : https://hal.archives-ouvertes.fr/hal-00469823
Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard, International Conference on Dependable Systems and Networks, 2004, pp.93-101, 2004. ,
DOI : 10.1109/DSN.2004.1311880
A side-channel leakage free coprocessor IC in 0.18 µm CMOS for Embedded AES-based Cryptographic and Biometric Processing, DAC, pp.222-227, 2005. ,
Evaluation of the Masked Logic Style MDPL on a Prototype Chip, CHES, 4727 of LNCS, pp.81-94, 2007. ,
DOI : 10.1007/978-3-540-74735-2_6
Evaluating the robustness of secure triple track logic through prototyping, Proceedings of the twenty-first annual symposium on Integrated circuits and system design, SBCCI '08, pp.193-198, 2008. ,
DOI : 10.1145/1404371.1404425
URL : https://hal.archives-ouvertes.fr/lirmm-00373516
Evaluation on FPGA of Triple Rail Logic Robustness against DPA and DEMA, DATE, track A4 (Secure embedded implementations ), pp.634-639, 2009. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00372847
CMOS structures suitable for secured hardware, Proceedings Design, Automation and Test in Europe Conference and Exhibition, pp.1414-1415, 2004. ,
DOI : 10.1109/DATE.2004.1269113
Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks, IEEE Transactions on Computers, vol.57, issue.11, pp.1482-1497, 2008. ,
DOI : 10.1109/TC.2008.109
Security Evaluation of a Balanced Quasi-Delay Insensitive Library, DCIS Session 5D ? Reliable and Secure Architectures, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00283405
Evaluation of Power-Constant Dual-Rail Logics Counter- Measures against DPA with Design-Time Security Metrics, IEEE Transactions on Computers, vol.9, issue.59, pp.1250-1263, 2010. ,
BCDL: A high performance balanced DPL with global precharge and without early-evaluation, DATE'10, pp.849-854, 2010. ,
Circuit de cryptographie programmable ? Logique BCDL (Balanced Cell-based Differential Logic), 25 Mars, Institut, 2008. ,
Updates on the potential of clock-less logics to strengthen cryptographic circuits against side-channel attacks, 2009 16th IEEE International Conference on Electronics, Circuits and Systems, (ICECS 2009), pp.351-354, 2009. ,
DOI : 10.1109/ICECS.2009.5411008
URL : https://hal.archives-ouvertes.fr/hal-00472064
An investigation into the security of self-timed circuits, Ninth International Symposium on Asynchronous Circuits and Systems, 2003. Proceedings., pp.206-215, 2003. ,
DOI : 10.1109/ASYNC.2003.1199180
Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage, CHES, 4249 of LNCS, pp.242-254 ,
DOI : 10.1007/11894063_20
Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs, ACM Trans. Reconfigurable Technol. Syst. (TRETS), vol.2, issue.1, pp.1-23, 2006. ,
Information Leakage of Flip-Flops in DPA-Resistant Logic Styles, Cryptology ePrint Archive Report, vol.188, 2008. ,
PUBLICATION 140-2. Security Requirements for Cryptographic Modules, p.69, 2001. ,
PUBLICATION 140-3. Security Requirements for Cryptographic Modules (Draft, Revised), p.63, 2009. ,
Successfully Attacking Masked AES Hardware Implementations, Proceedings of CHES'05, 3659 of LNCS, pp.157-171, 2005. ,
DOI : 10.1007/11545262_12
Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic Applications in FPGAs, 2008 Second International Conference on Secure System Integration and Reliability Improvement, pp.16-23, 2008. ,
DOI : 10.1109/SSIRI.2008.31
URL : https://hal.archives-ouvertes.fr/hal-00259153
Setup Time Violation Attacks on AES The seventh European Dependable Computing Conference, EDCC, pp.91-96, 2008. ,
Fault Analysis Attack on an FPGA AES Implementation, 2008 New Technologies, Mobility and Security, pp.1-5, 2008. ,
DOI : 10.1109/NTMS.2008.ECP.45
Configuration errors analysis in SRAM-based FPGAs: Software tool and practical results, Microelectronics Reliability, vol.47, issue.9-11, pp.9-111836, 2007. ,
DOI : 10.1016/j.microrel.2007.07.074
URL : https://hal.archives-ouvertes.fr/hal-00184528
An SRAM SEU Hardening Technique for Multi-Vt Nanometric CMOS Technologies, DCIS, 2008. ,
Radio Frequency Attacks, Encyclopedia of Cryptography and Security, 2005. ,
On the proposition of an EMI-based fault injection approach, 11th IEEE International On-Line Testing Symposium, pp.207-208, 2005. ,
DOI : 10.1109/IOLTS.2005.47