C. [. Berzati, L. Canovas, and . Goubin, Perturbating RSA Public Keys: An Improved Attack, Cryptographic Hardware and Embedded Systems Lecture Notes in Computer Science, 2008.
DOI : 10.1007/978-3-540-85053-3_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.456.5919

B. [. Brier, M. Chevallier-mames, C. Ciet, and . Clavier, Why One Should Also Secure RSA Public Key Elements, Cryptographic Hardware and Embedded Systems, pp.324-338, 2006.
DOI : 10.1007/11894063_26

. Bdj-+-98-]-f, R. H. Bao, A. Deng, A. D. Jeng, T. Narasimhalu et al., Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults, Security Protocols, pp.115-124, 1998.

D. Boneh, R. A. Demillo, and R. J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Lecture Notes in Computer Science, vol.1233, issue.97, pp.37-51, 1997.
DOI : 10.1007/3-540-69053-0_4

R. [. Boneh, R. J. Demillo, and . Lipton, On the Importance of Eliminating Errors in Cryptographic Computations, Journal of Cryptology, vol.14, issue.2, pp.101-119, 2001.
DOI : 10.1007/s001450010016

H. El, D. Choukri, M. Naccache, C. Tunstall, and . Whelan, The Sorcerer's Apprentice Guide to Fault Attacks, Cryptology ePrint Archive Report, vol.100, 2004.

M. [. Blömer and . Otto, Wagner???s Attack on a Secure CRT-RSA Algorithm Reconsidered, Fault Diagnosis and Tolerance in Cryptography, pp.13-23, 2006.
DOI : 10.1007/11889700_2

M. [. Blömer, J. Otto, and . Seifert, A New CRT-RSA Algorithm Secure Against Bellcore Attack, ACM Conference on Computer and Communication Security (CCS 2003), pp.311-320, 2003.

A. [. Biham and . Shamir, Differential fault analysis of secret key cryptosystems, Crypto'97, 1997.
DOI : 10.1007/BFb0052259

]. C. Cla07 and . Clavier, De la sécurité physique des crypto-systèmes embarqués, 2007.

]. H. Coh93 and . Cohen, A Course in Computational Algebraic Number Theory, 1993.

]. P. Dus98 and . Dusart, Autour de la fonction qui compte le nombre de nombres premiers, 1998.

]. C. Gir05a and . Giraud, DFA on AES, Fourth Conference on the Advanced Encryption Standard (AES4), pp.27-41, 2005.

]. C. Gir05b and . Giraud, Fault-Resistant RSA Implementation, Fault Diagnosis and Tolerance in Cryptography, pp.142-151, 2005.

]. J. Mui06 and . Muir, Seifert's RSA Fault Attack : Simplified Analysis and Generalizations, Cryptology ePrint Archive Report, vol.458, 2005.

O. Michael and . Rabin, Probabilistic algorithm for testing primality, Journal of Number Thoery, vol.12, issue.1, pp.128-138, 1980.

]. Sei05 and . Seifert, On Authenticated Computing and RSA-Based Authentication, ACM Conference on Computer and Communications Security (CCS 2005), pp.122-127, 2005.

]. V. Sho05 and . Shoup, A Computational Introduction to Number Theory and Algebra, 2005.

]. D. Wag04 and . Wagner, Cryptanalysis of a provably secure CRT-RSA algorithm, Proceedings of the 11th ACM Conference on Computer Security, pp.92-97, 2004.