. {p}, {q}, r ; := { q^-1 mod p }

P. Aumüller, W. Bier, P. Fischer, J. Hofreiter, and . Seifert, Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures
DOI : 10.1007/3-540-36400-5_20

A. Berzati, C. Canovas-dumas, and L. Goubin, A Survey of Differential Fault Analysis Against Classical RSA Implementations, Fault Analysis in Cryptography, Information Security and Cryptography, pp.111-124, 2012.
DOI : 10.1007/978-3-642-29656-7_7

E. Biham, Y. Carmeli, and A. Shamir, Bug attacks, CRYPTO, pp.221-240, 2008.
DOI : 10.1007/978-3-540-85174-5_13

D. Boneh, R. A. Demillo, and R. J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Proceedings of Eurocrypt'97, pp.37-51, 1997.
DOI : 10.1007/3-540-69053-0_4

[. Blanchet, ProVerif: Cryptographic protocol verifier in the formal model

J. Blömer, M. Otto, and J. Seifert, A new CRT-RSA algorithm secure against bellcore attacks, ACM Conference on Computer and Communications Security, pp.311-320, 2003.

E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, CRYPTO, pp.513-525, 1997.
DOI : 10.1007/BFb0052259

M. Christofi, B. Chetali, L. Goubin, and D. Vigilant, Formal verification of an implementation of CRT-RSA Vigilant's algorithm, Journal of Cryptographic Engineering, vol.3, issue.3

C. Jean-sébastien-coron, N. Giraud, G. Morin, D. Piret, and . Vigilant, Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm, pp.89-96, 2010.

N. Debande, Y. Souissi, M. Abdelaziz-elaabid, S. Guilley, and J. Danger, Wavelet transform based pre-processing for side channel analysis, 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops, pp.32-38, 2012.
DOI : 10.1109/MICROW.2012.15

L. Harvey and . Garner, Number Systems and Arithmetic, Advances in Computers, vol.6, pp.131-194, 1965.

X. Guo, D. Mukhopadhyay, and R. Karri, Provably secure concurrent error detection against differential fault analysis, Cryptology ePrint Archive, vol.552552, 2012.
DOI : 10.1007/s13389-014-0092-8

. Inr and . Inria, OCaml, a variant of the Caml language

M. Joye, A. K. Lenstra, and J. Quisquater, Chinese Remaindering Based Cryptosystems in the Presence of Faults, Journal of Cryptology, vol.12, issue.4, pp.241-245, 1999.
DOI : 10.1007/s001459900055

M. Joye, Protecting RSA against Fault Attacks: The Embedding Method, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.41-45, 2009.
DOI : 10.1109/FDTC.2009.32

M. Joye and P. Paillier, GCD-Free Algorithms for Computing Modular Inverses, CHES, pp.243-253, 2003.
DOI : 10.1007/978-3-540-45238-6_20

C. Paul, J. Kocher, and B. Jaffe, Differential Power Analysis, Proceedings of CRYPTO'99, pp.388-397, 1999.

S. Kim, T. H. Kim, D. Han, and S. Hong, An efficient CRT-RSA algorithm secure against power and fault attacks, Journal of Systems and Software, vol.84, issue.10, pp.1660-1669, 2011.
DOI : 10.1016/j.jss.2011.04.026

[. Koç, High-Speed RSA Implementation, 1994.

P. Rauzy and S. Guilley, Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack ? A Pledge for Formal Methods in the Field of Implementation Security, 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop, pp.978-979, 2014.

R. L. Rivest, A. Shamir, and L. M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

Y. Souissi, M. Aziz-elaabid, J. Danger, S. Guilley, and N. Debande, Novel Applications of Wavelet Transforms based Side-Channel Analysis, Non-Invasive Attack Testing Workshop, 2011.

A. Shamir, Method and apparatus for protecting public key schemes from timing and fault attacks Patent Number 5,991,415; also presented at the rump session of EUROCRYPT, p.97, 1999.

[. Vigilant, RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks, CHES, pp.130-145, 2008.
DOI : 10.1007/978-3-540-85053-3_9