C. Aumüller, P. Bier, W. Fischer, P. Hofreiter, and J. Seifert, Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures, Cryptographic Hardware and Embedded Systems, pp.260-275, 2003.
DOI : 10.1007/3-540-36400-5_20

Y. Baek, Regular 2 w -ary right-to-left exponentiation algorithm with very efficient DPA and FA countermeasures, International Journal of Information Security, vol.52, issue.1, pp.363-370, 2010.
DOI : 10.1007/s10207-010-0118-x

J. Blömer, R. Gomes-da-silva, P. Gunther, J. Kramer, and J. P. Seifert, A Practical Second-Order Fault Attack against a Real-World Pairing Implementation, 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.123-136, 2014.
DOI : 10.1109/FDTC.2014.22

D. Boneh, R. A. Demillo, and R. J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Advances in Cryptology ? EUROCRYPT 1997, pp.37-51, 1997.
DOI : 10.1007/3-540-69053-0_4

A. Boscher, H. Handschuh, and E. Trichina, Blinded Fault Resistant Exponentiation Revisited, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.3-9, 2009.
DOI : 10.1109/FDTC.2009.31

URL : https://www.cosic.esat.kuleuven.be/publications/article-2249.pdf

A. Boscher, R. Naciri, and E. Prouff, CRT RSA Algorithm Protected Against Fault Attacks, pp.229-243, 2007.
DOI : 10.1007/11554868_13

J. Coron, Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems (CHES '99, pp.292-302, 1999.
DOI : 10.1007/3-540-48059-5_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

G. Fumaroli and D. Vigilant, Blinded Fault Resistant Exponentiation, pp.62-70, 2006.
DOI : 10.1007/11889700_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. Giraud, An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis, IEEE Transactions on Computers, vol.55, issue.9, pp.1116-1120, 2006.
DOI : 10.1109/TC.2006.135

M. Joye and M. Karroumi, Memory-Efficient Fault Countermeasures, Smart Card Research and Advanced Applications, pp.84-101, 2011.
DOI : 10.1007/978-3-642-27257-8_6

M. Joye, A. K. Lenstra, and J. Quisquater, Chinese Remaindering Based Cryptosystems in the Presence of Faults, Journal of Cryptology, vol.12, issue.4, pp.241-245, 1999.
DOI : 10.1007/s001459900055

M. Joye and S. Yen, The Montgomery Powering Ladder, Cryptographic Hardware and Embedded Systems, CHES 2002, pp.291-302, 2003.
DOI : 10.1007/3-540-36400-5_22

C. H. Kim and J. Quisquater, How can we overcome both side channel analysis and fault attacks on RSA-CRT?, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), pp.21-29, 2007.
DOI : 10.1109/FDTC.2007.11

A. Kiss, J. Krämer, P. Rauzy, and J. P. Seifert, Algorithmic countermeasures against fault attacks and power analysis for RSA-CRT. Cryptology ePrint Archive, Report, vol.2016238, p.238, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01461208

P. C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, Advances in Cryptology ? CRYPTO 1999, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

J. Krämer, D. Nedospasov, and J. Seifert, Weaknesses in Current RSA Signature Schemes, In: Information Security and Cryptology, issue.11, pp.155-168, 2012.
DOI : 10.1007/978-3-642-31912-9_11

D. Le, M. Rivain, and C. H. Tan, On Double Exponentiation for Securing RSA against Fault Analysis, Topics in Cryptology ? CT-RSA '14, pp.152-168, 2014.
DOI : 10.1007/978-3-319-04852-9_8

P. L. Montgomery, Speeding the Pollard and elliptic curve methods of factorization, Mathematics of Computation, vol.48, issue.177, pp.243-264, 1987.
DOI : 10.1090/S0025-5718-1987-0866113-7

J. J. Quisquater and C. Couvreur, Fast decipherment algorithm for RSA public-key cryptosystem, Electronics Letters, vol.18, issue.21, pp.905-907, 1982.
DOI : 10.1049/el:19820617

P. Rauzy and S. Guilley, Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA, 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.68-82, 2014.
DOI : 10.1109/FDTC.2014.17

URL : https://hal.archives-ouvertes.fr/hal-01071425

M. Rivain, Securing RSA against Fault Analysis by Double Addition Chain Exponentiation, Topics in Cryptology ? CT-RSA '09, pp.459-480, 2009.
DOI : 10.1109/TC.2003.1190587

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. L. Rivest, A. Shamir, and L. M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

A. Shamir, Method and apparatus for protecting public key schemes from timing and fault attacks, US Patent 5, p.415, 1999.

M. Witteman, A DPA attack on RSA in CRT mode, 2009.

S. Yen and M. Joye, Checking before output may not be enough against fault-based cryptanalysis, IEEE Trans. Computers, vol.49, issue.9, pp.967-970, 2000.

S. Yen, S. Kim, S. Lim, and S. Moon, A countermeasure against one physical cryptanalysis may benefit another attack, pp.414-427, 2002.

S. Yen, W. Lien, S. Moon, and J. Ha, Power Analysis by Exploiting Chosen Message and Internal Collisions ??? Vulnerability of Checking Mechanism for RSA-Decryption
DOI : 10.1007/11554868_13