An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography ,
DOI : 10.1109/FDTC.2011.9
Hardware implementation of DBNS recoding for ECC processor, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers ,
DOI : 10.1109/ACSSC.2010.5757580
URL : https://hal.archives-ouvertes.fr/inria-00536587
Electromagnetic fault injection: Towards a fault model on a 32 ,
DOI : 10.1109/fdtc.2013.9
URL : https://hal.archives-ouvertes.fr/emse-00871218
Arithmetic Operators on GF(2 m ) for Cryptographic Applications: Performance -Power Consumption -Security Tradeoffs, 2012. ,
URL : https://hal.archives-ouvertes.fr/tel-00767537
Analysis of GF(2 233 ) multipliers regarding elliptic curve cryptosystem applications, 11th IFAC/IEEE International Conference on Programmable Devices and Embedded Systems (PDeS), pp.271-276, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00702622
$\textrm{GF}(2^m)$ Finite-Field Multipliers with Reduced Activity Variations, 4th International Workshop on the Arithmetic of Finite Fields, pp.152-167, 2012. ,
DOI : 10.1007/978-3-642-31662-3_11
Fast and Secure Finite Field Multipliers, 2015 Euromicro Conference on Digital System Design ,
DOI : 10.1109/DSD.2015.46
URL : https://hal.archives-ouvertes.fr/hal-01169851
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.5588
A Practical Fault Attack on Square and Multiply, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography ,
DOI : 10.1109/FDTC.2008.10