The References used for creating this blog, I am very thankful to all the people who had created this state of art works with their deep knowledge in the subject.
- C. Aumuller et al. “Fault attacks on RSA with CRT: Concrete results and practical countermeasures”. In:Lecture Notes in Computer Science (2003), pp. 260–275.
- G. Barbu, H. Thiebeauld, and V. Guerin. “Attacks on Java Card 3.0 Combining Fault and Logical Attacks”. In:Smart Card Research and Advanced Application, Cardis 2010 LNCS 6035 (2010), pp. 148–163.
- G. Bizzotto and G. Grimaud. “Practical Java Card bytecode compression”. In: Proceedings of RENPAR14/ASF/SYMPA. Citeseer. 2002.
- J. Blomer, M. Otto, and J.P. Seifert. “A new CRT-RSA algorithm secure against Bellcore attacks”. In: Proceedings of the 10th ACM conference on Computer and communications security. ACM New York, NY,USA. 2003, pp. 311–320.
- L.R. Clausen et al. “Java bytecode compression for low-end embedded systems”. In: ACM Transactions on Programming Languages and Systems (TOPLAS) 22.3 (2000), p. 489. Global platform group. Global platform official site. 2010. url:http://www.globalplatform.org.
- L. Hemme. “A differential fault attack against early rounds of (triple) DES”. In: Cryptographic Hardware and Embedded Systems-CHES 2004 (2004), pp. 170–217.
- J. Iguchi-Cartigny and J.L. Lanet. “Developing a Trojan applets in a smart card”. In: Journal in Computer Virology (2009), pp. 1–9.
- Sun Mycrosystems. Java CardTM 3.0.1 Specification. Sun Microsystems. 2009.
- G. Piret and J.J. Quisquater. “A differential fault attack technique against SPN structures, with application to the AES and Khazad”. In: Cryptographic Hardware and Embedded Systems-CHES 2003 (2003), pp. 77–88.
- A.A. Sere, J. Iguchi-Cartigny, and J.L. Lanet. “Automatic detection of fault attack and countermeasures”. In:Proceedings of the 4th workshop on Embedded Systems Security. ACM. 2009, pp. 1–7.
- A.A. Sere, J. Iguchi-Cartigny, and J.L. Lanet. “Mutant applications in smart card”. In: Proceedings of CIS 2010 (2010).
- E. Vetillard and A. Ferrari. “Combined Attacks and Countermeasures”. In: Smart Card Research and Advanced Application, Cardis 2010 LNCS 6035 (2010), pp. 133–147.
- D. Wagner. “Cryptanalysis of a provably secure CRT-RSA algorithm”. In: Proceedings of the 11th ACM conference on Computer and communications security. ACM New York, NY, USA. 2004, pp. 92–97.
- Ahmadou Al Khary Sere ,Julien Iguchi-Cartigny and Jean-Louis Lanet. “Automatic detection of fault attack and countermeasures”
- Ahmadou Al Khary Sere ,Julien Iguchi-Cartigny and Jean-Louis Lanet. “Evaluation of Countermeasures Against Fault Attacks on Smart Cards”
- Wojciech Mostowski and Erik Poll.”Malicious Code on Java Card Smartcards:Attacks and Countermeasures”
- M.L. Akkar, L. Goubin, and O. Ly. Automatic Integration of Counter-Measures Against Fault Injection Attacks. Pre-print found at http://www. labri. fr/Perso/ly/index. htm, 2003.
- R.J. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. Lecture notes in computer science, pages 125–136, 1998.
- C. Aumuller, P. Bier, W. Fischer, P. Hofreiter, and J.P. Seifert.Fault attacks on RSA with CRT: Concrete results and practical countermeasures. Lecture Notes in Computer Science, pages 260–275, 2003.
- H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan, D.T.Ltd, and I. Rehovot. The sorcerer’s apprentice guide to fault attacks.Proceedings of the IEEE, 94(2):370–382, 2006.
- E. Biham and A. Shamir. Differential fault analysis of secret key cryptosystems. Lecture Notes in Computer Science, 1294:513–525,1997.
- J. Blomer, M. Otto, and J.P. Seifert. A new CRT-RSA algorithm secure against Bellcore attacks. In Proceedings of the 10th ACM conference on Computer and communications security, pages 311–320. ACM New York, NY, USA, 2003.
- D. Boneh, R.A. DeMillo, and R.J. Lipton. On the importance of checking cryptographic protocols for faults. Lecture Notes in Computer Science, 1233:37–51, 1997.
- KO GADELLAA. Fault Attacks on Java Card (Masters Thesis).Universidade de Eindhoven, 2005.
- O. Kommerling, M. Kuhn, and P. Street. Design principles for tamper-resistant smartcard processors.
- J.J. Quisquater and D. Samyde. Eddy current for magnetic analysis with active sensor. In Proceedings of Esmart, volume 2002, 2002.
- S.P. Skorobogatov and R.J. Anderson. Optical fault induction attacks.Lecture notes in computer science, pages 2–12, 2003.
- D. Wagner. Cryptanalysis of a provably secure CRT-RSA algorithm.In Proceedings of the 11th ACM conference on Computer and communications security, pages 92–97. ACM New York, NY, USA,2004.