D. Boneh, R. A. Demillo, and R. J. Lipton, On the importance of eliminating errors in cryptographic computations, vol.14, pp.101-119

J. Schmidt and M. Hutter, Optical and em faultattacks on crt-based rsa: Concrete results, Austrian Workhop on Microelectronics, pp.61-67

M. Ghodrati, B. Yuce, S. Gujar, C. Deshpande, L. Nazhandali et al., Inducing local timing fault through EM injection, Proceedings of the Design Automation Conference, pp.1-6

S. Ordas, L. Guillaume-sage, and P. Maurine, EM injection: Fault model and locality, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.3-13
URL : https://hal.archives-ouvertes.fr/lirmm-01319078

A. Dehbaoui, J. Dutertre, B. Robisson, and A. Tria, Electromagnetic transient faults injection on a hardware and a software implementations of AES, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.7-15
URL : https://hal.archives-ouvertes.fr/emse-00742639

N. Moro, A. Dehbaoui, K. Heydemann, B. Robisson, and E. Encrenaz, Electromagnetic fault injection: Towards a fault model on a 32-bit microcontroller, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.77-88
URL : https://hal.archives-ouvertes.fr/emse-00871218

P. Schwabe and K. Stoffelen, All the AES you need on cortex-m3 and M4, Selected Areas in Cryptography, vol.10532, pp.180-194

L. Rivière, Z. Najm, P. Rauzy, J. Danger, J. Bringer et al., High precision fault injections on the instruction cache of armv7-m architectures, International Symposium on Hardware Oriented Security and Trust, pp.62-67

H. Liao and C. Gebotys, Methodology for em fault injection: Charge-based fault model, Design, Automation Test in Europe Conference Exhibition, pp.256-259

J. Proy, K. Heydemann, F. Majéric, A. Cohen, and A. Berzati, Studying EM pulse effects on superscalar microarchitectures at ISA level
URL : https://hal.archives-ouvertes.fr/hal-02102373

Y. Yao, M. Yang, C. Patrick, B. Yuce, and P. Schaumont, Fault-assisted side-channel analysis of masked implementations, International Symposium on Hardware Oriented Security and Trust, pp.57-64

A. Cui and R. Housley, BADFET: defeating modern secure boot using second-order pulsed electromagnetic fault injection, USENIX Workshop on Offensive Technologies

E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, Advances in Cryptology -CRYPTO '97, vol.1294, pp.513-525

L. Dureuil, M. Potet, P. De-choudens, C. Dumas, and J. Clédière, From code review to fault injection attacks: Filling the gap using fault model inference, International Conference on Smart Card Research and Advanced Applications, vol.9514, pp.107-124

J. Obermaier and S. Tatschner, Shedding too much light on a microcontroller's firmware protection, USENIX Workshop on Offensive Technologies

F. Zhang, X. Lou, X. Zhao, S. Bhasin, W. He et al., Persistent fault analysis on block ciphers, vol.2018, pp.150-172