S. Ali, D. Mukhopadhyay, and M. Tunstall, Differential fault analysis of AES: towards reaching its limits, J. Cryptographic Engineering, vol.3, issue.2, pp.73-97, 2013.

J. Balasch, S. Faust, and B. Gierlichs, Inner Product Masking Revisited, Advances in Cryptology -EURO-CRYPT 2015 -34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.486-510, 2015.

J. Balasch, S. Faust, B. Gierlichs, C. Paglialonga, and F. Standaert, Consolidating Inner Product Masking, Advances in Cryptology -ASIACRYPT 2017 -23rd International Conference on the Theory and Applications of Cryptology and Information Security, vol.10624, pp.724-754, 2017.

G. Barthe, S. Belaïd, F. Dupressoir, P. Fouque, and B. Grégoire, Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler, IACR Cryptology ePrint Archive, p.506, 2015.

J. Bringer, C. Carlet, H. Chabanne, S. Guilley, and H. Maghrebi, Orthogonal Direct Sum Masking -A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks, Information Security Theory and Practice. Securing the Internet of Things -8th IFIP WG 11.2 International Workshop, vol.8501, pp.40-56, 2014.

C. Carlet, C. Güneri, S. Mesnager, and F. Özbudak, Construction of some codes suitable for both side channel and fault injection attacks, Arithmetic of Finite Fields -7th International Workshop, WAIFI 2018, vol.11321, pp.95-107, 2018.

A. Chakraborty, B. Mazumdar, and D. Mukhopadhyay, A combined power and fault analysis attack on protected grain family of stream ciphers, IEEE Trans. on CAD of Integrated Circuits and Systems, vol.36, issue.12, pp.1968-1977, 2017.

W. Cheng, C. Carlet, K. Goli, J. Danger, and S. Guilley, Detecting Faults in Inner Product Masking Scheme -IPM-FD: IPM with Fault Detection, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02915673

W. Cheng, C. Carlet, K. Goli, J. Danger, and S. Guilley, Detecting Faults in Inner Product Masking Scheme -IPM-FD: IPM with Fault Detection, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02915673

W. Cheng, S. Guilley, and J. Danger, Claude Carlet, and Sihem Mesnager. Optimal Linear Codes for IPM, 2020.

C. Clavier, B. Feix, G. Gagnerot, and M. Roussellet, Passive and Active Combined Attacks on AES, FDTC, pp.10-18, 2010.
URL : https://hal.archives-ouvertes.fr/hal-02486972

J. Coron, HTable countermeasure against sidechannel attacks -reference implementation for the masking scheme presented in, vol.13

J. Coron, Higher Order Masking of Look-Up Tables, Lecture Notes in Computer Science, vol.8441, pp.441-458, 2014.

E. Jean-sébastien-coron, M. Prouff, and . Rivain, Side Channel Cryptanalysis of a Higher Order Masking Scheme, LNCS, vol.4727, pp.28-44, 2007.

J. Danger, S. Guilley, A. Heuser, A. Legay, and M. Tang, Physical Security Versus Masking Schemes, pp.269-284, 2018.

F. Denis, The Sodium cryptography library, 2019.

Y. Ishai, A. Sahai, and D. Wagner, Private Circuits: Securing Hardware against Probing Attacks, CRYPTO, vol.2729, pp.463-481, 2003.

G. Mark, K. J. Karpovsky, Z. Kulikowski, and . Wang, Robust error detection in communication and computation channels, Proceedings of Int. Workshop on Spectral Techniques, 2007.

G. Mark, P. Karpovsky, and . Nagvajara, Optimal codes for minimax criterion on error detection, IEEE Trans. Inf. Theory, vol.35, issue.6, pp.1299-1305, 1989.

G. Mark, A. Karpovsky, and . Taubin, New class of nonlinear systematic error detecting codes, IEEE Trans. Inf. Theory, vol.50, issue.8, pp.1818-1820, 2004.

M. Kirschbaum and T. Popp, Evaluation of a DPA-Resistant Prototype Chip, ACSAC, pp.7-11, 2009.

F. , J. Macwilliams, and N. J. Sloane, The Theory of Error-Correcting Codes, 1977.

F. J. Macwilliams, N. J. , and N. Sloane, The theory of error correcting codes. North-Holland mathematical library, 1977.

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2006.

T. S. Messerges, Securing the AES finalists against power analysis attacks, Fast Software Encryption, 7th International Workshop, pp.150-164, 1978.

C. Monteiro, Y. Takahashi, and T. Sekine, Low power secure AES S-box using adiabatic logic circuit, 2013 IEEE Faible Tension Faible Consommation, pp.1-4, 2013.

S. Moore, R. Anderson, R. Mullins, G. Taylor, and J. J. Fournier, Balanced Self-Checking Asynchronous Logic for Smart Card Applications, Journal of Microprocessors and Microsystems, vol.27, issue.9, pp.421-430, 2003.

X. T. Ngo, S. Bhasin, J. Danger, S. Guilley, and Z. Najm, Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses, IEEE International Symposium on Hardware Oriented Security and Trust, pp.82-87, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01240228

S. Patranabis, A. Chakraborty, P. H. Nguyen, and D. Mukhopadhyay, A biased fault attack on the time redundancy countermeasure for AES, Constructive Side-Channel Analysis and Secure Design -6th International Workshop, vol.9064, pp.189-203, 2015.

R. Poussier, Q. Guo, F. Standaert, C. Carlet, and S. Guilley, Connecting and Improving Direct Sum Masking and Inner Product Masking, Smart Card Research and Advanced Applications -16th International Conference, vol.10728, pp.123-141, 2017.

M. Rivain and E. Prouff, Provably Secure Higher-Order Masking of AES, LNCS, vol.6225, pp.413-427, 2010.

S. Saha, D. Jap, J. Breier, S. Bhasin, D. Mukhopadhyay et al., Breaking Redundancy-Based Countermeasures with Random Faults and Power Side Channel, Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2018, pp.15-22, 2018.

T. Schneider, A. Moradi, and T. Güneysu, Partitowards combined hardware countermeasures against sidechannel and fault-injection attacks, Advances in Cryptology -CRYPTO 2016 -36th Annual International Cryptology Conference, vol.9815, pp.302-332, 2016.

R. C. Singleton, University of Sydney (Australia). Magma Computational Algebra System, IEEE Trans. Information Theory, vol.10, issue.2, pp.2014-2022, 1964.

W. Wang, F. Standaert, Y. Yu, S. Pu, J. Liu et al., Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages, Smart Card Research and Advanced Applications -15th International Conference, vol.10146, pp.174-191, 2016.