H. Bar-el, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, vol.94, issue.2, pp.370-382, 2006.

S. Bhattacharya and D. Mukhopadhyay, Curious case of rowhammer: Flipping secret exponent bits using timing analysis, Cryptographic Hardware and Embedded Systems -CHES 2016, pp.602-624, 2016.

E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, Advances in Cryptology -CRYPTO '97, pp.513-525, 1997.

A. Bogdanov, D. Khovratovich, and C. Rechberger, Biclique cryptanalysis of the full aes, Advances in Cryptology -ASIACRYPT 2011, pp.344-371, 2011.

D. Boneh, R. A. Demillo, and R. J. Lipton, On the importance of checking cryptographic protocols for faults, Advances in Cryptology -EUROCRYPT '97, pp.37-51, 1997.

A. Caforio and S. Banik, A Study of Persistent Fault Analysis, Security, Privacy, and Applied Cryptography Engineering -9th International Conference, SPACE 2019, vol.11947, pp.13-33, 2019.

S. Carré, M. Desjardins, A. Facon, and S. Guilley, OpenSSL Bellcore's Protection Helps Fault Attack, Martin Novotný, Nikos Konofaos, and Amund Skavhaug, pp.500-507, 2018.

P. Dusart, G. Letourneux, and O. Vivolo, Differential Fault Analysis on, Applied Cryptography and Network Security, pp.293-306, 2003.

D. Gruss, C. Maurice, and S. Mangard, Rowhammer.js: A remote software-induced fault attack in javascript, Detection of Intrusions and Malware, and Vulnerability Assessment, vol.2016, pp.300-321, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01872588

S. Jain and D. Vishwani, Statistical Fault Analysis, IEEE Design Test of Computers, vol.2, issue.1, pp.38-44, 1985.

Y. Kim, R. Daly, J. Kim, C. Fallin, J. H. Lee et al., Flipping bits in memory without accessing them: An experimental study of dram disturbance errors, SIGARCH Comput. Archit. News, vol.42, issue.3, pp.361-372, 2014.

Y. Li, K. Sakiyama, S. Gomisawa, T. Fukunaga, J. Takahashi et al., Fault sensitivity analysis, Cryptographic Hardware and Embedded Systems, CHES 2010, pp.320-334, 2010.
URL : https://hal.archives-ouvertes.fr/hal-02287186

K. Murdock, D. Oswald, F. D. Garcia, J. V. Bulck, D. Gruss et al., Plundervolt: Software-based Fault Injection Attacks against Intel SGX

O. Mutlu and J. S. Kim, Rowhammer: A retrospective, 2019.

, NIST. AES Proposal: Rijndael (now FIPS PUB 197, 2003.

G. Piret and J. Quisquater, A differential fault attack technique against spn structures, with application to the aes and khazad, Cryptographic Hardware and Embedded Systems -CHES 2003, pp.77-88, 2003.

K. Razavi, B. Gras, E. Bosman, B. Preneel, C. Giuffrida et al., Flip feng shui: Hammering a needle in the software stack, 25th USENIX Security Symposium (USENIX Security 16), pp.1-18, 2016.

M. Rivain, Differential Fault Analysis on DES Middle Rounds, Cryptographic Hardware and Embedded Systems -CHES 2009, pp.457-469, 2009.

C. Roscian, J. Dutertre, and A. Tria, Frontside laser fault injection on cryptosystems -Application to the AES' last round, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.119-124, 2013.
URL : https://hal.archives-ouvertes.fr/emse-01109128

J. Schmidt, M. Hutter, and T. Plos, Optical Fault Attacks on AES: A Threat in Violet, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.13-22, 2009.

M. Tunstall, D. Mukhopadhyay, and S. Ali, Differential fault analysis of the advanced encryption standard using a single fault, Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, pp.224-233, 2011.
URL : https://hal.archives-ouvertes.fr/hal-01573310

N. Veyrat-charvillon, B. Gérard, and F. Standaert, Security evaluations beyond computing power, Advances in Cryptology -EUROCRYPT 2013, vol.7881, pp.126-141, 2013.

F. Zhang, X. Lou, X. Zhao, S. Bhasin, W. He et al., Persistent fault analysis on block ciphers, IACR Transactions on Cryptographic Hardware and Embedded Systems, vol.2018, issue.3, pp.150-172, 2018.

F. Zhang, Y. Zhang, H. Jiang, X. Zhu, S. Bhasin et al., Persistent fault attack in practice, IACR Trans. Cryptogr. Hardw. Embed. Syst, vol.2020, issue.2, pp.172-195, 2020.