C. , C. Clavier, J. Danger, G. Duc, M. A. Elaabid et al., Practical Improvements of Side-Channel Attacks on AES Feedback From the 2nd DPA Contest, J. Cryptographic Engineering, vol.4, issue.4, pp.259-274, 2014.

C. Clavier, J. Francq, and A. Wurcker, Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule, IACR Cryptology ePrint Archive, p.877, 2015.

C. Clavier, Q. Isorez, D. Marion, and A. Wurcker, Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks, Cryptography and Communications, vol.49, issue.9, pp.121-162, 2015.
DOI : 10.1007/s12095-014-0112-7

URL : https://hal.archives-ouvertes.fr/hal-01218086

C. Clavier, Q. Isorez, and A. Wurcker, Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis, International Conference on Cryptology in India ? INDOCRYPT '13, pp.116-135, 2013.
DOI : 10.1007/978-3-319-03515-4_8

URL : https://hal.archives-ouvertes.fr/hal-00947642

C. Clavier, D. Marion, and A. Wurcker, Simple Power Analysis on AES Key Expansion Revisited, Cryptographic Hardware and Embedded Systems ? CHES '14, pp.279-297, 2014.
DOI : 10.1007/978-3-662-44709-3_16

URL : https://hal.archives-ouvertes.fr/hal-01218060

C. Clavier and A. Wurcker, Reverse Engineering of a Secret AES-like Cipher by Ineffective Fault Analysis, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.119-128, 2013.
DOI : 10.1109/FDTC.2013.16

URL : https://hal.archives-ouvertes.fr/hal-00947634

D. Gmn-+-13-]-sylvain-guilley, Z. Marion, Y. Najm, A. Souissi, and . Wurcker, Software Camouflage, Foundations and Practice of Security ? FPS '13, pp.122-139, 2013.
DOI : 10.1007/978-3-319-05302-8_8

D. Shématisation-de-la-méthode, Obtention d'un pic de DPA pour la bonne supposition de valeur de clef (en haut) et non-obtention d'un pic lors des mauvaises suppositions (en bas), p.13

C. Shématisation-de-la-méthode, Obtention d'un pic de CPA pour la bonne supposition de valeur de clef (en haut) et non-obtention d'un pic lors des mauvaises suppositions (en bas), p.14

M. Matrice, Gauche : FIRE | Droite : SCARE), p.52

A. Biryukov, A. Bogdanov, D. Khovratovich, and T. Kasper, Collision Attacks on AES-Based MAC: Alpha-MAC, Paillier and Verbauwhede [PV07], pp.166-180
DOI : 10.1007/978-3-540-74735-2_12

[. Brier, C. Clavier, and F. Olivier, Correlation Power Analysis with a Leakage Model, pp.16-29
DOI : 10.1007/978-3-540-28632-5_2

[. Boneh, R. A. Demillo, and R. J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Advances in Cryptology ? EUROCRYPT '97, pp.37-51, 1997.
DOI : 10.1007/3-540-69053-0_4

A. Bogdanov, Improved Side-Channel Collision Attacks on AES
DOI : 10.1007/978-3-540-77360-3_6

A. Bogdanov, Multiple-Differential Side-Channel Collision Attacks on AES, pp.30-44
DOI : 10.1007/978-3-540-85053-3_3

E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, Advances in Cryptology ? CRYPTO '97, pp.513-525, 1997.
DOI : 10.1007/BFb0052259

E. Biham and A. Shamir, Power Analysis of the Key Scheduling of the AES Candidates, Second AES Candidate Conference ? AES2, 1999.

C. Clavier, J. Danger, G. Duc, M. A. Elaabid, B. Gérard et al., Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest, Journal of Cryptographic Engineering, vol.8, issue.1, pp.259-274, 2014.
DOI : 10.1007/s13389-014-0075-9

C. Clavier, B. Feix, G. Gagnerot, M. Roussellet, and V. Verneuil, Improved Collision-Correlation Power Analysis on First Order Protected AES, Cryptographic Hardware and Embedded Systems ? CHES '11, pp.49-62, 2011.
DOI : 10.1007/978-3-642-23951-9_4

URL : https://hal.archives-ouvertes.fr/inria-00633527

C. Clavier, Q. Isorez, D. Marion, and A. Wurcker, Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks, Cryptography and Communications, vol.49, issue.9, pp.121-162, 2015.
DOI : 10.1007/s12095-014-0112-7

URL : https://hal.archives-ouvertes.fr/hal-01218086

C. Clavier, Q. Isorez, and A. Wurcker, Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis, International Conference on Cryptology in India ? INDOCRYPT '13, pp.116-135, 2013.
DOI : 10.1007/978-3-319-03515-4_8

URL : https://hal.archives-ouvertes.fr/hal-00947642

C. Clavier, An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm, International Conference on Information Systems Security ? ICISS '07, pp.143-155, 2007.
DOI : 10.1007/978-3-540-77086-2_11

C. Clavier, Secret External Encodings Do Not Prevent Transient Fault Analysis, Paillier and Verbauwhede [PV07], pp.181-194
DOI : 10.1007/978-3-540-74735-2_13

C. Clavier, D. Marion, and A. Wurcker, Simple Power Analysis on AES Key Expansion Revisited, Batina and Robshaw [BR14], pp.279-297
DOI : 10.1007/978-3-662-44709-3_16

URL : https://hal.archives-ouvertes.fr/hal-01218060

C. Clavier and A. Wurcker, Reverse Engineering of a Secret AES-like Cipher by Ineffective Fault Analysis, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.119-128, 2013.
DOI : 10.1109/FDTC.2013.16

URL : https://hal.archives-ouvertes.fr/hal-00947634

R. Daudigny and H. Ledig, SCARE of the DES, Applied Cryptography and Network Security ? ACNS '05, pp.393-406, 2003.
DOI : 10.1007/11496137_27

D. Gmn-+-13-]-sylvain-guilley, Z. Marion, Y. Najm, A. Souissi, and . Wurcker, Software Camouflage, Foundations and Practice of Security ? FPS '13, pp.122-139, 2013.
DOI : 10.1007/978-3-319-05302-8_8

D. Genkin, I. Pipman, and E. Tromer, Get your hands off my laptop: physical side-channel key-extraction attacks on PCs, Batina and Robshaw [BR14], pp.242-260
DOI : 10.1007/s13389-015-0100-7

L. Sylvain-guilley, J. Sauvage, D. Micolod, F. Réal, and . Valette, Defeating Any Secret Cryptography with SCARE Attacks, Progress in Cryptology ? LATINCRYPT '10, pp.273-293, 2010.
DOI : 10.1007/978-3-642-14712-8_17

M. Joye, J. Quisquater, S. Yen, and M. Yung, Observability Analysis - Detecting When Improved Cryptosystems Fail -, Topics in Cryptology ? CT-RSA '02, pp.17-29, 2002.
DOI : 10.1007/3-540-45760-7_2

]. D. Kes and . Kesner, Free VHDL 6502 core

C. Paul, J. Kocher, B. Jaffe, and . Jun, Differential Power Analysis, Advances in Cryptology ? CRYPTO '99, pp.388-397, 1999.

C. Paul and . Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Advances in Cryptology ? CRYPTO '96, pp.104-113, 1996.

[. Lemke-rust and C. Paar, Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods, European Symposium on Research in Computer Security ? ESORICS '07, pp.454-468, 2007.
DOI : 10.1007/978-3-540-74835-9_30

S. Mangard, A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion, Information Security and Cryptology ? ICISC '02, pp.343-358, 2003.
DOI : 10.1007/3-540-36552-4_24

T. S. Messerges, E. A. Dabbish, and R. H. Sloan, Investigations of Power Analysis Attacks on Smartcards, WOST '99 : Proceedings of the USENIX Workshop on Smartcard Technology, pp.151-162, 1999.

S. Thomas and . Messerges, Using Second-Order Power Analysis to Attack DPA Resistant Software, pp.238-251

S. Mangard, E. Oswald, and T. Popp, Power analysis attacks revealing the secrets of smart cards, 2007.

[. Mayer-sommer, Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards, Koç and Paar [KP00], pp.78-92
DOI : 10.1007/3-540-44499-8_6

R. Novak, Side-Channel Attack on Substitution Blocks, Applied Cryptography and Network Security ? ACNS '03, pp.307-318
DOI : 10.1007/978-3-540-45203-4_24

R. Novak, Sign-Based Differential Power Analysis, Workshop on Information Security Applications ? WISA '03, pp.203-216, 2003.
DOI : 10.1007/978-3-540-24591-9_16

M. Manuel-san-pedro, S. Soos, and . Guilley, FIRE : Fault Injection for Reverse Engineering Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication -5th IFIP WG 11.2 International Workshop, Proceedings, volume 6633 of Lecture Notes in Computer Science, pp.280-293, 2011.

D. Réal, V. Dubois, and A. Guilloux, SCARE of an Unknown Hardware Feistel Implementation, Smart Card Research and Advanced Application ? CARDIS '08, pp.218-227, 2008.
DOI : 10.1007/978-3-540-31815-6_35

M. Rivain and E. Prouff, Provably Secure Higher-Order Masking of AES, Cryptographic Hardware and Embedded Systems ? CHES '10, pp.413-427, 2010.
DOI : 10.1007/978-3-642-15031-9_28

M. Rivain and T. Roche, SCARE of Secret Ciphers with SPN Structures, Advances in Cryptology ? ASIA- CRYPT '13, Lecture Notes in Computer Science, 2013.
DOI : 10.1007/978-3-642-42033-7_27

K. Schramm, G. Leander, P. Felke, and C. Paar, A Collision-Attack on AES, Joye and Quisquater, pp.163-175
DOI : 10.1007/978-3-540-28632-5_12

K. Schramm, T. J. Wollinger, and C. Paar, A New Class of Collision Attacks and Its Application to DES, Fast Software Encryption ? FSE '03, pp.206-222, 2003.
DOI : 10.1007/978-3-540-39887-5_16

J. Vanlaven, M. Brehob, and K. J. Compton, Side Channel Analysis, Fault Injection and Applications -A Computationally Feasible SPA Attack on AES via Optimized Search, Security and Privacy in the Age of Ubiquitous Computing ? SEC '05, pp.577-588, 2005.

[. Yen and M. Joye, Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis, IEEE Transactions on Computers, vol.49, issue.9, pp.967-970, 2000.