, can be divided for instance because of decimator stage, the second reason is that the random value is often stored in flip-flop and those elements are known to be easy to fault. Therefore, if EMFI platforms become fast enough to strongly bias TRNG output

. Publications-?-maxime, M. Madau, P. Agoyan, and . Maurine, An EM fault injection susceptibility criterion and its application to the localization of hotspots, Smart Card Research and Advanced Applications -16th International Conference, pp.180-195, 2017.

M. ?-maxime-madau, J. Agoyan, M. Balash, P. Grujic, P. Haddad et al., the impact of pulsed electromagnetic fault injection on true random number generators, Workshop on Fault Diagnosis and Tolerance in Cryptography, 2018.

. Bibliography,

M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti, Control-flow integrity principles, implementations, and applications, ACM Trans. Inf. Syst. Secur, vol.13, issue.1, 2009.

G. Agosta, A. Barenghi, and G. Pelosi, A code morphing methodology to automate power analysis countermeasures, 2012.

H. Akaike, Akaike's information criterion, International Encyclopedia of Statistical Science, p.25, 2011.

A. Amarilli, S. Müller, D. Naccache, D. Page, P. Rauzy et al., Can code polymorphism limit information leakage? In Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication -5th IFIP WG 11.2 International Workshop, WISTP, pp.1-21, 2011.

Z. Aweke, R. Salessawi-ferede-yitbarek, R. Qiao, M. Das, Y. Hicks et al., Anvil: Software-based protection against nextgeneration rowhammer attacks, vol.04, p.2016

J. Balasch, D. Arumí, and S. Manich, Design and validation of a platform for electromagnetic fault injection, 2017 32nd Conference on Design of Circuits and Integrated Systems (DCIS), pp.1-6, 2017.

J. Balasch, S. Faust, B. Gierlichs, and I. Verbauwhede, Theory and practice of a leakage resilient masking scheme, Advances in Cryptology -ASIACRYPT 2012 -18th International Conference on the Theory and Application of Cryptology and Information Security, pp.758-775, 2012.

A. Barenghi, L. Breveglieri, I. Koren, G. Pelosi, and F. Regazzoni, Countermeasures against fault attacks on software implemented AES: effectiveness and cost, Proceedings of the 5th Workshop on Embedded Systems Security, WESS 2010, p.7, 2010.

T. Barry, D. Couroussé, and B. Robisson, Compilation of a countermeasure against instruction-skip fault attacks, Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, pp.1-6, 2016.
URL : https://hal.archives-ouvertes.fr/cea-01296572

A. Battistello and C. Giraud, Fault analysis of infective AES computations, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.101-107, 2013.

P. Bayon, L. Bossuet, A. Aubert, V. Fischer, F. Poucheret et al., Contactless electromagnetic active attack on ring oscillator based true random number generator, COSADE, pp.151-166, 2012.
URL : https://hal.archives-ouvertes.fr/ujm-00699618

P. Bayon, L. Bossuet, A. Aubert, V. Fischer, F. Poucheret et al., Contactless electromagnetic active attack on ring oscillator based true random number generator, Constructive Side-Channel Analysis and Secure Design, pp.151-166, 2012.
URL : https://hal.archives-ouvertes.fr/ujm-00699618

A. Galip-bayrak, N. Velickovic, P. Ienne, and W. Burleson, An architecture-independent instruction shuffler to protect against side-channel attacks

, ACM Trans. Archit. Code Optim, vol.8, issue.4, 2012.

G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, and V. Piuri, Error analysis and detection procedures for a hardware implementation of the advanced encryption standard, IEEE Trans. Computers, vol.52, issue.4, pp.492-505, 2003.

S. Bhasin, J. Danger, S. Guilley, and Z. Najm, NICV: normalized inter-class variance for detection of side-channel leakage, IACR Cryptology ePrint Archive, p.717, 2013.
URL : https://hal.archives-ouvertes.fr/hal-02412040

S. Bhattacharya and D. Mukhopadhyay, Curious case of rowhammer: Flipping secret exponent bits using timing analysis, Cryptographic Hardware and Embedded Systems -CHES 2016 -18th International Conference, pp.602-624, 2016.

F. Brasser, L. Davi, D. Gens, C. Liebchen, and A. Sadeghi, Can't touch this: Software-only mitigation against rowhammer attacks targeting kernel memory, 26th USENIX Security Symposium (USENIX Security 17), pp.117-130, 2017.

J. Breier, S. Bhasin, and W. He, An electromagnetic fault injection sensor using hogge phase-detector, 2017 18th International Symposium on Quality Electronic Design (ISQED), pp.307-312, 2017.

S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi, Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology -CRYPTO '99, vol.1666, pp.398-412, 1999.

Z. Chen, J. Shen, A. Nicolau, A. V. Veidenbaum, N. Farhady-ghalaty et al., CAMFAS: A compiler approach to mitigate fault attacks via enhanced simdization, IACR Cryptology ePrint Archive, p.1083, 2017.

Y. Cheng, Z. Zhang, S. Nepal, and Z. Wang, Cattmew : Defeating software-only physical kernel isolation, 2019.

L. Chusseau, R. Omarouayache, J. Raoult, S. Jarrix, P. Maurine et al., Electromagnetic analysis, deciphering and reverse engineering of integrated circuits (e-mata hari), 22nd International Conference on Very Large Scale Integration (VLSI-SoC), pp.1-6, 2014.
URL : https://hal.archives-ouvertes.fr/lirmm-01434592

C. Clavier, Secret external encodings do not prevent transient fault analysis, Cryptographic Hardware and Embedded Systems -CHES 2007, 9th International Workshop, pp.181-194, 2007.

L. Cojocar, K. Razavi, C. Giuffrida, and H. Bos, Exploiting correcting codes : On the effectiveness of ecc memory against rowhammer attacks, 2018.

D. Couroussé, B. Robisson, J. Lanet, T. Barry, H. Noura et al., COGITO: code polymorphism to secure devices, SECRYPT 2014 -Proceedings of the 11th International Conference on Security and Cryptography, pp.451-456, 2014.

A. Cui and R. Housley, BADFET: Defeating modern secure boot using secondorder pulsed electromagnetic fault injection, 11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017.

A. Dehbaoui, J. Dutertre, B. Robisson, and A. Tria, Electromagnetic transient faults injection on a hardware and a software implementations of aes, FDTC, pp.7-15, 2012.
URL : https://hal.archives-ouvertes.fr/emse-00742639

A. Dehbaoui, V. Lomné, T. Ordas, L. Torres, M. Robert et al., Enhancing electromagnetic analysis using magnitude squared incoherence, IEEE Trans. VLSI Syst, vol.20, issue.3, pp.573-577, 2012.
URL : https://hal.archives-ouvertes.fr/lirmm-00761786

A. Dehbaoui, V. Lomné, P. Maurine, L. Torres, and M. Robert, Enhancing electromagnetic attacks using spectral coherence based cartography, vol.10, pp.135-155, 2009.
URL : https://hal.archives-ouvertes.fr/lirmm-00429342

A. Dehbaoui, . Amir-pasha, N. Mirbaha, J. Moro, A. Dutertre et al., Electromagnetic glitch on the AES round counter, Constructive Side-Channel Analysis and Secure Design -4th International Workshop, COSADE 2013, pp.17-31, 2013.
URL : https://hal.archives-ouvertes.fr/emse-00837514

I. Diop, P. Liardet, Y. Linge, and P. Maurine, Collision based attacks in practice, Euromicro Conference on Digital System Design, pp.367-374, 2015.
URL : https://hal.archives-ouvertes.fr/lirmm-01269809

C. Dobraunig, M. Eichlseder, T. Korak, S. Mangard, F. Mendel et al., Sifa: Exploiting ineffective fault inductions on symmetric cryptography, IACR Transactions on Cryptographic Hardware and Embedded Systems, vol.2018, issue.3, pp.547-572, 2018.

D. El-baze, J. Rigaud, and P. Maurine, An embedded digital sensor against EM and BB fault injection, Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016, pp.78-86, 2016.
URL : https://hal.archives-ouvertes.fr/lirmm-01434028

B. Gierlichs, J. Schmidt, and M. Tunstall, Infective computation and dummy rounds: Fault protection for block ciphers without check-beforeoutput, Progress in Cryptology -LATINCRYPT 2012 -2nd International Conference on Cryptology and Information Security in Latin America, pp.305-321, 2012.

C. Giraud, DFA on AES, Advanced Encryption Standard -AES, 4th International Conference, pp.27-41, 2004.

L. Goubin and J. Patarin, DES and Differential Power Analysis (The "Duplication" Method), Cryptographic Hardware and Embedded Systems -CHES'99, vol.1717, pp.158-172, 1999.

D. Gruss, M. Lipp, M. Schwarz, D. Genkin, J. Juffinger et al., Another flip in the wall of rowhammer defenses, 2018 IEEE Symposium on Security and Privacy, pp.245-261, 2018.

D. Gruss, C. Maurice, and S. Mangard, Rowhammer.js: A remote software-induced fault attack in javascript, Detection of Intrusions and Malware, and Vulnerability Assessment -13th International Conference, DIMVA 2016, pp.300-321, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01872588

J. Guajardo, S. Sandeep, and . Kumar, FPGA intrinsic pufs and their use for IP protection, Cryptographic Hardware and Embedded Systems -CHES 2007, 9th International Workshop, pp.63-80, 2007.

M. Hamburg, P. Kocher, and M. E. Marson, Analysis of intel's ivy bridge digital random number generator prepared for intel by, vol.04, 2019.

L. Hars, Random number generation based on oscillatory metastability in ring circuits, IACR Cryptology ePrint Archive, p.637, 2011.

N. Homma, Y. Hayashi, N. Miura, D. Fujimoto, D. Tanaka et al., EM attack is non-invasive? -design methodology and validity verification of EM attack sensor, Cryptographic Hardware and Embedded Systems -CHES 2014 -16th International Workshop, pp.1-16, 2014.

G. Irazoqui, T. Eisenbarth, and B. Sunar, MASCAT: stopping microarchitectural attacks before execution, IACR Cryptology ePrint Archive, p.1196, 2016.

M. Hutter and J. Schmidt, Optical and em fault-attacks on crt-based rsa: Concrete results, Proceedings of the 15th Austrian Workhop on Microelectronics, 2007.

R. Karri, G. Kuznetsov, and M. Gössel, Parity-based concurrent error detection of substitution-permutation network block ciphers, pp.113-124, 2003.

Y. Kim, R. Daly, J. Kim, C. Fallin, J. Lee et al., Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors, ACM/IEEE 41st International Symposium on Computer Architecture, pp.361-372, 2014.

C. Paul and . Kocher, Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems, CRYPTO '96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, pp.104-113, 1996.

B. Lac, A. Canteaut, J. A. Jacques, R. Fournier, and . Sirdey, Thwarting fault attacks against lightweight cryptography using SIMD instructions, IEEE International Symposium on Circuits and Systems, pp.1-5, 2018.
URL : https://hal.archives-ouvertes.fr/cea-01746138

M. Lacruche and P. Maurine, Electromagnetic activity vs. logical activity: Near field scans for reverse engineering, Smart Card Research and Advanced Applications, 17th International Conference, pp.140-155, 2018.
URL : https://hal.archives-ouvertes.fr/lirmm-01943151

J. Lalande, K. Heydemann, and P. Berthomé, Software countermeasures for control flow integrity of smart card C codes, Computer Security -ESORICS 2014 -19th European Symposium on Research in Computer Security, pp.200-218, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01059201

M. Lipp, M. Misiker-tadesse-aga, D. Schwarz, C. Gruss, L. Maurice et al., Nethammer: Inducing rowhammer faults through network requests, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01872588

V. Lomné, T. Roche, and A. Thillard, On the need of randomness in fault attack countermeasures -application to AES, Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.85-94, 2012.

M. Madau, M. Agoyan, J. Balash, M. Grujic, P. Haddad et al., the impact of pulsed electromagnetic fault injection on true random number generators, Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC, 2018.
URL : https://hal.archives-ouvertes.fr/lirmm-01943112

M. Madau, M. Agoyan, and P. Maurine, An EM fault injection susceptibility criterion and its application to the localization of hotspots, Smart Card Research and Advanced Applications -16th International Conference, pp.180-195, 2017.
URL : https://hal.archives-ouvertes.fr/lirmm-02100194

P. Maistri and R. Leveugle, Double-data-rate computation as a countermeasure against fault analysis, IEEE Trans. Computers, vol.57, issue.11, pp.1528-1539, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00348325

P. Maistri, P. Vanhauwaert, and R. Leveugle, A novel double-data-rate AES architecture resistant against fault injection, Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.54-61, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00181356

A. , T. Markettos, and S. W. Moore, The frequency injection attack on ring-oscillator-based true random number generators, Cryptographic Hardware and Embedded Systems -CHES 2009, pp.317-331, 2009.

A. , T. Markettos, and S. W. Moore, The frequency injection attack on ringoscillator-based true random number generators, Cryptographic Hardware and Embedded Systems -CHES 2009, 11th International Workshop, pp.317-331, 2009.

P. Maurine, Techniques for em fault injection: Equipments and experimental results, pp.3-4, 2012.
URL : https://hal.archives-ouvertes.fr/lirmm-00761778

N. Miura, Z. Najm, W. He, S. Bhasin, X. T. Ngo et al., Pll to the rescue: a novel em fault countermeasure, pp.1-6, 2016.
URL : https://hal.archives-ouvertes.fr/hal-02288461

N. Moro, A. Dehbaoui, K. Heydemann, B. Robisson, and E. Encrenaz, Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller, 2014.
URL : https://hal.archives-ouvertes.fr/emse-00871218

N. Moro, K. Heydemann, E. Encrenaz, and B. Robisson, Formal verification of a software countermeasure against instruction skip attacks
URL : https://hal.archives-ouvertes.fr/emse-00869509

, J. Cryptographic Engineering, vol.4, issue.3, pp.145-156, 2014.

D. Naccache, Q. Phong, M. Nguyen, C. Tunstall, and . Whelan, Experimenting with faults, lattices and the DSA, IACR Cryptology ePrint Archive, p.277, 2004.

W. Laurence, D. O. Nagel, and . Pederson, Spice (simulation program with integrated circuit emphasis), 1973.

Q. Phong, I. E. Nguyen, and . Shparlinski, The insecurity of the digital signature algorithm with partially known nonces, J. Cryptology, vol.15, issue.3, pp.151-176, 2002.

Q. Phong, I. E. Nguyen, and . Shparlinski, The insecurity of the elliptic curve digital signature algorithm with partially known nonces, Des. Codes Cryptography, vol.30, issue.2, pp.201-217, 2003.

R. Omarouayache, J. Raoult, S. Jarrix, L. Chusseau, and P. Maurine, Magnetic microprobe design for em fault attack, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01893856

R. Omarouayache, Near-field electromagnetic imagery at millimeter waves and microwave near-field injection, Systèmes (Montpellier), vol.12, p.2015
URL : https://hal.archives-ouvertes.fr/tel-01496503

R. Omarouayache, S. Raoult, L. Jarrix, P. Chusseau, and . Maurine, Magnetic microprobe design for em fault attack, vol.01, p.2013
URL : https://hal.archives-ouvertes.fr/hal-01893856

S. Ordas, L. Guillaume-sage, and P. Maurine, EM injection: Fault model and locality, Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2015, pp.3-13, 2015.
URL : https://hal.archives-ouvertes.fr/lirmm-01319078

S. Ordas, Master's thesis, École Doctorale Information, Structures, Systèmes (Montpellier), vol.11, p.2015

K. Park, S. Lim, D. Yun, and S. Baeg, Experiments and root cause analysis for active-precharge hammering fault in ddr3 sdram under 3x nm technology, Microelectronics Reliability, vol.57, pp.39-46, 2016.

S. Patranabis, A. Chakraborty, and D. Mukhopadhyay, Fault tolerant infective countermeasure for AES, Security, Privacy, and Applied Cryptography Engineering -5th International Conference, pp.190-209, 2015.

S. Picek, L. Batina, P. Buzing, and D. Jakobovic, Fault injection with a new flavor: Memetic algorithms make a difference, Constructive Side-Channel Analysis and Secure Design -6th International Workshop, pp.159-173, 2015.

G. Piret and J. Quisquater, A differential fault attack technique against SPN structures, with application to the AES and KHAZAD, Cryptographic Hardware and Embedded Systems -CHES 2003, 5th International Workshop, pp.77-88, 2003.

F. Poucheret, K. Tobich, M. Lisart, L. Chusseau, B. Robisson et al., Local and direct em injection of power into cmos integrated circuits, FDTC, pp.100-104, 2011.

R. Qiao and M. Seaborn, A new approach for rowhammer attacks, 2016 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2016, pp.161-166, 2016.

J. J. Quisquater and . Samyde, Eddy current for magnetic analysis with active sensor, Proceedings of ESmart, pp.185-194, 2002.

D. Réal, F. Valette, and M. Drissi, Enhancing correlation electromagnetic attack using planar near-field cartography, Design, Automation and Test in Europe, pp.628-633, 2009.

L. Sauvage, S. Guilley, F. Flament, J. Danger, and Y. Mathieu, Blind cartography for side channel attacks: Cross-correlation cartography

, Int. J. Reconfig. Comp, vol.360242, issue.9, pp.1-360242, 2012.

L. Sauvage, S. Guilley, F. Flament, J. Danger, and Y. Mathieu, Blind cartography for side channel attacks: Cross-correlation cartography

, Int. J. Reconfig. Comp, vol.360242, issue.9, pp.1-360242, 2012.

T. Schneider and A. Moradi, Leakage assessment methodology -A clear roadmap for side-channel evaluations, Cryptographic Hardware and Embedded Systems -CHES 2015 -17th International Workshop, pp.495-513, 2015.

B. Sunar, W. J. Martin, and D. R. Stinson, A provably secure true random number generator with built-in tolerance to active attacks, IEEE Transactions on Computers, vol.56, issue.1, pp.109-119, 2007.

A. Tatar, R. Krishnan-konoth, E. Athanasopoulos, C. Giuffrida, H. Bos et al., Throwhammer: Rowhammer attacks over the network and defenses, 2018 USENIX Annual Technical Conference, USENIX ATC 2018, pp.213-226, 2018.

C. D. Walter, Data integrity in hardware for modular arithmetic, Cryptographic Hardware and Embedded Systems -CHES 2000, Second International Workshop, pp.204-215, 2000.

K. Wilken and J. P. Shen, Continuous signature monitoring: efficient concurrentdetection of processor control errors, International Test Conference 1988 Proceeding New Frontiers in Testing, pp.914-925, 1988.

B. Chih-hsu-yen and . Wu, Simple error detection methods for hardware implementation of advanced encryption standard, IEEE Trans. Computers, vol.55, issue.6, pp.720-731, 2006.

L. Zussa, A. Dehbaoui, K. Tobich, J. Dutertre, P. Maurine et al., Efficiency of a glitch detector against electromagnetic fault injection, DATE, pp.1-6, 2014.
URL : https://hal.archives-ouvertes.fr/lirmm-01096047

L. Zussa, A. Dehbaoui, K. Tobich, D. Jean-max, P. Maurine et al., Efficiency of a glitch detector against electromagnetic fault injection, DATE: Design, Automation and Test in Europe, Design, Automation and Test in Europe Conference and Exhibition (DATE), pp.1-6, 2014.
URL : https://hal.archives-ouvertes.fr/lirmm-01096047