P. C. Kocher, Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems, in Advances in Cryptology—CRYPTO’96, N. Koblitz, ed. Berlin, Germany: Springer, 1996, pp. 104–113.
R. Spreitzer, V. Moonsamy, T. Korak, and S. Mangard, Systematic classification of side-channel attacks: A case study for mobile devices, IEEE Commun. Surv. Tutor., vol. 20, no. 1, pp. 465–488, 2018.
A. Boscher and H. Handschuh, Masking does not protect against differential fault attacks, in Proc. 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, Washington, DC, USA, 2008, pp. 35–40.
W. Hu, A. Althoff, A. Ardeshiricham, and R. Kastner, Towards property driven hardware security, in Proc. 2016 17th Int. Workshop on Microprocessor and SOC Test and Verification (MTV), Austin, TX, USA, 2017, pp. 51–56.
H. Wang, H. Li, F. Rahman, M. M. Tehranipoor, and F. Farahmandi, SoFI: Security property-driven vulnerability assessments of ICs against fault-injection attacks, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., vol. 41, no. 3, pp. 452–465, 2022.
D. Boneh, R. A. DeMillo, and R. J. Lipton, On the importance of checking cryptographic protocols for faults, in Advances in Cryptology — EUROCRYPT’97, W. Fumy, Ed. Berlin, Germany: Springer, 1997, pp. 37–51.
E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, in Advances in Cryptology—CRYPTO’97, W. Fumy, Ed. Berlin, Germany: Springer, 1997, pp. 513–525.
N. T. Courtois, K. Jackson, and D. Ware, Fault-algebraic attacks on inner rounds of DES, in Proc. the Strategies Telecom and Multimedia, Montreuil, France. 2010.
C. Clavier and A. Wurcker, Reverse engineering of a secret AES-like cipher by ineffective fault analysis, in Proc. 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, 2013, pp. 119–128.
A. Wang, M. Chen, Z. Wang, and X. Wang, Fault rate analysis: Breaking masked AES hardware implementations efficiently, IEEE Trans. Circuits Syst. II, vol. 60, no. 8, pp. 517–521, 2013.
T. Fuhr, E. Jaulmes, V. Lomné, and A. Thillard, Fault attacks on AES with faulty ciphertexts only, in Proc. 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, 2013, pp. 108–118.
C. Dobraunig, M. Eichlseder, T. Korak, S. Mangard, F. Mendel, and R. Primas, Sifa: Exploiting ineffective fault inductions on symmetric cryptography, IACR Trans. Cryptogr. Hardw. Embed. Syst., vol. 2018, no. 3, pp. 547–572, 2018.
F. Zhang, X. Lou, X. Zhao, S. Bhasin, W. He, R. Ding, S. Qureshi, and K. Ren, Persistent fault analysis on block ciphers, IACR Trans. Cryptogr. Hardw. Embed. Syst., vol. 2018, no. 3, pp.150–172, 2018.
G. Wang and S. Wang, Differential fault analysis on PRESENT key schedule, in Proc. 2010 Int. Conf. Computational Intelligence and Security, Nanning, China, 2011, pp. 362–366.
H. Momeni, M. Masoumi, and A. Dehghan, A practical fault induction attack against an FPGA implementation of AES cryptosystem, in Proc. World Congress on Internet Security (WorldCIS-2013), London, UK, 2014, pp. 134–138.
S. S. Ali and D. Mukhopadhyay, A differential fault analysis on AES key schedule using single fault, in Proc. 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, Nara, Japan, 2011, pp. 35–42.
X. X. Wang, H. Wei, T. Jing, Z. Jiacheng, and T. Shibo, Correlation fault attack on aes, Journal of Xidian University, vol. 48, no. 4, pp. 192–199, 2021.
J. Takahashi and T. Fukunaga, Differential fault analysis on AES with 192 and 256-bit key, in Proc. 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, Santa Barbara, CA, USA, 2010, pp. 3–9.
L. Han, N. Wu, F. Ge, F. Zhou, J. Wen, and P. Qing, Differential fault attack for the iterative operation of AES-192 key expansion, in Proc. 2020 IEEE 20th Int. Conf. Communication Technology (ICCT), Nanning, China, 2020, pp. 1156–1160.
F. Zhang, S. Guo, X. Zhao, T. Wang, J. Yang, F. X. Standaert, and D. Gu, A framework for the analysis and evaluation of algebraic fault attacks on lightweight block ciphers, IEEE Trans. Inf. Forensics Secur., vol. 11, no. 5, pp. 1039–1054, 2016.
M. Gay, T. Paxian, D. Upadhyaya, B. Becker, and I. Polian, Hardware-oriented algebraic fault attack framework with multiple fault injection support, in Proc. 2019 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Atlanta, GA, USA, 2019, pp. 25–32.
S. Saha, M. Alam, A. Bag, D. Mukhopadhyay, and P. Dasgupta, Leakage assessment in fault attacks: A deep learning perspective, https://eprint.iacr.org/2020/306, 2020.
F. Zhang, Y. Zhang, H. Jiang, X. Zhu, S. Bhasin, X. Zhao, Z. Liu, D. Gu, and K. Ren, Persistent fault attack in practice, IACR Trans. Cryptogr. Hardw. Embed. Syst., vol. 2020, no. 2, pp. 172–195, 2020.
G. Xu, F. Zhang, B. Yang, X. Zhao, W. He, and K. Ren, Pushing the limit of PFA: Enhanced persistent fault analysis on block ciphers, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., vol. 40, no. 6, pp. 1102–1116, 2021.
K. Bae, S. Moon, D. Choi, Y. Choi, H. D. Kim, and J. Ha, A practical analysis of fault attack countermeasure on AES using data masking, in Proc. Int. Conf. Computing and Convergence Technology (ICCCT), Seoul, Republic of Korea, 2012, pp. 508–513.
X. Wang, J. Zheng, L. Wu, J. Zhu, and W. Hu, A correlation fault attack on rotating S-box masking AES, in Proc. 2021 Asian Hardware Oriented Security and Trust Symp. (AsianHOST), Shanghai, China, 2022, pp. 1–6.
C. Dobraunig, M. Eichlseder, H. Gross, S. Mangard, F. Mendel, and R. Primas, Statistical ineffective fault attacks on masked AES with fault countermeasures, in Proc. 24th Int. Conf. Theory and Application of Cryptology and Information Security, Taipei, China, 2018, pp. 315–342.