1. E. Biham, A. Shamir, Differential fault analysis of secret key cryptosystems, in Advances in Cryptology - CRYPTO ’97, ed. by B.S. Kaliski (Springer, Berlin, 1997), pp. 513–525. ISBN: 978-3-540-69528-8
2. W. He, J. Breier, S. Bhasin, Cheap and cheerful: A low-cost digital sensor for detecting laser fault injection attacks, in Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14–18, 2016, Proceedings (2016), pp. 27–46. https://doi.org/10.1007/978-3-319-49445-6_2
3. H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan, The sorcerer’s apprentice guide to fault attacks. IACR Cryptology ePrint Archive, 2004:100 (2004), http://dblp.uni-trier.de/db/journals/iacr/iacr2004.html#Bar-ElCNTW04
4. A. Baksi, S. Bhasin, J. Breier, M. Khairallah, T. Peyrin, Protecting block ciphers against differential fault attacks without re-keying (extended version). Cryptology ePrint Archive, Report 2018/085 (2018), https://eprint.iacr.org/2018/085
5. A. Battistello, C. Giraud, Fault analysis of infective AES computations, in 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, Los Alamitos, CA, USA, August 20, 2013, pp. 101–107. https://doi.org/10.1109/FDTC.2013.12