1. Aumüller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.-P.: Fault attacks on RSA with CRT: concrete results and practical countermeasures. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES, Volume 2523 of Lecture Notes in Computer Science, pp. 260–275. Springer, Berlin (2002)
2. Baek, Y.-J., Vasyltsov, I.: How to prevent DPA and fault attack in a unified way for ECC scalar multiplication-ring extension method. In: Dawson, E., Wong, D.S. (eds.) Information Security Practice and Experience, Volume 4464 of Lecture Notes in Computer Science, pp. 225–237. Springer, Berlin (2007)
3. Barthe, G., Dupressoir, F., Fouque, P., Grégoire, B., Zapalowicz, J.: Synthesis of fault attacks on cryptographic implementations. In: Ahn, G., Yung, M., Li, N. (eds) Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3–7, 2014, pp. 1016–1027. ACM (2014)
4. Battistello, A.: Constructive Side-Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13–15, 2014. Revised selected papers, chapter common points on elliptic curves: the achilles’ heel of fault attack countermeasures, pp.69–81. Springer International Publishing, Cham (2014)
5. Bernstein, D.J., Birkner, P., Joye, M., Lange, T., Peters, C.: Twisted edwards curves. In: Vaudenay, S. (ed), Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11–14, 2008. Proceedings, Volume 5023 of Lecture Notes in Computer Science, pp. 389–405. Springer(2008)