1. Aghaie, A., Moradi, A., Rasoolzadeh, S., Shahmirzadi, A.R., Schellenberg, F., Schneider, T.: Impeccable circuits. Cryptology ePrint archive, report 2018/203 (2018). https://eprint.iacr.org/2018/203. Accessed 18 Jan 2020
2. Baksi, A., Bhasin, S., Breier, J., Khairallah, M., Peyrin, T.: Protecting block ciphers against differential fault attacks without re-keying. In: 2018 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018, Washington, DC, USA, April 30–May 4, 2018, pp. 191–194 (2018). https://doi.org/10.1109/HST.2018.8383913
3. Banik, S., Bogdanov, A.: Cryptanalysis of two fault countermeasure schemes. In: Progress in Cryptology—INDOCRYPT 2015—16th International Conference on Cryptology in India, Bangalore, India, December 6–9, 2015, Proceedings, pp. 241–252 (2015). https://doi.org/10.1007/978-3-319-26617-6_13
4. Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer’s apprentice guide to fault attacks. IACR cryptology ePrint archive , vol. 2004, p. 100 (2004). http://dblp.uni-trier.de/db/journals/iacr/iacr2004.html#Bar-ElCNTW04
5. Barenghi, A., Breveglieri, L., Koren, I., Naccache, D.: Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. Proc. IEEE 100(11), 3056–3076 (2012). https://doi.org/10.1109/JPROC.2012.2188769