1. R. Anderson, M.G. Kuhn, Tamper resistance—a cautionary note, in: Proceedings of the Second USENIX Workshop on Electronic Commerce, Oakland, CA, November 1996.
2. D. Boneh, R.A. DeMillo, et al., On the importance of eliminating errors in cryptographic computations, in: Advances in Cryptology: Eurocrypt’97, 1997, pp. 37–51.
3. A. Ghosh, T. O’Connor, et al., An automated approach for identifying potential vulnerabilities in software, in: IEEE Symposium on Security and Privacy, Oakland, CA, May 1998.
4. A method for obtaining digital signatures and public key cryptosystem;Rivest;Commun. ACM,1978
5. D.T. Stott, B. Floering, et al., Dependability assessment in distributed systems with lightweight fault injectors in NFTAPE, in: Proceedings of the IEEE International Computer Performance and Dependability Symposium, March 2000, pp. 91–100.