A. Kerckhos, La cryptographie militaire, Journal des sciences militaires, vol.9, issue.1, pp.1883-538

, NIST: Data Encryption Standard. FIPS PUB, pp.46-49, 1977.

C. Clavier, Secret External Encodings Do Not Prevent Transient Fault Analysis, Cryptographic Hardware and Embedded Systems-CHES 2007, p.181194, 2007.
DOI : 10.1007/978-3-540-74735-2_13

M. Luby and C. Racko, How to construct pseudo-random permutations from pseudorandom functions, In: Advances in CryptologyCRYPTO, vol.85, p.447, 1986.

R. Daudigny, H. Ledig, F. Muller, and F. Valette, SCARE of the DES. In: Applied Cryptography and Network Security, 1933.

S. Guilley, L. Sauvage, J. Micolod, D. Réal, and F. Valette, Defeating Any Secret Cryptography with SCARE Attacks, p.273293, 2010.
DOI : 10.1007/978-3-642-14712-8_17

C. Clavier, An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm, Information Systems Security, p.143155, 2007.
DOI : 10.1007/978-3-540-77086-2_11

C. Clavier, Q. Isorez, and A. Wurcker, Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis, 2013.
DOI : 10.1007/978-3-319-03515-4_8

URL : https://hal.archives-ouvertes.fr/hal-00947642

M. Rivain and T. Roche, SCARE of Secret Ciphers with SPN Structures, 2013.
DOI : 10.1007/978-3-642-42033-7_27

E. Biham and A. Shamir, Dierential Fault Analysis of Secret Key Cryptosystems, In: CRYPTO, p.513525, 1997.

E. Biham and A. Shamir, Dierential cryptanalysis of DES-like cryptosystems, Journal of CRYPTOLOGY, vol.4, issue.1, p.372, 1991.

S. Pedro, M. Soos, M. Guilley, and S. , FIRE: Fault Injection for Reverse Engineering, LNCS, ed.: Security and Privacy of Mobile Devices in Wireless Communication, p.280293, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00690868

T. Ming, Q. Zhenlong, D. Hui, L. Shubo, and Z. Huanguo, Reverse Engineering Analysis Based on Dierential Fault Analysis Against Secret S-boxes, China Communications, vol.9, issue.10, p.10, 2012.

E. Brickell, J. Moore, and M. Purtill, Structure in the S-Boxes of the DES, In: Advances in CryptologyCRYPTO, vol.86, p.38, 1987.

, NIST: Specication for the Advanced Encryption Standard, FIPS PUB, vol.197, p.197, 2001.

K. Sakiyama, Y. Li, M. Iwamoto, and K. Ohta, Information-theoretic approach to optimal dierential fault analysis, IEEE Transactions on Information Forensics and Security, vol.7, issue.1, p.109120, 2012.

G. Leander, C. Paar, A. Poschmann, and K. Schramm, New Lightweight DES Variants, In: Fast Software Encryption, 2007.
DOI : 10.1007/978-3-540-74619-5_13

A. Poschmann, G. Leander, K. Schramm, and C. Paar, New Light-Weight Crypto Algorithms for RFID, 2007 IEEE International Symposium on Circuits and Systems, p.18431846, 2007.
DOI : 10.1109/ISCAS.2007.378273

J. B. Kruskal, On the shortest spanning subtree of a graph and the traveling salesman problem, Proceedings of the American Mathematical Society, vol.7, issue.1, p.4848, 1956.
DOI : 10.1090/S0002-9939-1956-0078686-7