[1]
“SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography”, TCHES, vol. 2018, no. 3, pp. 547–572, Aug. 2018, doi: 10.13154/tches.v2018.i3.547-572.