“…For example, the Giraud method (Giraud, 2005(Giraud, , 2006 uses the Montgomery powering ladder (Joye and Yen, 2002) to evaluate m k mod p (or q), where k = d p (or d q Similarly, the Boscher et al method (Boscher et al, 2007) uses the right-to-left algorithm and returns the three tuples Recently, Ebeid and Lambert introduced a powerful fault attack which sets or resets a bit of the exponent k (Ebeid and Lambert, 2010). For example, let us suppose an attacker reset the i th bit of the secret exponent by zero.…”