“…It became an attractive research topic since the well-known Boneh et al attack [1], where they were able to break some cryptographic protocols by inducing faults into the computations. The fault injection can be performed in different ways [2]: exposing the device to radiations [3], laser beam [4,5], intense light [6] or an electromagnetic (EM) pulse [7,8,9,10], inducing variations in the power supply [11], injecting a glitch in the clock signal [12], changing the environmental conditions such as the temperature [13], etc. The resulting faults could reveal an interesting behaviour that could be further exploited as a vulnerability.…”