“…Spatial redundancy-based countermeasures are a class of countermeasures which use the duplication/multiplication of the hardware of the CC to ensure the accuracy of the output through majority voting, and temporal redundancy based countermeasures verify the output through repetition of (part of) the cryptographic algorithm in time. Even though these countermeasures are advantageous in countering fault injection attacks, spatial, temporal, and information redundancies will lead to increased power dissipation of CC, reduced throughput, and increased area of the CC [10,11,16,25]. Alternatively, analog countermeasures, such as voltage, temperature, and frequency sensors, are used to detect malicious fault injection activities and to protect a CC by ceasing the operations if such an activity is detected [11,16,26].…”