| 2014 | 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2014, Busan, South Korea, September 23, 2014 Assia Tria, Dooho Choi |
| 2014 | A Practical Second-Order Fault Attack against a Real-World Pairing Implementation. Johannes Blömer, Ricardo Gomes da Silva, Peter Günther, Juliane Krämer, Jean-Pierre Seifert |
| 2014 | Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering. Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Jerry Shi, Chujiao Ma, Dawu Gu |
| 2014 | Blind Fault Attack against SPN Ciphers. Roman Korkikian, Sylvain Pelissier, David Naccache |
| 2014 | Clock Glitch Attacks in the Presence of Heating. Thomas Korak, Michael Hutter, Baris Ege, Lejla Batina |
| 2014 | Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA. Pablo Rauzy, Sylvain Guilley |
| 2014 | Differential Fault Analysis on the Families of SIMON and SPECK Ciphers. Harshal Tupsamudre, Shikha Bisht, Debdeep Mukhopadhyay |
| 2014 | Differential Fault Intensity Analysis. Nahid Farhady Ghalaty, Bilgiday Yuce, Mostafa M. I. Taha, Patrick Schaumont |
| 2014 | Fault Sensitivity Analysis Meets Zero-Value Attack. Oliver Mischke, Amir Moradi, Tim Güneysu |
| 2014 | On Fault Injections in Generalized Feistel Networks. Hélène Le Bouder, Gaël Thomas, Yanis Linge, Assia Tria |
| 2014 | On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms. Thomas Korak, Michael Hoefler |
| 2014 | Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware. Raghavan Kumar, Philipp Jovanovic, Wayne P. Burleson, Ilia Polian |
| 2014 | Practical Validation of Several Fault Attacks against the Miller Algorithm. Ronan Lashermes, Marie Paindavoine, Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin |
| 2014 | Tampering Attacks in Pairing-Based Cryptography. Johannes Blömer, Peter Günther, Gennadij Liske |