Fault-based attacks on cryptographic hardware | IEEE Conference Publication | IEEE Xplore