On Protecting Cryptographic Applications Against Fault Attacks Using Residue Codes | IEEE Conference Publication | IEEE Xplore