Cryptographic hardware primitives, Fault attacks and defenses, fault injection attacks, Hardware Security, information leakage, mutual information, On-chip monitoring of physical attacks, Security oriented codes, Synergies between security and reliability.