- A power fault attack on RSA implementations has been described in 2010.
- A differential fault attack has been published using 7 faulty cipher texts under random 4 bit nibble fault model
- Riham AlTawy, Onur Duman, and Amr M . Youssef published two fault attacks on Kuznyechik which show the importance of protecting the implementations of the cipher.
- While very few faults are needed ( on average two or three per round key recovered ), fault attacks are usually impractical to carry out, in that it requires the ability to change bits at will inside the hardware of a decoder that already has the key in question.