Skip to main content
. 2020 Dec 3;20(23):6909. doi: 10.3390/s20236909
Algorithm 1: Ideal Attack Process—Fault Injection.
  • Require: Attack Clock Cycle (ACC)

  • Require: Fault = 1

  • return Key stream {zi}i=1N

  • for i={1}to{N} do

  •   ziS65S92S161S176S242S287

  •   if i=ACC then

  •    t1S65S90S91S92S170Fault

  •   else

  •    t1S65S90S91S92S170

  •   end if

  •   t2S161S174S175S176S263

  •   t3S242S285S286S287S68

  •   (S0,S1,,S92)(t3,S0,,S91)

  •   (S93,S94,,S176)(t1,S93,,S175)

  •   (S177,S178,,S287)(t2,S177,,S286)

  • end for