View full-text article in PMC Sensors (Basel). 2020 Dec 3;20(23):6909. doi: 10.3390/s20236909 Search in PMC Search in PubMed View in NLM Catalog Add to search Copyright and License information © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). PMC Copyright notice Algorithm 1: Ideal Attack Process—Fault Injection. Require: Attack Clock Cycle (ACC) Require: Fault = 1 return Key stream {zi}i=1N for i={1}to{N} do zi←S65⨁S92⨁S161⨁S176⨁S242⨁S287 if i=ACC then t1←S65⨁S90•S91⨁S92⨁S170⨁Fault else t1←S65⨁S90•S91⨁S92⨁S170 end if t2←S161⨁S174•S175⨁S176⨁S263 t3←S242⨁S285•S286⨁S287⨁S68 (S0,S1,…,S92)←(t3,S0,…,S91) (S93,S94,…,S176)←(t1,S93,…,S175) (S177,S178,…,S287)←(t2,S177,…,S286) end for