Research Article

Fault Attack on the Authenticated Cipher ACORN v2

Algorithm 1

Obtain , and .
Require: fault location , where and there is not any satisfying ;
the components of
Ensure:
(1) for  each component , where   do
(2)
(3) if    then
(4) for  each variable in , where   do
(5)
(6)
(7)
(8) end for
(9) end if
(10) end for
(11) return is