Research Article
Fault Attack on the Authenticated Cipher ACORN v2
Require: fault location , where and there is not any satisfying ; | the components of | Ensure: | (1) for each component , where do | (2) | (3) if then | (4) for each variable in , where do | (5) | (6) | (7) | (8) end for | (9) end if | (10) end for | (11) return is |
|