Research Article

Fault Attack on the Authenticated Cipher ACORN v2

Table 2

Ī” in .

Fault location ā€‰

0 0 38 58 61 76 96
12 12 50 70 73 88
23 0 23 38 58 72 76 81 84 87 96
61 0 38 46 58 61 76 84 87 92 96
107 46 58 84 87 92 93
111 50 58 62 88 91 93 96 97
154 0 33 39 66 78 91 93
160 0 6 33 45 58 66 72 78 84 91 97
193 0 33 37 39 66 70 71 74 76 78 91 92 95
235 0 42 54 59 63 75 76 79 81 96 97