Research Article
Fault Attack on the Authenticated Cipher ACORN v2
Table 5
Optional fault locations of
.
| Fault location | | Probability |
| 278 | 43 | 85 | 92 | 97 | | | | | | | | 271 | 36 | 78 | 85 | 90 | 95 | | | | | | | 266 | 31 | 73 | 80 | 85 | 90 | 94 | | | | | | 261 | 26 | 68 | 75 | 80 | 85 | 89 | | | | | | 257 | 22 | 64 | 71 | 76 | 81 | 85 | 97 | 98 | | | | 245 | 10 | 52 | 59 | 64 | 69 | 73 | 85 | 86 | 89 | 91 | | 241 | 6 | 48 | 60 | 65 | 69 | 81 | 82 | 85 | 87 | | | 244 | 9 | 51 | 58 | 63 | 68 | 72 | 84 | 85 | 88 | 90 | | 239 | 4 | 46 | 58 | 63 | 67 | 79 | 80 | 83 | 85 | | |
|
|