Research Article

Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher

Algorithm 3

SearchFaultyInterVal.
for to do
while do
   if then
   if then
    
   end if
   if then
    
   end if
   end if
   if then
   if then
    
   end if
   if then
    
   end if
   end if
end while
end for
Return