Research Article

Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher

Figure 1

Overview of the attack on HIGHT.