Research Article

Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model

Figure 2

The DFA process of some paths.