Research Article

Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher

Figure 10

Success rate of the attack.