Research Article

Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher

Figure 9

The results of the cases where the HT is inserted in under mode A.