Skip to main content

Table 8 The comparisons with Xie et al.’s work

From: The differential fault analysis on block cipher FeW

 

Position of faults

Fault model

Round(s) of fault injection

Number of needed faults

Xie et al.’s work

Encryption state

Random byte fault

29, 30, 31

24.9 with 210 exhaustive searching

Our work

Key schedule

Random nibble fault

29, 30

12.6 with 226 exhaustive searching