Accompanying source codes for the paper Unleashing the Power of Differential Fault Attacks on QARMAv2.
- QARMAv2-64_L1_key recovery(Part_1) : L1(k4, k6, k7, k8, k9, k11, k12, k13, k14) key recovery of QARMAv2-64.
- QARMAv2-64_L1_key recovery(Part_2) : L1(k0, k1, k3, k5, k15) key recovery of QARMAv2-64.
- QARMAv2-64_L0_key recovery : This python code provides necessary data for the file QARMAv2_L0_recovery.
- Qarmav2_L0_recovery : L0 key recovery of QARMAv2-64. This file basically shows how we can reduce the key space of L0 drastically by using the generated equations due to the injected faults.
- QARMAv2-128-128_L1_key recovery(Part_1) : L1(k20, k22, k23, k24, k25, k27, k28, k29, k30) key recovery of QARMAv2-64.
- QARMAv2-128-128_L1_key recovery(Part_2) : L1(k16, k17, k19, k21, k31) key recovery of QARMAv2-64.
- QARMAv2-128-128_L1_key recovery(Part_3) : L1(k4, k6, k7, k8, k9, k11, k12, k13, k14) key recovery of QARMAv2-64.
- QARMAv2-128-128_L1_key recovery(Part_4) : L1(k0, k1, k3, k5, k15) key recovery of QARMAv2-64.
- Fault_Injection_(r-1) : Fault Injection Simulation at the beginning of (r-1)th round of QARMAv2-64.
- Fault_Injection_(r-1) : Fault Injection Simulation at the beginning of (r-2)th round of QARMAv2-64.