. However, the round key RK 23 [0] can be calculated, and using the key schedule algorithm, p.23

S. Similarly and . Rk, 3] is known from the previous phase, X 23 [2] can be calculated with (X 23

E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, Advances in Cryptology CRYPTO '97, pp.513-525, 1997.
DOI : 10.1007/BFb0052259

A. Bogdanov, K. Varici, N. Mouha, V. Velichkov, E. Tischhauser et al., Security Evaluation of the Block Cipher LEA, 2011.

D. Boneh, R. A. Demillo, and R. J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Proceedings of the 16th Annual International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT'97, pp.37-51, 1997.
DOI : 10.1007/3-540-69053-0_4

C. Clavier, Attacking Block Ciphers, Fault Analysis in Cryptography, Information Security and Cryptography, pp.19-35, 2012.
DOI : 10.1007/978-3-642-29656-7_2

URL : https://hal.archives-ouvertes.fr/hal-00947669

N. K. Giang, J. Im, D. Kim, M. Jung, and K. Wolfgang, Integrating the EPCIS and Building Automation System into the Internet of Things: a Lightweight and Interoperable Approach, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.56-73, 2015.

D. Hong, J. Lee, D. Kim, D. Kwon, K. Ryu et al., LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors, Information Security Applications, pp.3-27, 2014.
DOI : 10.1007/978-3-319-05149-9_1

P. Myungseo and K. Jongsung, Differential Fault Analysis of the Block Cipher LEA, Journal of the Korea Institute of Information Security and Cryptology, vol.24, issue.6, pp.1117-1127, 2014.

T. Robles, R. Alcarria, D. Martín, M. Navarro, R. Calero et al., An IoT based reference architecture for smart water management processes, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol.6, issue.1, pp.4-23, 2015.

H. Tupsamudre, S. Bisht, and D. Mukhopadhyay, Differential Fault Analysis on the Families of SIMON and SPECK Ciphers, 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.40-48, 2014.
DOI : 10.1109/FDTC.2014.14