International audienceHardware implementations of stream and other ciphers are vulnerable to natural faults. Moreover, attackers can launch fault attacks on these implementations. Concurrent error detection (CED) is used as a countermeasure against natural and malicious faults. We propose algorithm diversity (AD) to detect natural and malicious faults in stream ciphers. We compare AD to hardware, time, and information redundancies. Hardware redundancy has 100% hardware overhead, but is not secure against fault attacks. Time redundancy has lower hardware overhead, but is vulnerable to faults that are injected in both the computation and recomputation. Information redundancy techniques such as parity cannot detect an even number of faulty bit...