stream cipher

Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults?