Research Article

A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace

Table 4

The traces of function return values of protocol implementations.

ā€‰12345678910111213141516171819202122

IDH ()113211007732128136011321107732698
MADH ()01132110773240811321100773211240
IDHS ()11321100773211210401132110773211240
MADHS ()011321107732114120113211007732144142