Research Article

Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9

Algorithm 2

Left-to-right binary algorithm.
Input: point , bit integer , .
Output:  .
.
for   to 0 do
.
if    then
.
end for
return