Research Article

Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9

Algorithm 3

Montgomery modular multiplication algorithm.
Input:  , , ,  , ,  .
Output:  .
.
for   to   do
.
.
.
if    then
.
end for
return