Research Article
Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9
Input: SM9 system parameters, message . | Output: . | Calculate the correct signature value . | Inject fault on and denote as . | Calculate the wrong signature value . | Calculate . | Calculate . | Establish equations of and . | for to 255 do | Compute by . | end for | Calculate by and verify and . | return |
|