Research Article

Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9

Figure 10

The flowchart of fault attack on SM9.