Research Article

Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9

Figure 6

The result of offline searching phase.