Research Article

Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9

Table 4

The intermediate values of fault attack.

Intermediate values Value (hexadecimal)

A5702F05 CF131530 5E2D6EB6 4B0DEB92
3DB1A0BC F0CAFF90 523AC875 4AA69820
78559A84 4411F982 5C109F5E E3F52D72
0DD01785 392A727B B1556952 B2B013D3
05
48F78AA4 9A9443DE 0DC72D8C A91BB73C
1B2D6C4F 1FB2DA61 2E9EFACA 45D87116
1FC550A9 CE2DCEAD 83CF500D AEB690A4
4401D3E6 11DC9F02 B3D5FE40 482C72E6
66B99EE0 079E3769 9982B5B7 280386ED
D0DA26F4 BB2CE030 3F07C542 841F257C
66B99EE0 079E3769 9982B5B7 280386ED
D0DA26F4 BB2CE030 3F07C542 841F2577
01
93DE051D 62BF718F F5ED0704 487D01D6
E1E40869 09DC3280 E8C4E481 7C66DDDD
94417225 B381C0EA 72F3463D 99556B89
05D6927F 201ACAA6 D9294E50 D9129F67
21FE8DDA 4F21E607 63106512 5C395BBC
C1C00CB FA602435 0C464CD7 0A3EA616
2261FAE2 9FE43561 E016A44B AD11C56E
400E8AE2 109EBC5A FCAAB6A6 66EA679E
9A426326 D3E2BCF1 AFA21657 5CF85BA8
B347DB94 ECF14C97 104FCE07 67C23979
1BFD9CD9 2EC0EA00 266194F8 98966B9C
6EAAB7B6 2D89A244 D51FCD20 7B8F0C04