發送短信 : On side channel vulnerabilities of bit permutations in cryptographic algorithms

 _    _    __   __  __    __   __   __    ______  
| || | ||  \ \\/ // \ \\ / //  \ \\/ //  /_____// 
| || | ||   \ ` //   \ \/ //    \ ` //   `____ `  
| \\_/ ||    | ||     \  //      | ||    /___//   
 \____//     |_||      \//       |_||    `__ `    
  `---`      `-`'       `        `-`'    /_//     
                                         `-`