發送短信 : On side channel vulnerabilities of bit permutations in cryptographic algorithms

 _    _    _    _               _____             
| |  | || | || | ||   ____     |  ___||   ____    
| |/\| || | || | ||  |    \\   | ||__    |    \\  
|  /\  || | \\_/ ||  | [] ||   | ||__    | [] ||  
|_// \_||  \____//   |  __//   |_____||  |  __//  
`-`   `-`   `---`    |_|`-`    `-----`   |_|`-`   
                     `-`                 `-`