Cryptographic core design security verification and vulnerability detection based on information flow analysisYixin MA, Shibo TANG, Jing TAN, Xuefei LI and Wei HUJNWPU, 40 1 (2022) 76-83DOI: https://doi.org/10.1051/jnwpu/20224010076