- Home
- » Tags
- » SM3 (hash function)
Top View
- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function
- PSA Cryptography API 1.0
- Improved Cryptanalysis of Step-Reduced SM3
- Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function ✩ ∗ Gaoli Wang , Yanzhao Shen
- Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm Christophe Clavier, Leo Reynaud, Antoine Wurcker
- Research and Implementation of Time Synchronous Dynamic Password Based on SM3 Hash Algorithm
- Hash-Based Signatures I Hash Functions and One-Time Signatures
- Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function
- Hash Crypto Engine (BA413)
- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function
- Deep Learning-Based Side Channel Attack on HMAC SM3 Xin Jin1, Yong Xiao1, Shiqi Li2*, Suying Wang2
- Encryption Technology in Information System Security
- TPM 2.0 Part 1
- Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm
- Facebook Password Md5 Hash Finder
- Numbers AES-GCM Efficiency, 154 0-RITT Data, 245 Internals, 152–153 2G Mobile Communications, 89 Security, 154 3DES (Triple DES), 59, 72–74
- Research of Post-Quantum Cryptography in China
- Qualcomm®Trusted Execution Environment Software
- The Libgcrypt Reference Manual Version 1.9.0 18 January 2021
- Cryptography in Python Hashes, ECC and ECDSA, Eth Keys Library ECDSA in Python: Generate / Load Keys
- Key Management Interoperability Protocol Specification Version 2.1 Committee Specification Draft 02 / Public Review Draft 01 06 February 2020
- Finding Collisions for Round-Reduced SM3
- Specification Release Notes Version 3.1 F12020-03 March 2021
- FIDO Authenticator Allowed Cryptography List
- FIDO Authenticator Allowed Cryptography List
- FIPS 140-2 Non-Proprietary Security Policy
- Botan Reference Guide Release 2.18.1
- Deep Learning-Based Side Channel Attack on HMAC SM3 Xin Jin1, Yong Xiao1, Shiqi Li2*, Suying Wang2
- Serious Cryptography: a Practical Introduction to Modern Encryption
- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function