DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» SM4 (cipher)
SM4 (cipher)
Environmental DNA Reveals the Fine-Grained and Hierarchical
On the Design and Performance of Chinese OSCCA-Approved Cryptographic Algorithms Louise Bergman Martinkauppi∗, Qiuping He† and Dragos Ilie‡ Dept
A Framework for Fully-Simulatable H-Out-Of-N Oblivious Transfer
Trusted Platform Module Library Part 1: Architecture TCG Public Review
Introduction to the Commercial Cryptography Scheme in China
S-Box Optimization for SM4 Algorithm
Unbalanced Sharing: a Threshold Implementation of SM4
Iso/Iec 18033-3:2010 Dam 2
Introduction to the Commercial Cryptography Scheme in China
DPR Based AES/SM4 Encryption Highly Efficient Implementation
A New Compact Hardware Architecture of S-Box for Block Ciphers AES and SM4
SM4 Block Cipher Algorithm
A Compact Implementation of SM4 Encryption and Decryption Circuit
Golden B L A
Intel® Integrated Performance Primitives Cryptography
Resins for Automotive Refinishes Resins for Automotive Refinishes
Cryptography Acceleration in a RISC-V GPGPU
High-Speed Encryption & Decryption System Based on SM4 Algorithm
Top View
Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms
Gain of Function Mutagenesis Through Activation Tagging Identifies XPB2
Delayedarray: a Unified Framework for Working
Iso/Iec Jtc 1/Sc 27 Wg2 대칭키 암호기술 국제 표준화 동향
Adapting Rigidity to Symmetric Cryptography: Towards “Unswerving” Designs∗
PSA Cryptography API 1.0
THE POSTERS of BUFFALO BILL's WILD WEST By
Iso/Iec Jtc 1/Sc 27/Wg 2 N 2016
Security Arguments and Tool-Based Design of Block Ciphers
Fleet Battle Experiment Echo Data Capture and Analysis Report
PACE-Vaquita
A White-Box Implementation of IDEA
Delayedarray: a Unified Framework for Working
Differential Success of Somatic Embryogenesis in Random Gene Pool of Norway Spruce
RISC‐V Scalar Crypto
Encryption Technology in Information System Security
Embankment Dams
Improvements of SM4 Algorithm and Application in Ethernet Encryption System Based on FPGA
Classification of Cryptographic Libraries
Intel® Integrated Performance Primitives Cryptography
Cryptography Study Notes
Memjam: a False Dependency Attack Against Constant-Time Crypto Implementations in SGX
A Lightweight ISA Extension for AES And
Side-Channel Evaluation Methodology on Software
Data Security with SSD
The Libgcrypt Reference Manual Version 1.9.0 18 January 2021
Stormwater Management Plan 2012-13 Annual Report
Unbalanced Sharing: a Threshold Implementation of SM4
SPAE a Mode of Operation for AES on Low-Cost Hardware
FIPS 140-2 Non-Proprietary Security Policy
David Link Scrambling T-R-U-T-H Rotating Letters As a Material Form
Botan Reference Guide Release 2.18.1
Public Comments on FIPS 197
UNIVERSIDAD POLIT2CNICA DE MADRID Master Thesis
A Lightweight ISA Extension for AES and SM4
Democrats and Re Manufacturable, So We Could Turn out It Reported Profitts in August and About 4 Million People During That Benefits Could Qualify for an Commission