搜索筛选:
搜索耗时5.4274秒,为你在为你在102,285,761篇论文里面共找到 4 篇相符的论文内容
类      型:
[期刊论文] 作者:QU Kaige,WU Liji,WANG An,REN Y, 来源:中国通信:英文版 年份:2015
The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is pr...
[期刊论文] 作者:QU Kaige,WU Liji,WANG An,REN Yan, 来源:中国通信 年份:2020
[期刊论文] 作者:QU Kaige,WU Liji,WANG An,REN Yanting,ZHANG Xiangmin,, 来源:中国通信 年份:2015
The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is pr...
[会议论文] 作者:Wu Liji,Qu Kaige,Wang Di,Zhang Xiangmin,Wu Xingjun, 来源:2016年密码芯片学术会议 年份:2016
The Chinese hash algorithm SM3 is verified to be secure enough, but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 ba...
相关搜索: