2017
DOI: 10.1007/s11432-017-9119-6
|View full text |Cite
|
Sign up to set email alerts
|

Improved cryptanalysis of step-reduced SM3

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…This solution is implemented in software and its throughput is not reported. In the work of [23], two different attacks on SM3 are introduced. The authors mainly studied the improvement of the resistance to attacks, but the internal details of the architecture were not reported, and thus we only discuss and compare the related implementation approaches.…”
Section: Comparison With Other Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…This solution is implemented in software and its throughput is not reported. In the work of [23], two different attacks on SM3 are introduced. The authors mainly studied the improvement of the resistance to attacks, but the internal details of the architecture were not reported, and thus we only discuss and compare the related implementation approaches.…”
Section: Comparison With Other Related Workmentioning
confidence: 99%
“…In [25], authors combine the implementation with the ARM processor to enhance the throughput. Because of lack of detailed data in [21][22][23], no direct comparison can be made with the work.…”
Section: Comparison With Other Related Workmentioning
confidence: 99%
See 1 more Smart Citation