-
1
Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain
Published 2018-09-01Subjects: “…SM2 algorithm…”
Get full text
Article -
2
Image visualization encryption algorithm based on Shamir threshold secret key sharing
Published 2018-07-01Subjects: Get full text
Article -
3
Embedding of national cryptographic algorithm in Hyperledger Fabric
Published 2021-02-01Subjects: Get full text
Article -
4
Proven secure blind adaptor signature scheme based on the SM2
Published 2024-04-01Subjects: “…SM2 digital signature…”
Get full text
Article -
5
Optimization of reconfigurable SM2 algorithm over prime filed
Published 2022-03-01Subjects: Get full text
Article -
6
Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform
Published 2022-12-01Subjects: Get full text
Article -
7
-
8
Two-party cooperative blind signature based on SM2
Published 2022-12-01Subjects: “…SM2…”
Get full text
Article -
9
Design and implementation of proxy-protected proxy signature based on SM2
Published 2017-09-01Subjects: Get full text
Article