-
1
THE EXPERIENCES OF SM3T TEACHERS: CONSTRUCTING TEACHER IDENTITY IN THE BORDERLAND DISCOURSES
Published 2019-06-01Subjects: Get full text
Article -
2
Implementation of SM3 algorithm based on SoPC component
Published 2017-05-01Subjects: “…SM3…”
Get full text
Article -
3
Embedding of national cryptographic algorithm in Hyperledger Fabric
Published 2021-02-01Subjects: Get full text
Article -
4
Evolution of phase composition and luminescent characteristics of the La1-x-ySmxCayVO4-δ nanocrystalline phosphor
Published 2025-02-01Subjects: Get full text
Article -
5
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
Published 2014-02-01Subjects: Get full text
Article -
6
Power analysis attack of dynamic password token based on SM3
Published 2017-03-01Subjects: Get full text
Article -
7
Improved preimage and pseudo-collision attacks on SM3 hash function
Published 2018-01-01Subjects: “…SM3 hash function…”
Get full text
Article -
8
-
9
Mutual information power analysis attack of HMAC based on SM3
Published 2016-10-01Subjects: Get full text
Article