The performance comparison between SM3 and SHA-256.
<p>The performance comparison between SM3 and SHA-256.</p>
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | , |
| Published: |
2025
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1852016600109023232 |
|---|---|
| author | He-Jun Lu (11278574) |
| author2 | Roben A. Juanatas (22250754) Mideth B. Abisado (22250757) |
| author2_role | author author |
| author_facet | He-Jun Lu (11278574) Roben A. Juanatas (22250754) Mideth B. Abisado (22250757) |
| author_role | author |
| dc.creator.none.fl_str_mv | He-Jun Lu (11278574) Roben A. Juanatas (22250754) Mideth B. Abisado (22250757) |
| dc.date.none.fl_str_mv | 2025-09-15T17:38:03Z |
| dc.identifier.none.fl_str_mv | 10.1371/journal.pone.0332665.g010 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/figure/The_performance_comparison_between_SM3_and_SHA-256_/30130680 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Microbiology Science Policy Space Science Environmental Sciences not elsewhere classified Biological Sciences not elsewhere classified Information Systems not elsewhere classified system &# 8217 research gap regarding proposed framework adopts instant messaging systems experimental evaluations demonstrate address emerging threats small data blocks point failure risks enhance data security strong security performance framework integrates sm2 higher encryption efficiency centralized authentication servers centralized servers communication data point failures performance advantages enhancing security communication efficiency xlink "> study addresses store policy storage layer sm2 achieves results verify rapid integration public services pressing concern paper presents message encryption limited resistance layer encryption key exchange key cryptography ims security hybrid sm2 enterprise operations eliminating reliance decryption operations decentralized architecture database intrusions critical domains credential theft countering man complementary advantages client side certificateless authentication |
| dc.title.none.fl_str_mv | The performance comparison between SM3 and SHA-256. |
| dc.type.none.fl_str_mv | Image Figure info:eu-repo/semantics/publishedVersion image |
| description | <p>The performance comparison between SM3 and SHA-256.</p> |
| eu_rights_str_mv | openAccess |
| id | Manara_b92e85e61bb2dfec357ad8255e55ea03 |
| identifier_str_mv | 10.1371/journal.pone.0332665.g010 |
| network_acronym_str | Manara |
| network_name_str | ManaraRepo |
| oai_identifier_str | oai:figshare.com:article/30130680 |
| publishDate | 2025 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | The performance comparison between SM3 and SHA-256.He-Jun Lu (11278574)Roben A. Juanatas (22250754)Mideth B. Abisado (22250757)MicrobiologyScience PolicySpace ScienceEnvironmental Sciences not elsewhere classifiedBiological Sciences not elsewhere classifiedInformation Systems not elsewhere classifiedsystem &# 8217research gap regardingproposed framework adoptsinstant messaging systemsexperimental evaluations demonstrateaddress emerging threatssmall data blockspoint failure risksenhance data securitystrong security performanceframework integrates sm2higher encryption efficiencycentralized authentication serverscentralized serverscommunication datapoint failuresperformance advantagesenhancing securitycommunication efficiencyxlink ">study addressesstore policystorage layersm2 achievesresults verifyrapid integrationpublic servicespressing concernpaper presentsmessage encryptionlimited resistancelayer encryptionkey exchangekey cryptographyims securityhybrid sm2enterprise operationseliminating reliancedecryption operationsdecentralized architecturedatabase intrusionscritical domainscredential theftcountering mancomplementary advantagesclient sidecertificateless authentication<p>The performance comparison between SM3 and SHA-256.</p>2025-09-15T17:38:03ZImageFigureinfo:eu-repo/semantics/publishedVersionimage10.1371/journal.pone.0332665.g010https://figshare.com/articles/figure/The_performance_comparison_between_SM3_and_SHA-256_/30130680CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/301306802025-09-15T17:38:03Z |
| spellingShingle | The performance comparison between SM3 and SHA-256. He-Jun Lu (11278574) Microbiology Science Policy Space Science Environmental Sciences not elsewhere classified Biological Sciences not elsewhere classified Information Systems not elsewhere classified system &# 8217 research gap regarding proposed framework adopts instant messaging systems experimental evaluations demonstrate address emerging threats small data blocks point failure risks enhance data security strong security performance framework integrates sm2 higher encryption efficiency centralized authentication servers centralized servers communication data point failures performance advantages enhancing security communication efficiency xlink "> study addresses store policy storage layer sm2 achieves results verify rapid integration public services pressing concern paper presents message encryption limited resistance layer encryption key exchange key cryptography ims security hybrid sm2 enterprise operations eliminating reliance decryption operations decentralized architecture database intrusions critical domains credential theft countering man complementary advantages client side certificateless authentication |
| status_str | publishedVersion |
| title | The performance comparison between SM3 and SHA-256. |
| title_full | The performance comparison between SM3 and SHA-256. |
| title_fullStr | The performance comparison between SM3 and SHA-256. |
| title_full_unstemmed | The performance comparison between SM3 and SHA-256. |
| title_short | The performance comparison between SM3 and SHA-256. |
| title_sort | The performance comparison between SM3 and SHA-256. |
| topic | Microbiology Science Policy Space Science Environmental Sciences not elsewhere classified Biological Sciences not elsewhere classified Information Systems not elsewhere classified system &# 8217 research gap regarding proposed framework adopts instant messaging systems experimental evaluations demonstrate address emerging threats small data blocks point failure risks enhance data security strong security performance framework integrates sm2 higher encryption efficiency centralized authentication servers centralized servers communication data point failures performance advantages enhancing security communication efficiency xlink "> study addresses store policy storage layer sm2 achieves results verify rapid integration public services pressing concern paper presents message encryption limited resistance layer encryption key exchange key cryptography ims security hybrid sm2 enterprise operations eliminating reliance decryption operations decentralized architecture database intrusions critical domains credential theft countering man complementary advantages client side certificateless authentication |