The performance comparison between SM3 and SHA-256.

<p>The performance comparison between SM3 and SHA-256.</p>

Saved in:
Bibliographic Details
Main Author: He-Jun Lu (11278574) (author)
Other Authors: Roben A. Juanatas (22250754) (author), Mideth B. Abisado (22250757) (author)
Published: 2025
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1852016600109023232
author He-Jun Lu (11278574)
author2 Roben A. Juanatas (22250754)
Mideth B. Abisado (22250757)
author2_role author
author
author_facet He-Jun Lu (11278574)
Roben A. Juanatas (22250754)
Mideth B. Abisado (22250757)
author_role author
dc.creator.none.fl_str_mv He-Jun Lu (11278574)
Roben A. Juanatas (22250754)
Mideth B. Abisado (22250757)
dc.date.none.fl_str_mv 2025-09-15T17:38:03Z
dc.identifier.none.fl_str_mv 10.1371/journal.pone.0332665.g010
dc.relation.none.fl_str_mv https://figshare.com/articles/figure/The_performance_comparison_between_SM3_and_SHA-256_/30130680
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Microbiology
Science Policy
Space Science
Environmental Sciences not elsewhere classified
Biological Sciences not elsewhere classified
Information Systems not elsewhere classified
system &# 8217
research gap regarding
proposed framework adopts
instant messaging systems
experimental evaluations demonstrate
address emerging threats
small data blocks
point failure risks
enhance data security
strong security performance
framework integrates sm2
higher encryption efficiency
centralized authentication servers
centralized servers
communication data
point failures
performance advantages
enhancing security
communication efficiency
xlink ">
study addresses
store policy
storage layer
sm2 achieves
results verify
rapid integration
public services
pressing concern
paper presents
message encryption
limited resistance
layer encryption
key exchange
key cryptography
ims security
hybrid sm2
enterprise operations
eliminating reliance
decryption operations
decentralized architecture
database intrusions
critical domains
credential theft
countering man
complementary advantages
client side
certificateless authentication
dc.title.none.fl_str_mv The performance comparison between SM3 and SHA-256.
dc.type.none.fl_str_mv Image
Figure
info:eu-repo/semantics/publishedVersion
image
description <p>The performance comparison between SM3 and SHA-256.</p>
eu_rights_str_mv openAccess
id Manara_b92e85e61bb2dfec357ad8255e55ea03
identifier_str_mv 10.1371/journal.pone.0332665.g010
network_acronym_str Manara
network_name_str ManaraRepo
oai_identifier_str oai:figshare.com:article/30130680
publishDate 2025
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling The performance comparison between SM3 and SHA-256.He-Jun Lu (11278574)Roben A. Juanatas (22250754)Mideth B. Abisado (22250757)MicrobiologyScience PolicySpace ScienceEnvironmental Sciences not elsewhere classifiedBiological Sciences not elsewhere classifiedInformation Systems not elsewhere classifiedsystem &# 8217research gap regardingproposed framework adoptsinstant messaging systemsexperimental evaluations demonstrateaddress emerging threatssmall data blockspoint failure risksenhance data securitystrong security performanceframework integrates sm2higher encryption efficiencycentralized authentication serverscentralized serverscommunication datapoint failuresperformance advantagesenhancing securitycommunication efficiencyxlink ">study addressesstore policystorage layersm2 achievesresults verifyrapid integrationpublic servicespressing concernpaper presentsmessage encryptionlimited resistancelayer encryptionkey exchangekey cryptographyims securityhybrid sm2enterprise operationseliminating reliancedecryption operationsdecentralized architecturedatabase intrusionscritical domainscredential theftcountering mancomplementary advantagesclient sidecertificateless authentication<p>The performance comparison between SM3 and SHA-256.</p>2025-09-15T17:38:03ZImageFigureinfo:eu-repo/semantics/publishedVersionimage10.1371/journal.pone.0332665.g010https://figshare.com/articles/figure/The_performance_comparison_between_SM3_and_SHA-256_/30130680CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/301306802025-09-15T17:38:03Z
spellingShingle The performance comparison between SM3 and SHA-256.
He-Jun Lu (11278574)
Microbiology
Science Policy
Space Science
Environmental Sciences not elsewhere classified
Biological Sciences not elsewhere classified
Information Systems not elsewhere classified
system &# 8217
research gap regarding
proposed framework adopts
instant messaging systems
experimental evaluations demonstrate
address emerging threats
small data blocks
point failure risks
enhance data security
strong security performance
framework integrates sm2
higher encryption efficiency
centralized authentication servers
centralized servers
communication data
point failures
performance advantages
enhancing security
communication efficiency
xlink ">
study addresses
store policy
storage layer
sm2 achieves
results verify
rapid integration
public services
pressing concern
paper presents
message encryption
limited resistance
layer encryption
key exchange
key cryptography
ims security
hybrid sm2
enterprise operations
eliminating reliance
decryption operations
decentralized architecture
database intrusions
critical domains
credential theft
countering man
complementary advantages
client side
certificateless authentication
status_str publishedVersion
title The performance comparison between SM3 and SHA-256.
title_full The performance comparison between SM3 and SHA-256.
title_fullStr The performance comparison between SM3 and SHA-256.
title_full_unstemmed The performance comparison between SM3 and SHA-256.
title_short The performance comparison between SM3 and SHA-256.
title_sort The performance comparison between SM3 and SHA-256.
topic Microbiology
Science Policy
Space Science
Environmental Sciences not elsewhere classified
Biological Sciences not elsewhere classified
Information Systems not elsewhere classified
system &# 8217
research gap regarding
proposed framework adopts
instant messaging systems
experimental evaluations demonstrate
address emerging threats
small data blocks
point failure risks
enhance data security
strong security performance
framework integrates sm2
higher encryption efficiency
centralized authentication servers
centralized servers
communication data
point failures
performance advantages
enhancing security
communication efficiency
xlink ">
study addresses
store policy
storage layer
sm2 achieves
results verify
rapid integration
public services
pressing concern
paper presents
message encryption
limited resistance
layer encryption
key exchange
key cryptography
ims security
hybrid sm2
enterprise operations
eliminating reliance
decryption operations
decentralized architecture
database intrusions
critical domains
credential theft
countering man
complementary advantages
client side
certificateless authentication