Chinese Journal of Network and Information Security ›› 2017, Vol. 3 ›› Issue (5): 47-53.doi: 10.11959/j.issn.2096-109x.2017.00146
• Papers • Previous Articles Next Articles
Meng-li SHAO1,Xin-chun YIN1,2,Yan-mei LI1
Revised:
2017-01-05
Online:
2017-05-01
Published:
2017-05-13
Supported by:
CLC Number:
Meng-li SHAO,Xin-chun YIN,Yan-mei LI. Implementation of SM3 algorithm based on SoPC component[J]. Chinese Journal of Network and Information Security, 2017, 3(5): 47-53.
"
文献 | 器件 | 资源 | 频率(MHz) | 吞吐率/(Mbit·s?1) |
文献[1] | V2 | 1035(Slices) | 105.7 | 795 |
文献[1] | V2P | 1035(Slices) | 124.6 | 938 |
文献[1] | Virtex-5 | 328(Slices) | 197.2 | 1 483 |
文献[2] | EP2S90F1508C3 | 1244(ALUTS) | 131 | 474.21 |
文献[2] | EP2S90F1508C3 | 1936(ALUTS) | 68.86 | 526.21 |
文献[12] | — | 76300(LE) | 191 | 75 304 |
文献[13] | EPC20F324C6 | 1789(LE) | 92.55 | 724.40 |
文献[14] | — | — | 125 | 32 768 |
本文 | EP4CE22F17C8 | 3933(LE) | 165 | 1 184.8 |
[1] | 刘宗斌, 马原, 荆继武 . SM3散列算法的硬件实现与研究[J]. 信息网络安全, 2011,(9): 191-193. |
LIU B , MA Y , JING W ,et al. Implementation of SM3 Hash function on FPGA[J]. Netinfo Security, 2011,(9): 191-193. | |
[2] | 丁冬平, 高献伟 . SM3算法的FPGA设计与实现[J]. 微型机与应用, 2012,31(5): 26-28. |
DING D P , GAO X W . Design and implementation of SM3 algorithm on FPGA[J]. Microcomputer &Its Applications, 2012,31(5): 26-28. | |
[3] | 郭文平, 刘政林, 陈毅成 ,等. 高吞吐率、低能耗的SHA-1加密算法的硬件实现[J]. 微电子学与计算机, 2008,25(5): 76-79. |
GUO W P , LIU Z L , CHEN Y C ,et al. A high throughput and low-power implementation of the SHA-1 Hash function[J]. Microelectronics &Computer, 2008,25(5): 76-79. | |
[4] | HENZEN L , AUMASSON J P , MEIER W ,et al. VLSI characterization of the cryptographic hash function blake[J]. IEEE Transactions on Very Large Scale Integration Systems, 2011,19(10): 1746-1754. |
[5] | MA Y , XIA L N , LIN J Q ,et al. Hardware performance optimization and evaluation of SM3 Hash algorithm on FPGA[M]// Information and Communications Security, 2012. 105-118. |
[6] | 田椒陵 . SM3 算法界面设计及安全性分析[J]. 信息安全与技术, 2014,(5): 24-26. |
TIAN J L . SM3 algorithm interface design and safety analysis[J]. Information Security and Technology, 2014,(5): 24-26. | |
[7] | 郑强, 高能, 张令臣 . 基于 SM3 算法的动态口令卡的设计与实现[J]. 计算机应用与软件, 2013,30(2): 14-17. |
ZHENG Q , GAO N , ZHANG L C . Design and implementation of dynamic password card based on SM3 algorithm[J]. Computer Applications and Software, 2013,30(2): 14-17. | |
[8] | 于永鹏, 严迎建, 李伟 . SM3算法高速ASIC设计及实现[J]. 微电子学与计算机, 2016,33(4): 21-26. |
YU Y P , YAN Y J , LI W . High speed ASIC design and implementation of SM3 algorithm[J]. Microelectronics &Computer, 2016,33(4): 21-26. | |
[9] | 周威, 王博, 张卫东 . SM3算法硬件实现研究与应用[J]. 电子测量技术, 2015,38(12): 67-71. |
ZHOU W , WANG B , ZHANG W D . Research and application of SM3 hardware implementation[J]. Electronic Measurement Technology, 2015,38(12): 67-71. | |
[10] | QUG , K G , WANG A . A novel masking scheme for SM3 based MAC[J]. China Communications, 2016,12(6): 11-21. |
[11] | 朱宁龙, 戴紫彬, 张立朝 . SM3及SHA-2系列算法硬件可重构设计与实现[J]. 微电子学, 2015,45(6): 777-780+784. |
ZHU N L , DAI Z B , ZHANG L C ,et al. Design and implementation of hardware reconfiguration for SM3 and SHA-2 Hash function[J]. Microelectronics, 2015,45(6): 777-780+784. | |
[12] | 蔡冰清, 白国强 . SM3杂凑算法的流水线结构硬件实现[J]. 微电子学与计算机, 2015,32(1): 15-18. |
CAI B Q , BAI G Q . Implementation of pipeline structure of SM3 algorithm on FPGA[J]. Microelectronics &Computer, 2015,32(1): 15-18. | |
[13] | 王晓燕, 杨先文 . 基于 FPGA 的 SM3 算法优化设计与实现[J]. 计算机工程, 2012,38(6): 244-246. |
WANG X Y , YANG X W . Optimization design and Implementation of SM3 algorithm based on FPGA[J]. Computer Engineering, 2012,38(6): 244-246. | |
[14] | 张倩, 李树国 . SM3杂凑算法的ASIC设计和实现[J]. 微电子学与计算机, 2014,31(9): 143-146. |
ZHANG Q , LI S G . Design and Implementation of SM3 Algorithm in ASIC[J]. Microelectronics &Computer, 2014,31(9): 143-146. | |
[15] | 国家密码管理局. SM3密码杂凑算法[EB/OL]. . |
State Cryptography Administration Office of Security Commercial Code Administration. SM3 Cryptographic Hash algorithm[EB/OL]. . | |
[16] | PONG P . 基于Nios II的嵌入式SoPC系统设计与Verilog开发实例[M]. 北京: 电子工业出版社, 2015: 311-323. |
PONG P . Embedded SoPC design with Nios II processor and Verilog examples[M]. Beijing: Publishing House of Electronics IndustryPress, 2015: 311-323. | |
[17] | 王乐井 . 基于SOPC技术的实时图像处理系统的设计与研究[D]. 长春:吉林大学, 2010. |
WANG L J . The design and research of real time image processing system based on SOPC technology[D]. Changchun:Jilin University, 2010. |
[1] | Hongbin ZHANG, Fan FAN, Dongmei ZHAO, Bin LIU, Yan YIN, Jian LIU. Trust evaluation model of social internet of things based on implicit social relationship [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 56-69. |
[2] | Xin SHI, Yunfei GUO, Yawen WANG, Xiaoli SUN, Hao LIANG. Physical-social attributes integrated Sybil detection for Tor bridge distribution [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 103-114. |
[3] | Yuguang YANG, Guodong CAO. New image encryption algorithm based on double chaotic system and compressive sensing [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 88-97. |
[4] | Honghao ZHENG, Yinuo HAO, Hongtao YU, Shaomei LI, Yiteng WU. Rumor detection in social media based on eahanced Transformer [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 168-174. |
[5] | Wenqi SHI, Xiangyang LUO, Jiashan GUO. Social network user geolocating method based on weighted least squares [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 41-52. |
[6] | Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI. Research on extended access control mechanism in online social network [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 123-131. |
[7] | Pei CHEN, Fenghua LI, Zifu LI, Yunchuan GUO, Lin CHENG. Using rule association to generate data collection policies [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 132-148. |
[8] | Peijie LI, Li ZHANG, Yunfei XIA, Liming XU. Architecture design of re-configurable convolutional neural network on software definition [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 29-36. |
[9] | Zhongyuan JIANG, Xianyu CHEN, Jianfeng MA. Survey of community privacy in social network [J]. Chinese Journal of Network and Information Security, 2021, 7(2): 10-21. |
[10] | Zhen ZHOU, Debiao HE, Min LUO, Li LI. Compact software/hardware co-design and implementation method of Aigis-sig digital signature scheme [J]. Chinese Journal of Network and Information Security, 2021, 7(2): 64-76. |
[11] | Jiana LIAN, Pengjun WANG, Gang LI, Xuejiao MA, Guanbao ZHAI. Novel hybrid strong and weak PUF design based on FPGA [J]. Chinese Journal of Network and Information Security, 2021, 7(2): 94-103. |
[12] | Qi CAO, Shuhua RUAN, Xingshu CHEN, Xiao LAN, Hongxia ZHANG, Hongjian JIN. Embedding of national cryptographic algorithm in Hyperledger Fabric [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 65-75. |
[13] | Cheng SUN, Hao HU, Yingjie YANG, Hongqi ZHANG. Two-layer threat analysis model integrating macro and micro [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 143-156. |
[14] | Xin ZHANG,Weizhong QIANG,Yueming WU,Deqing ZOU,Hai JIN. Mining behavior pattern of mobile malware with convolutional neural network [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 35-44. |
[15] | Pei WANG,Yan JIA,Aiping LI,Qianyue JIANG. De-anonymiation method for networks based on DeepLink [J]. Chinese Journal of Network and Information Security, 2020, 6(4): 104-108. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|