{"id":"https://openalex.org/W3042743176","doi":"https://doi.org/10.1109/comm48946.2020.9142035","title":"On the Design and Performance of Chinese OSCCA-approved Cryptographic Algorithms","display_name":"On the Design and Performance of Chinese OSCCA-approved Cryptographic Algorithms","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3042743176","doi":"https://doi.org/10.1109/comm48946.2020.9142035","mag":"3042743176"},"language":"en","primary_location":{"id":"doi:10.1109/comm48946.2020.9142035","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comm48946.2020.9142035","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 13th International Conference on Communications (COMM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:bth-19835","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030236170","display_name":"Louise Bergman Martinkauppi","orcid":null},"institutions":[{"id":"https://openalex.org/I52719799","display_name":"Blekinge Institute of Technology","ror":"https://ror.org/0093a8w51","country_code":"SE","type":"education","lineage":["https://openalex.org/I52719799"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Louise Bergman Martinkauppi","raw_affiliation_strings":["Dept. of Computer Science, Blekinge Institute of Technology (BTH), Karlskrona, Sweden"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, Blekinge Institute of Technology (BTH), Karlskrona, Sweden","institution_ids":["https://openalex.org/I52719799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045760743","display_name":"HE Qiu-ping","orcid":null},"institutions":[{"id":"https://openalex.org/I52719799","display_name":"Blekinge Institute of Technology","ror":"https://ror.org/0093a8w51","country_code":"SE","type":"education","lineage":["https://openalex.org/I52719799"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Qiuping He","raw_affiliation_strings":["Dept. of Computer Science, Blekinge Institute of Technology (BTH), Karlskrona, Sweden"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, Blekinge Institute of Technology (BTH), Karlskrona, Sweden","institution_ids":["https://openalex.org/I52719799"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079844695","display_name":"Dragos Ilie","orcid":"https://orcid.org/0000-0001-8453-447X"},"institutions":[{"id":"https://openalex.org/I52719799","display_name":"Blekinge Institute of Technology","ror":"https://ror.org/0093a8w51","country_code":"SE","type":"education","lineage":["https://openalex.org/I52719799"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Dragos Ilie","raw_affiliation_strings":["Dept. of Computer Science, Blekinge Institute of Technology (BTH), Karlskrona, Sweden"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, Blekinge Institute of Technology (BTH), Karlskrona, Sweden","institution_ids":["https://openalex.org/I52719799"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5030236170"],"corresponding_institution_ids":["https://openalex.org/I52719799"],"apc_list":null,"apc_paid":null,"fwci":0.3977,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.68258546,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"119","last_page":"124"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7909576892852783},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7277408242225647},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6275204420089722},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6224237084388733},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6160129308700562},{"id":"https://openalex.org/keywords/security-of-cryptographic-hash-functions","display_name":"Security of cryptographic hash functions","score":0.5724183917045593},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.4956299066543579},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.49354469776153564},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.4832242429256439},{"id":"https://openalex.org/keywords/digital-signature-algorithm","display_name":"Digital Signature Algorithm","score":0.46164005994796753},{"id":"https://openalex.org/keywords/pkcs-#1","display_name":"PKCS #1","score":0.44401049613952637},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.41158705949783325},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.39330923557281494},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3592658042907715},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3273744583129883},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30006474256515503},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2196510136127472},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.13738295435905457}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7909576892852783},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7277408242225647},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6275204420089722},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6224237084388733},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6160129308700562},{"id":"https://openalex.org/C165511393","wikidata":"https://www.wikidata.org/wiki/Q7252276","display_name":"Security of cryptographic hash functions","level":5,"score":0.5724183917045593},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.4956299066543579},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.49354469776153564},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.4832242429256439},{"id":"https://openalex.org/C202424057","wikidata":"https://www.wikidata.org/wiki/Q1224829","display_name":"Digital Signature Algorithm","level":4,"score":0.46164005994796753},{"id":"https://openalex.org/C186497982","wikidata":"https://www.wikidata.org/wiki/Q7119499","display_name":"PKCS #1","level":4,"score":0.44401049613952637},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.41158705949783325},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.39330923557281494},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3592658042907715},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3273744583129883},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30006474256515503},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2196510136127472},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.13738295435905457}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/comm48946.2020.9142035","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comm48946.2020.9142035","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 13th International Conference on Communications (COMM)","raw_type":"proceedings-article"},{"id":"pmh:oai:DiVA.org:bth-19835","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:bth-19835","pdf_url":null,"source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:DiVA.org:bth-19835","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:bth-19835","pdf_url":null,"source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W65612204","https://openalex.org/W112964067","https://openalex.org/W141830613","https://openalex.org/W150724439","https://openalex.org/W1580735187","https://openalex.org/W1982013328","https://openalex.org/W1994443240","https://openalex.org/W2001317479","https://openalex.org/W2042689779","https://openalex.org/W2091649106","https://openalex.org/W2123217790","https://openalex.org/W2188937808","https://openalex.org/W2291860490","https://openalex.org/W2473650107","https://openalex.org/W2758187144","https://openalex.org/W3037985148","https://openalex.org/W6687311974","https://openalex.org/W6780605074"],"related_works":["https://openalex.org/W2786072975","https://openalex.org/W2183171747","https://openalex.org/W2107044662","https://openalex.org/W2181443025","https://openalex.org/W2130400838","https://openalex.org/W2625832554","https://openalex.org/W2318106462","https://openalex.org/W2047347004","https://openalex.org/W2998969597","https://openalex.org/W3013011724"],"abstract_inverted_index":{"SM2,":[0],"SM3,":[1],"and":[2,56,73,75,88,93,98,112,117,131],"SM4":[3,132,145],"are":[4],"cryptographic":[5,20,68,78],"standards":[6],"authorized":[7],"to":[8,30,41],"be":[9,31],"used":[10],"in":[11,22,136],"China.":[12],"To":[13],"comply":[14],"with":[15,33,146],"Chinese":[16,26,77],"cryptography":[17],"laws,":[18],"standard":[19,67],"algorithms":[21,35,47,69,86,115],"products":[23],"targeting":[24],"the":[25,34,45,66,83,137,140],"market":[27],"may":[28,52],"need":[29],"replaced":[32,46],"mentioned":[36],"above.":[37],"It":[38],"is":[39],"important":[40],"know":[42],"beforehand":[43],"if":[44],"impact":[48],"performance.":[49,96],"Bad":[50],"performance":[51,63],"degrade":[53],"user":[54],"experience":[55],"increase":[57],"future":[58],"system":[59],"costs.We":[60],"present":[61],"a":[62,147],"study":[64],"of":[65],"(RSA,":[70],"ECDSA,":[71],"SHA-256,":[72],"AES-128)":[74],"corresponding":[76],"algorithms.Our":[79],"results":[80],"indicate":[81],"that":[82],"digital":[84],"signature":[85],"SM2":[87,97,104],"ECDSA":[89],"have":[90,100,119],"similar":[91,95],"design":[92,121],"also":[94],"RSA":[99,108],"fundamentally":[101],"different":[102],"designs.":[103],"performs":[105,125],"better":[106,127],"than":[107,128],"when":[109],"generating":[110],"keys":[111],"signatures.":[113],"Hash":[114],"SM3":[116],"SHA-256":[118,124],"many":[120],"similarities,":[122],"but":[123],"slightly":[126],"SM3.":[129],"AES-128":[130,143],"share":[133],"some":[134],"similarities":[135],"design.":[138],"In":[139],"controlled":[141],"experiment,":[142],"outperforms":[144],"significant":[148],"margin.":[149]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
