www.design-reuse-embedded.com
Find Top SoC Solutions
for AI, Automotive, IoT, Security, Audio & Video...
You are here : design-reuse-embedded.com  > Security  > Cryptography

Tunable SM3 accelerator

Overview

The SM3 hash algorithm is a cryptographic hash function designed by the Chinese Commercial Cryptography Administration Office (CCCAO) in order to propose new standard for digital signature generation. There is a large range of other applications using this algorithm as key derivation functions (KDFs) and random bit/number generation.
The SM3 algorithm is very close to the FIPS SHA-256 algorithm. For this reason, the IP also implements a SHA-256 algorithm.

Partner with us

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2024 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.