{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T08:29:02Z","timestamp":1773736142817,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T00:00:00Z","timestamp":1717977600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T00:00:00Z","timestamp":1717977600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s11227-024-06141-6","type":"journal-article","created":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T14:02:15Z","timestamp":1718028135000},"page":"21431-21446","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A CUDA-based parallel optimization method for SM3 hash algorithm"],"prefix":"10.1007","volume":"80","author":[{"given":"Jichang","family":"Han","sequence":"first","affiliation":[]},{"given":"Tao","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Xuesong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,10]]},"reference":[{"issue":"10","key":"6141_CR1","doi-asserted-by":"publisher","first-page":"2055","DOI":"10.1109\/TCAD.2019.2939330","volume":"39","author":"X Zheng","year":"2020","unstructured":"Zheng X, Xu C, Hu X, Zhang Y, Xiong X (2020) The software\/hardware co-design and implementation of SM2\/3\/4 encryption\/decryption and digital signature system. IEEE Trans Comput Aided Des Integr Circuits Syst 39(10):2055\u20132066. https:\/\/doi.org\/10.1109\/TCAD.2019.2939330","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"key":"6141_CR2","doi-asserted-by":"publisher","unstructured":"Zhou M, Ruan S, Liu J, Chen X, Yang M, Wang Q (2022) vtpm-sm: An application scheme of SM2\/SM3\/SM4 algorithms based on trusted computing in cloud environment. In: IEEE 15th International Conference on Cloud Computing, CLOUD 2022, Barcelona, Spain, July 10-16, 2022, pp. 351\u2013356. https:\/\/doi.org\/10.1109\/CLOUD55607.2022.00058","DOI":"10.1109\/CLOUD55607.2022.00058"},{"issue":"16","key":"6141_CR3","doi-asserted-by":"publisher","first-page":"5951","DOI":"10.3390\/S22165951","volume":"22","author":"Y Yang","year":"2022","unstructured":"Yang Y, Han S, Xie P, Zhu Y, Ding Z, Hou S, Xu S, Zheng H (2022) Implementation and optimization of zero-knowledge proof circuit based on hash function SM3. Sensors 22(16):5951. https:\/\/doi.org\/10.3390\/S22165951","journal-title":"Sensors"},{"key":"6141_CR4","doi-asserted-by":"publisher","unstructured":"Xu Y, Han L, Yu Z, Che F (2022) Optimized design implementation and research of sm3 hash algorithm based on fpga. In: 2022 2nd International Conference on Computer Science and Blockchain (CCSB), pp. 111\u2013117. https:\/\/doi.org\/10.1109\/CCSB58128.2022.00027","DOI":"10.1109\/CCSB58128.2022.00027"},{"issue":"6","key":"6141_CR5","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1049\/CDT2.12034","volume":"15","author":"X Huang","year":"2021","unstructured":"Huang X, Guo Z, Song M, Zeng X (2021) Accelerating the SM3 hash algorithm with CPU-FPGA co-designed architecture. IET Comput Digit Tech 15(6):427\u2013436. https:\/\/doi.org\/10.1049\/CDT2.12034","journal-title":"IET Comput Digit Tech"},{"key":"6141_CR6","doi-asserted-by":"publisher","unstructured":"Zang S, Zhao D, Hu Y, Hu X, Gao Y, Du P, Cheng S (2021) A high speed sm3 algorithm implementation for security chip. In: 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), pp 915\u2013919. https:\/\/doi.org\/10.1109\/IAEAC50856.2021.9390790","DOI":"10.1109\/IAEAC50856.2021.9390790"},{"issue":"5","key":"6141_CR7","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/S11128-022-03518-5","volume":"21","author":"J Zou","year":"2022","unstructured":"Zou J, Li L, Wei Z, Luo Y, Liu Q, Wu W (2022) New quantum circuit implementations of SM4 and SM3. Quantum Inf Process 21(5):181. https:\/\/doi.org\/10.1007\/S11128-022-03518-5","journal-title":"Quantum Inf Process"},{"key":"6141_CR8","doi-asserted-by":"publisher","unstructured":"Tian H, Li Y, Wang Y, Peng T, Shi S, Qiu W (2019) Optimized password recovery based on gpus for SM3 algorithm. In: Proceedings of the 3rd International Conference on Computer Science and Application Engineering, CSAE 2019, Sanya, China, October 22-24, 2019, pp 148\u201311485. https:\/\/doi.org\/10.1145\/3331453.3361632","DOI":"10.1145\/3331453.3361632"},{"key":"6141_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/S11432-018-9648-X","volume-title":"Hashing multiple messages with SM3 on GPU platforms","author":"S Sun","year":"2021","unstructured":"Sun S, Zhang R, Ma H (2021) Hashing multiple messages with SM3 on GPU platforms. China Inf. Sci, Sci. https:\/\/doi.org\/10.1007\/S11432-018-9648-X"},{"key":"6141_CR10","doi-asserted-by":"publisher","unstructured":"Song G, Jang K, Kim H, Lee W, Hu Z, Seo H (2021) Grover on SM3. In: Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers. Lecture Notes in Computer Science, vol. 13218, pp 421\u2013433. https:\/\/doi.org\/10.1007\/978-3-031-08896-4_22","DOI":"10.1007\/978-3-031-08896-4_22"},{"key":"6141_CR11","unstructured":"NVIDIA (2023) CUDA C++ Programming Guide V12.0. Website. https:\/\/docs.nvidia.com\/cuda\/cuda-c-programming-guide\/index.html"},{"key":"6141_CR12","doi-asserted-by":"publisher","unstructured":"Zhang S, Meng H, Li X, Liu W, Liu B (2021) Hunion traceability: A new type of blockchain traceability system based on sm2, SM3 and SM4. In: ICBTA 2021: 4th International Conference on Blockchain Technology and Applications, Xi\u2019an, China, December 17 - 19, 2021, pp 107\u2013115. https:\/\/doi.org\/10.1145\/3510487.3510503","DOI":"10.1145\/3510487.3510503"},{"key":"6141_CR13","doi-asserted-by":"publisher","first-page":"144574","DOI":"10.1109\/ACCESS.2021.3122466","volume":"9","author":"H Choi","year":"2021","unstructured":"Choi H, Seo SC (2021) Fast implementation of SHA-3 in GPU environment. IEEE Access 9:144574\u2013144586. https:\/\/doi.org\/10.1109\/ACCESS.2021.3122466","journal-title":"IEEE Access"},{"issue":"7","key":"6141_CR14","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1631\/FITEE.1800312","volume":"20","author":"Y Yuan","year":"2019","unstructured":"Yuan Y, Qu K, Wu L, Ma J, Zhang X (2019) Correlation power attack on a message authentication code based on SM3. Frontiers Inf Technol Electron Eng 20(7):930\u2013945. https:\/\/doi.org\/10.1631\/FITEE.1800312","journal-title":"Frontiers Inf Technol Electron Eng"},{"issue":"2","key":"6141_CR15","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1080\/17445760.2023.2172576","volume":"38","author":"D Davendra","year":"2023","unstructured":"Davendra D, Metlicka M, Bialic-Davendra M (2023) CUDA implementation of the antlion optimization algorithm. Int J Parallel Emerg Distrib Syst 38(2):118\u2013139. https:\/\/doi.org\/10.1080\/17445760.2023.2172576","journal-title":"Int J Parallel Emerg Distrib Syst"},{"key":"6141_CR16","doi-asserted-by":"publisher","unstructured":"Chen G (2009) Study on parallel computing. In: Deng, X., Hopcroft, J.E., Xue, J. (eds.) Frontiers in Algorithmics, Third International Workshop, FAW 2009, Hefei, China, June 20-23, 2009. Proceedings. Lecture Notes in Computer Science, vol. 5598, p 1. https:\/\/doi.org\/10.1007\/978-3-642-02270-8_1","DOI":"10.1007\/978-3-642-02270-8_1"},{"issue":"1","key":"6141_CR17","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/S10766-021-00717-Y","volume":"50","author":"F Yin","year":"2022","unstructured":"Yin F, Shi F (2022) A comparative survey of big data computing and HPC: from a parallel programming model to a cluster architecture. Int J Parallel Progr 50(1):27\u201364. https:\/\/doi.org\/10.1007\/S10766-021-00717-Y","journal-title":"Int J Parallel Progr"},{"key":"6141_CR18","doi-asserted-by":"publisher","unstructured":"Liu Y, Zhao R, Han L, Xie J (2022) Research and implementation of parallel optimization of sm3 algorithm based on multithread. In: 2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP), pp 330\u2013336. https:\/\/doi.org\/10.1109\/ICSP54964.2022.9778455","DOI":"10.1109\/ICSP54964.2022.9778455"},{"key":"6141_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/J.COR.2023.106193","volume":"154","author":"K Zhang","year":"2023","unstructured":"Zhang K, Zhang H, Cheng Q, Chen X, Wang Z, Liu Z (2023) A customized two-stage parallel computing algorithm for solving the combined modal split and traffic assignment problem. Comput Oper Res 154:106193. https:\/\/doi.org\/10.1016\/J.COR.2023.106193","journal-title":"Comput Oper Res"},{"key":"6141_CR20","doi-asserted-by":"publisher","unstructured":"Dong J, Lu S, Zhang P, Zheng F, Xiao F (2022) G-SM3: high-performance implementation of gpu-based SM3 hash function. In: 28th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2022, Nanjing, China, January 10-12, 2023, pp 201\u2013208. https:\/\/doi.org\/10.1109\/ICPADS56603.2022.00034","DOI":"10.1109\/ICPADS56603.2022.00034"},{"issue":"5","key":"6141_CR21","doi-asserted-by":"publisher","first-page":"988","DOI":"10.1109\/TPDS.2020.3037469","volume":"32","author":"F Cicirelli","year":"2021","unstructured":"Cicirelli F, Giordano A, Mastroianni C (2021) Analysis of global and local synchronization in parallel computing. IEEE Trans Parallel Distrib Syst 32(5):988\u20131000. https:\/\/doi.org\/10.1109\/TPDS.2020.3037469","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"6141_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ultras.2023.107049","volume":"134","author":"F Li","year":"2023","unstructured":"Li F, Zou F, Rao J (2023) A multi-gpu and cuda-aware mpi-based spectral element formulation for ultrasonic wave propagation in solid media. Ultrasonics 134:107049. https:\/\/doi.org\/10.1016\/j.ultras.2023.107049","journal-title":"Ultrasonics"},{"key":"6141_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/J.SYSARC.2023.102888","volume":"139","author":"W Pang","year":"2023","unstructured":"Pang W, Luo X, Chen K, Ji D, Qiao L, Yi W (2023) Efficient CUDA stream management for multi-dnn real-time inference on embedded gpus. J Syst Archit 139:102888. https:\/\/doi.org\/10.1016\/J.SYSARC.2023.102888","journal-title":"J Syst Archit"},{"key":"6141_CR24","doi-asserted-by":"publisher","first-page":"93980","DOI":"10.1109\/ACCESS.2023.3310401","volume":"11","author":"C Xiao","year":"2023","unstructured":"Xiao C, Zhao G, Zhang L, Ding D (2023) A controllable pipeline framework of block ciphers on GPU for streaming data. IEEE Access 11:93980\u201393993. https:\/\/doi.org\/10.1109\/ACCESS.2023.3310401","journal-title":"IEEE Access"},{"key":"6141_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-21438-7_15","author":"V Hrbek","year":"2023","unstructured":"Hrbek V, Brandejsk\u00fd T (2023) Memetic algorithm with gpu optimization. Data Sci Algorithms Syst. https:\/\/doi.org\/10.1007\/978-3-031-21438-7_15","journal-title":"Data Sci Algorithms Syst"},{"key":"6141_CR26","unstructured":"Jeshani T (2023) Dynamically finding optimal kernel launch parameters for cuda programs. https:\/\/api.semanticscholar.org\/CorpusID:260061584"},{"key":"6141_CR27","doi-asserted-by":"publisher","unstructured":"Guo H, Yue Y, Bo M, Liu Y, Fu Y, Shang J (2022) Transplantation and optimization of gpu-oriented sm3 cryptographic hash algorithm. In: Other Conferences.https:\/\/doi.org\/10.1117\/12.2640754","DOI":"10.1117\/12.2640754"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06141-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06141-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06141-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T14:07:41Z","timestamp":1722607661000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06141-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,10]]},"references-count":27,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["6141"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06141-6","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,10]]},"assertion":[{"value":"10 April 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}