Research Article

Efficient Secure Computation from SM Series Cryptography

Figure 7

Algorithms used in SM2 key agreement protocol.