I. Introduction
Cryptography techniques have been recognized as an important aspect in the field of information security [1]. There are three types of cryptographic algorithms: 1) symmetric algorithms; 2) asymmetric cryptographic algorithms; and 3) hash algorithm. The related typical algorithms are AES [2], ECC [3], and SHA-256 [4], respectively. The SM2 digital signature algorithm, SM3 hash algorithm, and SM4 block cipher algorithm are published by Security Commercial Code Administration Office of China. The SM2/3/4 algorithms are also recognized by the ISO/IEC international standard [5]–[7] and will gradually be widely used.