Low-cost hardware implementation of elliptic curve cryptography for general prime fields

Y Ma, Q Zhang, Z Liu, C Tu, J Lin - … 29–December 2, 2016, Proceedings 18, 2016 - Springer
In resource-constrained applications, elliptic curve cryptography (ECC) is preferable for the
property of shorter key size with comparable security. Binary extension fields are usually …

Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields

Y Ma, Q Zhang, Z Liu, C Tu, J Lin - International Conference on …, 2016 - dl.acm.org
In resource-constrained applications, elliptic curve cryptography (ECC) is preferable for the
property of shorter key size with comparable security. Binary extension fields are usually …

Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields

Y Ma, Q Zhang, Z Liu, C Tu, J Lin - … and Communications Security …, 2016 - books.google.com
In resource-constrained applications, elliptic curve cryptography (ECC) is preferable for the
property of shorter key size with comparable security. Binary extension fields are usually …

Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields

Y Ma, Q Zhang, Z Liu - Information and Communications Security - Springer
In resource-constrained applications, elliptic curve cryptography (ECC) is preferable for the
property of shorter key size with comparable security. Binary extension fields are usually …