Y Ma, Q Zhang, Z Liu, C Tu, J Lin - … and Communications Security …, 2016 - books.google.com
In resource-constrained applications, elliptic curve cryptography (ECC) is preferable for the
property of shorter key size with comparable security. Binary extension fields are usually …