Elliptic and hyperelliptic curves on embedded μP

T Wollinger, J Pelzl, V Wittelsberger, C Paar… - ACM Transactions on …, 2004 - dl.acm.org
It is widely recognized that data security will play a central role in future IT systems.
Providing public-key cryptographic primitives, which are the core tools for security, is often …

[PDF][PDF] Elliptic and Hyperelliptic Curves on Embedded µP

T WOLLINGER, JAN PELZL… - ACM Transactions on …, 2004 - Citeseer
It is widely recognized that data security will play a central role in future IT systems.
Providing public-key cryptographic primitives, which are the core tools for security, is often …

[PDF][PDF] Elliptic and Hyperelliptic Curves on Embedded µP

T WOLLINGER, JAN PELZL… - ACM Transactions on …, 2004 - researchgate.net
It is widely recognized that data security will play a central role in future IT systems.
Providing public-key cryptographic primitives, which are the core tools for security, is often …

[PDF][PDF] Elliptic and Hyperelliptic Curves on Embedded µP

T WOLLINGER, JAN PELZL… - ACM Transactions …, 2004 - scholar.archive.org
It is widely recognized that data security will play a central role in future IT systems.
Providing public-key cryptographic primitives, which are the core tools for security, is often …

[PDF][PDF] Elliptic and Hyperelliptic Curves on Embedded µP

T WOLLINGER, JAN PELZL… - ACM Transactions on …, 2004 - cetinkayakoc.net
It is widely recognized that data security will play a central role in future IT systems.
Providing public-key cryptographic primitives, which are the core tools for security, is often …

[PDF][PDF] Elliptic and Hyperelliptic Curves on Embedded µP

T WOLLINGER, JAN PELZL… - ACM Transactions on …, 2004 - researchgate.net
It is widely recognized that data security will play a central role in future IT systems.
Providing public-key cryptographic primitives, which are the core tools for security, is often …

[PDF][PDF] Elliptic & Hyperelliptic Curves on Embedded µP

T WOLLINGER, JAN PELZL, V WITTELSBERGER… - Citeseer
It is widely recognized that data security will play a central role in future IT systems.
Providing public-key cryptographic primitives, which are the core tools for security, is often …

[PDF][PDF] Elliptic and Hyperelliptic Curves on Embedded µP

T WOLLINGER, JAN PELZL… - ACM Transactions …, 2004 - scholar.archive.org
It is widely recognized that data security will play a central role in future IT systems.
Providing public-key cryptographic primitives, which are the core tools for security, is often …