Effects of instruction-set extensions on an embedded processor: a case study on elliptic curve cryptography over GF (2/sup m/)

S Bartolini, I Branovic, R Giorgi… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Elliptic-Curve cryptography (ECC) is promising for enabling information security in
constrained embedded devices. In order to be efficient on a target architecture, ECCs …

Effects of Instruction-Set Extensions on an Embedded Processor: A Case Study on Elliptic Curve Cryptography over GF (2/sup m/)

S Bartolini, I Branovic, R Giorgi… - IEEE Transactions on …, 2008 - computer.org
Elliptic curve (EC) cryptography is expected to have a significant role in enabling information
security in constrained embedded devices. In order to be efficient on a target architecture …

Effects of Instruction-Set Extensions on an Embedded Processor: A Case Study on Elliptic Curve Cryptography over GF (2/sup m/)

S Bartolini, I Branovic, R Giorgi, E Martinelli - IEEE Transactions on …, 2008 - infona.pl
Elliptic-Curve cryptography (ECC) is promising for enabling information security in
constrained embedded devices. In order to be efficient on a target architecture, ECCs …

Effects of instruction-set extensions on an embedded processor: A case study on elliptic-curve cryptography over GF (2 (m))

S Bartolini, I Branovic, R Giorgi… - IEEE TRANSACTIONS …, 2008 - usiena-air.unisi.it
Elliptic-Curve cryptography (ECC) is promising for enabling information security in
constrained embedded devices. In order to be efficient on a target architecture, ECCs …

Effects of Instruction-Set Extensions on an Embedded Processor: A Case Study on Elliptic Curve Cryptography over GF (2/sup m/)

S Bartolini, I Branovic, R Giorgi… - IEEE Transactions on …, 2008 - dl.acm.org
Elliptic curve (EC) cryptography is expected to have a significant role in enabling information
security in constrained embedded devices. In order to be efficient on a target architecture …