Two hardware implementations of the group operations necessary for implementing an elliptic curve cryptosystem over a characteristic two finite field
Keyword(s):
2004 ◽
Vol 27
(1)
◽
pp. 33-38
◽
Keyword(s):
2011 ◽
Vol 130-134
◽
pp. 291-294
2009 ◽
Vol 2
(1/2)
◽
pp. 60
◽