Erich Wenger, Michael Hutter. Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations. In Peeter Laud, editor, Information Security Technology for Applications - 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers. Volume 7161 of Lecture Notes in Computer Science, pages 256-271, Springer, 2011. [doi]
@inproceedings{WengerH11, title = {Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations}, author = {Erich Wenger and Michael Hutter}, year = {2011}, doi = {10.1007/978-3-642-29615-4_18}, url = {http://dx.doi.org/10.1007/978-3-642-29615-4_18}, researchr = {https://researchr.org/publication/WengerH11}, cites = {0}, citedby = {0}, pages = {256-271}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, editor = {Peeter Laud}, volume = {7161}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-29614-7}, }