Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations

Erich Wenger, Michael Hutter

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Original languageEnglish
Title of host publicationInformation Security Technology for Applications - 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers
EditorsPeeter Laud
PublisherSpringer
Pages256-271
DOIs
Publication statusPublished - 2011
EventNordic Conference in Secure IT Systems - Tallinn, Estonia
Duration: 26 Oct 201128 Oct 2011

Conference

ConferenceNordic Conference in Secure IT Systems
CountryEstonia
CityTallinn
Period26/10/1128/10/11

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application
  • Experimental
  • Review

Cite this

Wenger, E., & Hutter, M. (2011). Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations. In P. Laud (Ed.), Information Security Technology for Applications - 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers (pp. 256-271). Springer. https://doi.org/10.1007/978-3-642-29615-4_18