Elliptic and hyperelliptic curves on embedded muP

It is widely recognized that data security will play a central role in future IT systems. Providing public-key cryptographic primitives, which are the core tools for security, is often difficult on embedded processor due to computational, memory, and power constraints. This contribution appears to b...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACM transactions on embedded computing systems 2004-08, Vol.3 (3), p.509-533
Hauptverfasser: Wollinger, Thomas, Pelzl, Jan, Wittelsberger, Volker, Paar, Christof, Saldamli, Gokay, Koc, Cetin K
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!