Hardware design and implementation of scalar multiplication in elliptic curve cryptography (ECC) over GF (2163) on FPGA

M Imran, M Kashif, M Rashid - 2015 International Conference …, 2015 - ieeexplore.ieee.org
Cryptographic algorithms are widely used for security purposes in embedded systems
domain. Hardware implementations of cryptographic algorithms have a significant …

Minimizing hamming weight based on 1's complement of binary numbers over GF(2m)

X Huang, PG Shah, D Sharma - 2010 The 12th International …, 2010 - ieeexplore.ieee.org
Elliptic curve cryptosystems have been the focus of much attention as the benefits of elliptic
curve cryptography (ECC) become many such as a small software footprint, low hardware …

[ΑΝΑΦΟΡΑ][C] Practical Approach for Improving Security in Wireless Mesh Network Through Ecc and Two-Way Authentication Scheme

AP Wadhe, NA Chavhan - National Conference on Innovative Paradigms in …