Software implementation of elliptic curve cryptography over binary fields

33Citations
Citations of this article
78Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper presents an extensive and careful study of the software implementation on workstations of the NIST-recommended elliptic curves over binary fields. We also present the results of our implementation in C on a Pentium II 400MHz workstation. © Springer-Verlag Berlin Heidelberg 2000.

Cite

CITATION STYLE

APA

Hankerson, D., Hernandez, J. L., & Menezes, A. (2000). Software implementation of elliptic curve cryptography over binary fields. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1965 LNCS, pp. 1–24). Springer Verlag. https://doi.org/10.1007/3-540-44499-8_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free