Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations

Erich Wenger, Michael Hutter

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Original languageEnglish
Title of host publicationInformation Security Technology for Applications - 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers
EditorsPeeter Laud
PublisherSpringer
Pages256-271
DOIs
Publication statusPublished - 2011
EventNordic Conference in Secure IT Systems - Tallinn, Estonia
Duration: 26 Oct 201128 Oct 2011

Conference

ConferenceNordic Conference in Secure IT Systems
Country/TerritoryEstonia
CityTallinn
Period26/10/1128/10/11

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application
  • Experimental
  • Review
  • EU - TAMPRES - TAMper Resistant Sensor node

    Hutter, M., Kirschbaum, M., Plos, T., Korak, T., Wenger, E. & Schmidt, J.

    1/10/1030/09/13

    Project: Research project

  • FWF - IIA - Investigation of Implementation Attacks

    Wenger, E., Kirschbaum, M., Schmidt, J. & Posch, R.

    1/03/1028/02/12

    Project: Research project

  • RFID Security

    Wenger, E., Hutter, M., Oswald, M. E., Posch, K., Plos, T., Herbst, C., Schmidt, J., Feldhofer, M., Szekely, A., Dominikus, S., Aigner, M. J., Kirschbaum, M., Medwed, M. & Posch, R.

    1/01/0515/07/19

    Project: Research area

Cite this