Skip to main navigation
Skip to search
Skip to main content
Sort by
Computer Science
Multiobjective
100%
Cyber Attack
100%
Security Strategy
100%
Point Multiplication
88%
Elliptic Curve
61%
Field Programmable Gate Array
33%
Cryptographic System
22%
Hardware Implementation
22%
Cryptographic Protocol
22%
Cryptographic Primitive
22%
Digital Transformation
22%
Scalar Multiplication
16%
Block Cipher
16%
Very-Large-Scale Integration Systems
16%
Electronic System Level
11%
Hardware Performance
11%
Embedded Application
11%
Embedded System
11%
Clock Cycle
11%
Circuit Systems
11%
Cryptographic Algorithm
11%
Data Encryption
11%
Hardware Architecture
11%
Financial Reporting
5%
Software Implementation
5%
Embedded Device
5%
Resource Consumption
5%
Analysis Technique
5%
Security protocols
5%
Security Solution
5%
Internet-Of-Things
5%
Security Service
5%
Cryptanalysis
5%
Ciphertext
5%
Information Technology
5%
System Security
5%
SystemC
5%
Data Dependency
5%
Hardware Resource
5%
Data Security
5%
Processor Architecture
5%
Encryption Method
5%
Speed-up
5%
Multiplication Operation
5%
Statistical Technique
5%
Performance Requirement
5%
Computational Power
5%
Division Operation
5%
Cryptographic Application
5%
Computation Time
5%
Performance Metric
5%
Starting Point
5%
Key Length
5%
Communication Network
5%
elliptic curve cryptosystem
5%
Security Analysis
5%
Attackers
5%
Hardware Accelerator
5%
Collecting Data
5%
Research Paper
5%
Data-Dependences
5%
State Machine
5%
Industrial Electronics
5%
Algorithmic Complexity
5%
Systematic Literature Review
5%