Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained Applications. Höller, A., Druml, N., Kreiner, C., Steger, C., & Felicijan, T. In The 51st Annual Design Automation Conference 2014, DAC '14, San Francisco, CA, USA, June 1-5, 2014, pages 207:1–207:6, 2014.
Paper doi bibtex @inproceedings{DBLP:conf/dac/HollerDKSF14,
author = {Andrea H{\"{o}}ller and
Norbert Druml and
Christian Kreiner and
Christian Steger and
Tomaz Felicijan},
title = {Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained
Applications},
booktitle = {The 51st Annual Design Automation Conference 2014, {DAC} '14, San
Francisco, CA, USA, June 1-5, 2014},
pages = {207:1--207:6},
year = {2014},
crossref = {DBLP:conf/dac/2014},
url = {https://doi.org/10.1145/2593069.2593148},
doi = {10.1145/2593069.2593148},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/dac/HollerDKSF14},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"oFkJBzrgPQoWiThSF","bibbaseid":"hller-druml-kreiner-steger-felicijan-hardwaresoftwarecodesignofellipticcurvecryptographyforresourceconstrainedapplications-2014","downloads":0,"creationDate":"2018-11-28T09:10:34.914Z","title":"Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained Applications","author_short":["Höller, A.","Druml, N.","Kreiner, C.","Steger, C.","Felicijan, T."],"year":2014,"bibtype":"inproceedings","biburl":"https://dblp.org/pid/47/4452.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Andrea"],"propositions":[],"lastnames":["Höller"],"suffixes":[]},{"firstnames":["Norbert"],"propositions":[],"lastnames":["Druml"],"suffixes":[]},{"firstnames":["Christian"],"propositions":[],"lastnames":["Kreiner"],"suffixes":[]},{"firstnames":["Christian"],"propositions":[],"lastnames":["Steger"],"suffixes":[]},{"firstnames":["Tomaz"],"propositions":[],"lastnames":["Felicijan"],"suffixes":[]}],"title":"Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained Applications","booktitle":"The 51st Annual Design Automation Conference 2014, DAC '14, San Francisco, CA, USA, June 1-5, 2014","pages":"207:1–207:6","year":"2014","crossref":"DBLP:conf/dac/2014","url":"https://doi.org/10.1145/2593069.2593148","doi":"10.1145/2593069.2593148","timestamp":"Tue, 06 Nov 2018 00:00:00 +0100","biburl":"https://dblp.org/rec/bib/conf/dac/HollerDKSF14","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/dac/HollerDKSF14,\n author = {Andrea H{\\\"{o}}ller and\n Norbert Druml and\n Christian Kreiner and\n Christian Steger and\n Tomaz Felicijan},\n title = {Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained\n Applications},\n booktitle = {The 51st Annual Design Automation Conference 2014, {DAC} '14, San\n Francisco, CA, USA, June 1-5, 2014},\n pages = {207:1--207:6},\n year = {2014},\n crossref = {DBLP:conf/dac/2014},\n url = {https://doi.org/10.1145/2593069.2593148},\n doi = {10.1145/2593069.2593148},\n timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},\n biburl = {https://dblp.org/rec/bib/conf/dac/HollerDKSF14},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Höller, A.","Druml, N.","Kreiner, C.","Steger, C.","Felicijan, T."],"key":"DBLP:conf/dac/HollerDKSF14","id":"DBLP:conf/dac/HollerDKSF14","bibbaseid":"hller-druml-kreiner-steger-felicijan-hardwaresoftwarecodesignofellipticcurvecryptographyforresourceconstrainedapplications-2014","role":"author","urls":{"Paper":"https://doi.org/10.1145/2593069.2593148"},"downloads":0},"search_terms":["hardware","software","design","elliptic","curve","cryptography","resource","constrained","applications","höller","druml","kreiner","steger","felicijan"],"keywords":[],"authorIDs":[],"dataSources":["kr93nyxkdNzi5JfSH"]}