Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments

A. Murat Fiskiran, R. B. Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Scopus citations

Fingerprint

Dive into the research topics of 'Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments'. Together they form a unique fingerprint.

Engineering & Materials Science