Two hardware implementations of the group operations necessary for implementing an elliptic curve cryptosystem over a characteristic two finite field | IEEE Conference Publication | IEEE Xplore