Effective Implementations of Scalar Multiplications in Elliptic Curve Cryptography | IEEE Conference Publication | IEEE Xplore