Elliptic Curve Cryptography on Constrained Devices: A Comparative Study of Point Multiplication Methods | IEEE Conference Publication | IEEE Xplore