Workload Characterization of Elliptic Curve Cryptography and other Network Security Algorithms for Constrained Environments

Source:

Proceedings of the 5th IEEE Annual Workshop on Workload Characterization (WWC-5), Austin, Texas, USA, p.127-137 (2002)

URL:

http://palms.ee.princeton.edu/PALMSopen/fiskiran02workload-presentation-with-reference.pdf