On Elliptic Curve Cryptography implementations and evaluation | IEEE Conference Publication | IEEE Xplore