Oliveira, Michael Scott, Martin Collier, and Ricardo Dahab, "NanoECC: Testing the Limits of
Elliptic Curve Cryptography in Sensor Networks," in Proc.
This modification was the results of applying the modified algorithm that uses the
Elliptic Curve Cryptography with Diffie-Helman methods.
"Research Issues on
Elliptic Curve Cryptography and Its applications", International Journal of Computer Science and Network Security, 9(6): 19-22.
TinyECC: A Configurable Library for
Elliptic Curve Cryptography in Wireless Sensor Networks, 2011.
Ning, "TinyECC: a configurable library for
elliptic curve cryptography in wireless sensor networks," in Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN '08), pp.
An efficient three-party authenticated key exchange protocol using
elliptic curve cryptography for mobile-commerce environments.
He, (2011) "Comments on A Password Authentication and Update Scheme Based on
Elliptic Curve Cryptography," Cryptology EPrint Archive Report 2011/411.
(1.) Sullivan, N., "A (relatively easy to understand) primer on
elliptic curve cryptography," ars technica, October 2013.
The
elliptic curve cryptography processor server farm accomplished the consecutive jobs in the order the data were received.
[2] proposed the
Elliptic Curve Cryptography. In this method encoding and decoding a text in the implementation of
Elliptic Curve Cryptography is a public key cryptography using Koblitz's method [7, 8].
Elliptic curve cryptography is an alternative building block for cryptograpic scheme similar to the conventional RSA, but it is widely believed to be much more secure when implemented using the same key size.