{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T14:59:52Z","timestamp":1771513192100,"version":"3.50.1"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100011665","name":"Deanship of Scientific Research, King Saud University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2957943","type":"journal-article","created":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T21:14:57Z","timestamp":1575580497000},"page":"175865-175878","source":"Crossref","is-referenced-by-count":41,"title":["SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4556-1392","authenticated-orcid":false,"given":"Hisham N.","family":"Almajed","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8253-9709","authenticated-orcid":false,"given":"Ahmad S.","family":"Almogren","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks","author":"zhang","year":"0","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref38","first-page":"185","article-title":"High-performance elliptic curve cryptography by using the CIOS method for modular multiplication","author":"mrabet","year":"2016","journal-title":"Proc Int Conf Risks Security Internet Syst"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/s19081909"},{"key":"ref32","first-page":"169","article-title":"Mapping an arbitrary message to an elliptic curve when defined over GF (\n$2^{n}$\n)","volume":"8","author":"king","year":"2009","journal-title":"Int J Netw Secur"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IADCC.2018.8692087"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.06.009"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2018.2883557"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00211-9"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-018-2023-6"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2018.8693138"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.3390\/e21040336"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01289-z"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-981-10-7590-2_1","article-title":"Identity-based combined public key schemes for signature, encryption, and signcryption","author":"zhou","year":"2019","journal-title":"Appl Math Inf Technol"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-019-00633-w"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.06.054"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-018-0610-x"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.2017-0220"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1702"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1108\/MEDAR-06-2017-0154"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01689-0_16"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3284554"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/en11040759"},{"key":"ref21","first-page":"151","article-title":"Security-aware coap application layer protocol for the Internet of things using elliptic-curve cryptography","volume":"15","author":"albalas","year":"2018","journal-title":"Power (MW)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2018.095845"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2018.05.005"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"ref25","first-page":"393","article-title":"On the efficiency of scalar multiplication on the elliptic curves","author":"ezzouak","year":"2018","journal-title":"Proc Int Conf Eur Middle East North Afr Inf Syst Technol Support Learn"},{"key":"ref50","first-page":"54","article-title":"Fast mapping method based on matrix approach for elliptic curve cryptography","volume":"1","author":"amounas","year":"2012","journal-title":"Int J Inf Netw Secur"},{"key":"ref51","article-title":"Fixed and variable size text based message mapping technique using ECC","author":"muthukuru","year":"0","journal-title":"Global J Comput Sci Technol"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8639-7_2"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701047"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ECACE.2019.8679136"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC.2019.8668842"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"431","DOI":"10.3390\/electronics8040431","article-title":"A high-performance elliptic curve cryptographic processor of SM2 over GF(\n${_{p}}$\n)","volume":"8","author":"hu","year":"2019","journal-title":"Electron"},{"key":"ref54","first-page":"122","article-title":"Security improvement in elliptic curve cryptography","volume":"9","author":"abdullah","year":"2018","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.21276\/Ausjournal.2014.1.1"},{"key":"ref52","first-page":"1904","article-title":"Encoding and decoding of a message in the implementation of Elliptic Curve cryptography using Koblitz&#x2019;s method","volume":"2","author":"padma","year":"2010","journal-title":"Int J Comput Sci Eng"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.03.015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.15803\/ijnc.9.1_111"},{"key":"ref40","first-page":"11","article-title":"Secure method for text encryption using elliptic curve cryptography","volume":"3","author":"ganesh","year":"2018","journal-title":"Int J"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/978-981-13-1768-2_13","article-title":"Internet of things on power line communications: An experimental performance analysis","author":"davoli","year":"2019","journal-title":"Smart Grids and Their Communication Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-3122-0_12"},{"key":"ref14","first-page":"55","article-title":"From stateless to stateful: Generic authentication and authenticated encryption constructions with application to TLS","author":"boyd","year":"2016","journal-title":"Proc The Cryptographer s Track at RSA Conf"},{"key":"ref15","author":"zuccherato","year":"2000","journal-title":"Elliptic Curve Cryptography Support in Entrust"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2673-8_13"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2016.7819342"},{"key":"ref18","first-page":"423","article-title":"Hardware architecture design of aes cryptosystem with \n$16_{3}$\n-bit elliptic curve","author":"kanda","year":"2018","journal-title":"Advanced Multimedia and Ubiquitous Engineering"},{"key":"ref19","first-page":"290","article-title":"A new modification for menezes-vanstone elliptic curve cryptosystem","volume":"85","author":"dawahdeh","year":"2016","journal-title":"J Theor Appl Inf Technol"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2018.12.010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2018.8433630"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922971"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909557"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473820"},{"key":"ref7","author":"paar","year":"2009","journal-title":"Understanding Cryptography A Textbook for Students and Practitioners"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPCT.2017.8074210"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2749982"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0716-4"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2018.07.003"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.18576\/isl\/070102"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"106","DOI":"10.23851\/mjs.v29i2.438","article-title":"Elliptic curve video encryption in mobile phone based on multi-keys and chaotic map","volume":"29","author":"alsaad","year":"2018","journal-title":"Al Mustansiriyah Journal of Science"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6680-1_10"},{"key":"ref41","article-title":"Data communication security modeling using elliptic curve cryptography and biometrics","author":"mahto","year":"2018"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICASET.2018.8376830"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2856123"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08924724.pdf?arnumber=8924724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:29:41Z","timestamp":1643243381000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8924724\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":64,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2957943","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}