{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T05:51:39Z","timestamp":1778219499515,"version":"3.51.4"},"reference-count":74,"publisher":"MDPI AG","issue":"23","license":[{"start":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T00:00:00Z","timestamp":1606694400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002383","name":"King Saud University","doi-asserted-by":"publisher","award":["RGP-1437-35"],"award-info":[{"award-number":["RGP-1437-35"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Recently, many platforms have outsourced tasks to numerous smartphone devices known as Mobile Crowd-sourcing System (MCS). The data is collected and transferred to the platform for further analysis and processing. These data needs to maintain confidentiality while moving from smartphones to the platform. Moreover, the limitations of computation resources in smartphones need to be addressed to balance the confidentiality of the data and the capabilities of the devices. For this reason, elliptic curve cryptography (ECC) is accepted, widespread, and suitable for use in limited resources environments such as smartphone devices. ECC reduces energy consumption and maximizes devices\u2019 efficiency by using small crypto keys with the same strength of the required cryptography of other cryptosystems. Thus, ECC is the preferred approach for many environments, including the MCS, Internet of Things (IoT) and wireless sensor networks (WSNs). Many implementations of ECC increase the process of encryption and\/or increase the space overhead by, for instance, incorrectly mapping points to EC with extra padding bits. Moreover, the wrong mapping method used in ECC results in increasing the computation efforts. This study provides comprehensive details about the mapping techniques used in the ECC mapping phase, and presents performance results about widely used elliptic curves. In addition, it suggests an optimal enhanced mapping method and size of padding bit to secure communications that guarantee the successful mapping of points to EC and reduce the size of padding bits.<\/jats:p>","DOI":"10.3390\/s20236841","type":"journal-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T10:26:12Z","timestamp":1606731972000},"page":"6841","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["iTrust\u2014A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4556-1392","authenticated-orcid":false,"given":"Hisham","family":"Almajed","sequence":"first","affiliation":[{"name":"Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8253-9709","authenticated-orcid":false,"given":"Ahmad","family":"Almogren","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia"}]},{"given":"Mohammed","family":"Alabdulkareem","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2020,11,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"34299","DOI":"10.1109\/ACCESS.2020.2974157","article-title":"NSSC: Novel segment based safety message broadcasting in cluster-based vehicular sensor network","volume":"8","author":"Alkhalifa","year":"2020","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Ahmad Awan, K., UdDin, I., Almogren, A., and Almajed, H. (2020). AgriTrust\u2014A Trust Management Approach for Smart Agriculture in Cloud-based Internet of Agriculture Things. Sensors, 20.","DOI":"10.3390\/s20216174"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"8602","DOI":"10.1109\/JIOT.2019.2921234","article-title":"Optimal selection of crowdsourcing workers balancing their utilities and platform profit","volume":"6","author":"Sarker","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Alhogail, A., Alshabanat, L., Almusharraf, N., Alkharis, A., and Almusharraf, B. (2019, January 5\u20137). Umrah Electronic Guide (Umrah E-Guide). Proceedings of the 2019 International Conference on Information and Communications Technology (ICOIACT), Haikou, China.","DOI":"10.1109\/ICOIACT46704.2019.8938507"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"6792","DOI":"10.1109\/ACCESS.2020.2964697","article-title":"5G Vehicular Network Resource Management for Improving Radio Access Through Machine Learning","volume":"8","author":"Tayyaba","year":"2020","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"6792","DOI":"10.1109\/TII.2020.2970074","article-title":"Increasing the Trustworthiness in the Industrial IoT Networks Through a Reliable Cyberattack Detection Model","volume":"16","author":"Hassan","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"185496","DOI":"10.1109\/ACCESS.2019.2960633","article-title":"Intrusion Prevention Framework for Secure Routing in WSN-Based Mobile Internet of Things","volume":"7","author":"Haseeb","year":"2019","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/j.jpdc.2019.12.008","article-title":"Intrusion detection in Edge-of-Things computing","volume":"137","author":"Almogren","year":"2020","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"AlMajed, H.N., and AlMogren, A.S. (2019). Simple and Effective Secure Group Communications in Dynamic Wireless Sensor Networks. Sensors, 19.","DOI":"10.3390\/s19081909"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"62095","DOI":"10.1109\/ACCESS.2019.2916340","article-title":"Robusttrust\u2013a pro-privacy robust distributed trust management mechanism for internet of things","volume":"7","author":"Awan","year":"2019","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1016\/j.future.2019.11.022","article-title":"PUC: Packet Update Caching for energy efficient IoT-based Information-Centric Networking","volume":"111","author":"Din","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"30039","DOI":"10.1007\/s11042-018-6883-7","article-title":"An efficient networking protocol for internet of things to handle multimedia big data","volume":"78","author":"Almogren","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_13","first-page":"11","article-title":"Secure Method for Text Encryption using Elliptic Curve Cryptography","volume":"3","author":"Ganesh","year":"2018","journal-title":"Int. J. Adv. Sci. Res. Eng. Trends"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Kumar, R. (2018). Cryptanalysis of Protocol for Enhanced Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography for Known Signers. Knowledge Computing and Its Applications, Springer.","DOI":"10.1007\/978-981-10-6680-1_10"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"79980","DOI":"10.1109\/ACCESS.2019.2922971","article-title":"Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs","volume":"7","author":"Haseeb","year":"2019","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"51039","DOI":"10.1109\/ACCESS.2019.2909557","article-title":"A Resilient Smart Body Sensor Network Through Pyramid Interconnection","volume":"7","author":"Almajed","year":"2019","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Mrabet, A., El-Mrabet, N., Lashermes, R., Rigaud, J.B., Bouallegue, B., Mesnager, S., and Machhout, M. (2016, January 5\u20137). High-performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication. Proceedings of the International Conference on Risks and Security of Internet and Systems, Roscoff, France.","DOI":"10.1007\/978-3-319-54876-0_15"},{"key":"ref_18","first-page":"1","article-title":"Implementation of Digital Signature Algorithm by using Elliptical Curve p-192","volume":"1","author":"Shah","year":"2019","journal-title":"Aust. J. Wirel. Technol. Mobil. Secur."},{"key":"ref_19","first-page":"122","article-title":"Security Improvement in Elliptic Curve Cryptography","volume":"9","author":"Abdullah","year":"2018","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Hu, X., Zheng, X., Zhang, S., Li, W., Cai, S., and Xiong, X. (2019). A High-Performance Elliptic Curve Cryptographic Processor of SM2 over GF (p). Electronics, 8.","DOI":"10.3390\/electronics8040431"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","article-title":"A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things","volume":"14","author":"Li","year":"2017","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"e4194","DOI":"10.1002\/dac.4194","article-title":"A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs","volume":"33","author":"Kumari","year":"2019","journal-title":"Int. J. Commun. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Patel, C., and Doshi, N. (2019, January 6). Cryptanalysis of ecc-based key agreement scheme for generic IoT network model. Proceedings of the 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India.","DOI":"10.1109\/ICCCNT45670.2019.8944674"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Chandel, S., Cao, W., Sun, Z., Yang, J., Zhang, B., and Ni, T.Y. (2019, January 14). A Multi-dimensional Adversary Analysis of RSA and ECC in Blockchain Encryption. Proceedings of the Future of Information and Communication Conference, San Francisco, CA, USA.","DOI":"10.1007\/978-3-030-12385-7_67"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Mallouli, F., Hellal, A., Saeed, N.S., and Alzahrani, F.A. (2019, January 21\u201323). A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms. Proceedings of the 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Paris, France.","DOI":"10.1109\/CSCloud\/EdgeCom.2019.00022"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"175865","DOI":"10.1109\/ACCESS.2019.2957943","article-title":"SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography","volume":"7","author":"Almajed","year":"2019","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Iqbal, Z., Javaid, N., Iqbal, S., Aslam, S., Khan, Z.A., Abdul, W., Almogren, A., and Alamri, A. (2018). A domestic microgrid with optimized home energy management system. Energies, 11.","DOI":"10.3390\/en11041002"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"88","DOI":"10.11648\/j.acm.20190806.11","article-title":"Group Structure of Special Parabola and Its Application in Cryptography","volume":"8","author":"Li","year":"2019","journal-title":"Appl. Comput. Math."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"755","DOI":"10.2140\/involve.2019.12.755","article-title":"The number of rational points of hyperelliptic curves over subsets of finite fields","volume":"12","author":"Nelson","year":"2019","journal-title":"Involv. J. Math."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Phimphinith, A., Anping, X., Zhu, Q., Jiang, Y., and Shen, Y. (2019, January 12\u201315). An Enhanced Mutual Authentication Scheme Based on ECDH for IoT Devices Using ESP8266. Proceedings of the 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN), Chongqing, China.","DOI":"10.1109\/ICCSN.2019.8905268"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Advani, N., Rathod, C., and Gonsai, A.M. (2019). Comparative Study of Various Cryptographic Algorithms Used for Text, Image, and Video. Emerging Trends in Expert Applications and Security, Springer.","DOI":"10.1007\/978-981-13-2285-3_46"},{"key":"ref_32","first-page":"153","article-title":"Hybrid design for cloud data security using combination of AES, ECC and LSB steganography","volume":"19","author":"Hosam","year":"2019","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s12046-019-1142-9","article-title":"A new batch verification scheme for ECDSA signatures","volume":"44","author":"Kittur","year":"2019","journal-title":"S\u0101dhan\u0101"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Li, Y., and Zhang, P. (2019, January 26\u201328). Security Analysis and Improvement of Elliptic Curve Digital Signature Scheme. Proceedings of the International Conference on Artificial Intelligence and Security, New York, NY, USA.","DOI":"10.1007\/978-3-030-24271-8_54"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Chatterjee, S., and Samaddar, S.G. (2020). A Robust Lightweight ECC-Based Three-Way Authentication Scheme for IoT in Cloud. Smart Computing Paradigms: New Progresses and Challenges, Springer.","DOI":"10.1007\/978-981-13-9680-9_7"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"22313","DOI":"10.1109\/ACCESS.2017.2757844","article-title":"A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography","volume":"5","author":"Rahman","year":"2017","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Manzoor, A., Javaid, N., Ullah, I., Abdul, W., Almogren, A., and Alamri, A. (2017). An intelligent hybrid heuristic scheme for smart metering based demand side management in smart homes. Energies, 10.","DOI":"10.3390\/en10091258"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Wu, T., and Wang, R. (2019). Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs. J. Cryptogr. Eng., 1\u201310.","DOI":"10.1007\/s13389-019-00211-9"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1109\/TCSI.2018.2883557","article-title":"Low-Latency Double Point Multiplication Architecture Using Differential Addition Chain Over GF (2m)","volume":"66","author":"Shahroodi","year":"2019","journal-title":"IEEE Trans. Circ. Syst. Regul. Pap."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.micpro.2018.07.003","article-title":"Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures","volume":"64","author":"Fournaris","year":"2019","journal-title":"Microprocess. Microsyst."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"15550","DOI":"10.1109\/ACCESS.2018.2809778","article-title":"An Innovative Heuristic Algorithm for IoT-Enabled Smart Homes for Developing Countries","volume":"6","author":"Hussain","year":"2018","journal-title":"IEEE Access"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"106","DOI":"10.23851\/mjs.v29i2.438","article-title":"Elliptic Curve Video Encryption in Mobile Phone Based on Multi-Keys and Chaotic Map","volume":"29","author":"AlSaad","year":"2018","journal-title":"Al-Mustansiriyah J. Sci."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"7","DOI":"10.18576\/isl\/070102","article-title":"Text message encoding based on elliptic curve cryptography and a mapping methodology","volume":"7","author":"Reyad","year":"2018","journal-title":"Inf. Sci. Lett."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42786-018-00002-6","article-title":"A survey of blockchain from security perspective","volume":"3","author":"Dasgupta","year":"2019","journal-title":"J. Bank. Financ. Technol."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1049\/iet-ifs.2015.0119","article-title":"Note on scalar multiplication using division polynomials","volume":"11","author":"Chen","year":"2016","journal-title":"IET Inf. Secur."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"6384","DOI":"10.1109\/JIOT.2019.2900631","article-title":"Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things","volume":"6","author":"Tan","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Ahmad, A., Khan, A., Javaid, N., Hussain, H.M., Abdul, W., Almogren, A., Alamri, A., and Azim Niaz, I. (2017). An optimized home energy management system with integrated renewable energy and storage resources. Energies, 10.","DOI":"10.3390\/en10040549"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Haseeb, K., Almogren, A., Islam, N., Ud Din, I., and Jan, Z. (2019). An energy-efficient and secure routing protocol for intrusion avoidance in IoT-based WSN. Energies, 12.","DOI":"10.3390\/en12214174"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.asoc.2018.06.017","article-title":"Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks","volume":"71","author":"Huda","year":"2018","journal-title":"Appl. Soft Comput."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.future.2017.07.055","article-title":"An efficient key agreement protocol for Sybil-precaution in online social networks","volume":"84","author":"Rahman","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Awan, K.A., Din, I.U., Almogren, A., Almajed, H., Mohiuddin, I., and Guizani, M. (2020). NeuroTrust-Artificial Neural Network-based Intelligent Trust Management Mechanism for Large-Scale Internet of Medical Things. IEEE Internet Things J.","DOI":"10.1109\/JIOT.2020.3029221"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Sultana, T., Almogren, A., Akbar, M., Zuair, M., Ullah, I., and Javaid, N. (2020). Data sharing system integrating access control mechanism using blockchain-based smart contracts for IoT devices. Appl. Sci., 10.","DOI":"10.3390\/app10020488"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Kumar, V., Li, H., Park, J.M.J., and Bian, K. (2018, January 22\u201325). Enforcement in spectrum sharing: Crowd-sourced blind authentication of co-channel transmitters. Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Seoul, Korea.","DOI":"10.1109\/DySPAN.2018.8610498"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1109\/TCCN.2019.2909028","article-title":"Crowd-Sourced Authentication for Enforcement in Dynamic Spectrum Sharing","volume":"5","author":"Kumar","year":"2019","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/3284554","article-title":"Fog-based Secure Communications for Low-power IoT Devices","volume":"19","author":"Ferretti","year":"2019","journal-title":"ACM Trans. Internet Technol."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Khan, S., and Khan, R. (2018). Elgamal Elliptic Curve Based Secure Communication Architecture for Microgrids. Energies, 11.","DOI":"10.3390\/en11040759"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.micpro.2018.05.005","article-title":"Constant-time hardware computation of elliptic curve scalar multiplication around the 128 bit security level","volume":"62","author":"Ay","year":"2018","journal-title":"Microprocess. Microsyst."},{"key":"ref_58","first-page":"343","article-title":"Fast elliptic curve scalar multiplication for resisting against SPA","volume":"17","author":"Liu","year":"2018","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.procs.2015.06.054","article-title":"Image encryption using elliptic curve cryptography","volume":"54","author":"Singh","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Das, P., and Giri, C. (2019, January 14\u201315). An Efficient Method for text Encryption using Elliptic Curve Cryptography. Proceedings of the 2018 IEEE 8th International Advance Computing Conference (IACC), Greater Noida, India.","DOI":"10.1109\/IADCC.2018.8692087"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Sau, S., Baidya, P., Paul, R., and Mandal, S. (2019). Binary Field Point Multiplication Implementation in FPGA Hardware. Intelligent and Cloud Computing, Springer.","DOI":"10.1007\/978-981-15-5971-6_42"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Hankerson, D., Hernandez, J.L., and Menezes, A. (2000, January 17\u201318). Software implementation of elliptic curve cryptography over binary fields. Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Worcester, MA, USA.","DOI":"10.1007\/3-540-44499-8_1"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/s001450010012","article-title":"Efficient arithmetic in finite field extensions with application in elliptic curve cryptography","volume":"14","author":"Bailey","year":"2001","journal-title":"J. Cryptol."},{"key":"ref_64","unstructured":"Leung, K., Ma, K., Wong, W.K., and Leong, P.H.W. (2000, January 17\u201319). FPGA implementation of a microcoded elliptic curve cryptographic processor. Proceedings of the 2000 IEEE Symposium on Field-Programmable Custom Computing Machines (Cat. No. PR00871), Napa Valley, CA, USA."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/S0898-1221(01)00133-X","article-title":"A comparison of different finite fields for elliptic curve cryptosystems","volume":"42","author":"Smart","year":"2001","journal-title":"Comput. Math. Appl."},{"key":"ref_66","first-page":"1","article-title":"Elliptic Curve Cryptography-based Combined Public Key Technique","volume":"21","author":"Zhong","year":"2003","journal-title":"Comput. Eng. Appl."},{"key":"ref_67","unstructured":"Dyka, Z., and Langendoerfer, P. (2005, January 7\u201311). Area efficient hardware implementation of elliptic curve cryptography by iteratively applying Karatsuba\u2019s method. Proceedings of the Design, Automation and Test in Europe, Munich, Germany."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Icart, T. (2009, January 16\u201320). How to hash into elliptic curves. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-642-03356-8_18"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math. Comput."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"396","DOI":"10.4218\/etrij.2017-0220","article-title":"Novel Method for DNA-Based Elliptic Curve Cryptography for IoT Devices","volume":"40","author":"Tiwari","year":"2018","journal-title":"ETRI J."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"5363","DOI":"10.1002\/sec.1702","article-title":"Message mapping and reverse mapping in elliptic curve cryptosystem","volume":"9","author":"Sengupta","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_72","first-page":"169","article-title":"Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF (2n)","volume":"8","author":"King","year":"2009","journal-title":"IJ Netw. Secur."},{"key":"ref_73","unstructured":"Rahman, A.N.M.B. (2020, January 19). We Don\u2019t Need StringBuilder for Simple Concatenation-DZone Java. Available online: Https:\/\/dzone.com\/articles\/string-concatenation-performacne-improvement-in-ja."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/3371387","article-title":"Multiplication Hits the Speed Limit","volume":"63","author":"Klarreich","year":"2019","journal-title":"Commun. ACM"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/23\/6841\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:39:32Z","timestamp":1760179172000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/23\/6841"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,30]]},"references-count":74,"journal-issue":{"issue":"23","published-online":{"date-parts":[[2020,12]]}},"alternative-id":["s20236841"],"URL":"https:\/\/doi.org\/10.3390\/s20236841","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,30]]}}}