The following publications are possibly variants of this publication:
- Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve CryptographyYan-Duan Ning, Yan-Haw Chen, Cheng-Sin Shih, Shao-I Chu. cryptography, 8(1):11, March 2024. [doi]
- A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management SystemCheng-Chi Lee, Chun-Ta Li, Zhi-Wei Chen, Yan-Ming Lai. itc, 47(2):262-274, 2018. [doi]
- Hardware Implementations of Elliptic Curve Cryptography Using Shift-Sub Based Modular Multiplication AlgorithmsYamin Li. cryptography, 7(4):57, September 2023. [doi]
- A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart cardChun-Ta Li. iet-ifs, 7(1):3-10, 2013. [doi]
- ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility NetworksK. S. Suvidha, Jothi Rangasamy, Shyam S. Kamath, Cheng-Chi Lee. cryptography, 5(4):35, 2021. [doi]