Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Secure outsourcing of modular inverses and scalar multiplications on elliptic curves
Yuan Ping; Xuyang Guo; Baocang Wang; Jingxian Zhou
International Journal of Security and Networks (IJSN), 2020 Vol.15 No.2, pp.101 - 110
15 + 7 =

Thank you for your feedback.