1. Mujahid, U., Najam-Ul-Islam, M., Shami, M.A.: RCIA: a new ultralightweight RFID authentication protocol using recursive hash. Int. J. Distrib. Sens. Netw. 2015(3), 1–8 (2015)
2. Guo, C., Zhang, Z.J., Zhu, L.H., et al.: A novel secure group RFID authentication protocol. J. China Univ. Posts Telecommun. 21(1), 94–103 (2014)
3. Nicolas, M.: Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains. IACR Cryptology Eprint Archive (2006)
4. Venelli, A., Dassance, F.: Fast scalar multiplication for elliptic curve cryptosystems over prime fields: US, US 8369517 B2 (2013)
5. Liao, Y.P., Hsiao, C.M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 18(7), 133–146 (2014)