1. Bos, J.W., Halderman, J.A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. In: IACR Cryptologic, pp. 157–175 (2014)
2. Wu, X., Dandash, O., Le, P.D.: The design and implementation of a smartphone payment system based on limited-used key generation scheme. In: Proceedings of the Third International Conference on Information Technology New Generation ITNG 2006, vol. 2006, pp. 458–463 (2006)
3. Ramkumar, S.: Secure communication using elliptic curve cryptography on Android devices 2(20), 11–13 (2016)
4. Pan, W., Zheng, F., Zhao, Y., Zhu, W.T., Jing, J.: An efficient elliptic curve cryptography signature server with GPU acceleration. IEEE Trans. Inf. Forensics Secur. 12(1), 111–122 (2017)
5. Li, C.-T.: A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inf. Secur. 7(1), 3–10 (2013)