Skip to main content
. 2020 Oct 29;20(21):6158. doi: 10.3390/s20216158
ECC Elliptic Curve Cryptography
IoT Internet of Things
InV Initial Vector
CBC Cipher Block Chaining
AE Authenticated Encryption
CPA Chosen Plaintext Attack
CCA Chosen Ciphertext Attack
ECIES Elliptic Curve Integrated Encryption Scheme
ECDLP Elliptic Curve Discrete Logarithm Problem