1.
Saare MA, Jawad MN, Al-Shareeda MA, Almaiah MA, Obeidat M. Evaluating elliptic curve cryptography in constrained environments: A Raspberry Pi-based approach. ijirss [Internet]. 2025 Apr. 14 [cited 2025 Jun. 28];8(2):3966-7. Available from: https://www.ijirss.com/index.php/ijirss/article/view/6195