[7]. Y. Yoon and J. Moon, "Verifying the Integrity of
Private Transaction Information in Smart
Contract using Homomorphic Encryption," 2019
IEEE Eurasia Conference on IOT,
Communication and Engineering (ECICE), 2019,
pp. 38-40, doi:
10.1109/ECICE47484.2019.8942648.
[8]. Pan Yang et.al, "An Efficient Secret Key
Homomorphic Encryption Used in Image
Processing Service", Security and
Communication Networks, Hindawi, Volume
2017, Article ID 7695751, 11 pages,
https://doi.org/10.1155/2017/7695751
[9]. J. Basilakis and B. Javadi, "Efficient Parallel
Binary Operations on Homomorphic Encrypted
Real Numbers," in IEEE Transactions on
Emerging Topics in Computing, vol. 9, no. 1, pp.
507-519, 1 Jan.-March 2021, doi:
10.1109/TETC.2019.2906047.
[10]. A. C. Mert, E. Öztürk and E. Savaş, "Design and
Implementation of Encryption/Decryption
Architectures for BFV Homomorphic Encryption
Scheme," in IEEE Transactions on Very Large
Scale Integration (VLSI) Systems, vol. 28, no. 2,
pp. 353-362, Feb. 2020, doi:
10.1109/TVLSI.2019.2943127.
[11]. A. Al Badawi, Y. Polyakov, K. M. M. Aung, B.
Veeravalli and K. Rohloff, "Implementation and
Performance Evaluation of RNS Variants of the
BFV Homomorphic Encryption Scheme," in
IEEE Transactions on Emerging Topics in
Computing, vol. 9, no. 2, pp. 941-956, 1 April-
June 2021, doi: 10.1109/TETC.2019.2902799.
[12]. Y. Ke, M. -Q. Zhang, J. Liu, T. -T. Su and X. -Y.
Yang, "Fully Homomorphic Encryption
Encapsulated Difference Expansion for
Reversible Data Hiding in Encrypted Domain," in
IEEE Transactions on Circuits and Systems for
Video Technology, vol. 30, no. 8, pp. 2353-2365,
Aug. 2020, doi: 10.1109/TCSVT.2019.2963393.
[13]. Z. Zhang, P. Cheng, J. Wu and J. Chen, "Secure
State Estimation Using Hybrid Homomorphic
Encryption Scheme," in IEEE Transactions on
Control Systems Technology, vol. 29, no. 4, pp.
1704-1720, July 2021, doi:
10.1109/TCST.2020.3019501.
[14]. Xun Wang. et.al, "A More Efficient Fully
Homomorphic Encryption SchemeBased on
GSW and DM Schemes", Hindawi, Security and
Communication Networks, Volume 2018, Article
ID 8706940, 14 pages,
https://doi.org/10.1155/2018/8706940.
[15]. Ambika Pawar, Ajay Dani, A Novel Approach
for Protecting Privacy in Cloud Storage based
Database Applications, WSEAS
TRANSACTIONS on COMPUTERS,E-ISSN:
2224-2872, Volume 15, 2016
[16]. S. K. Kermanshahi et al., "Multi-Client Cloud-
Based Symmetric Searchable Encryption," in
IEEE Transactions on Dependable and Secure
Computing, vol. 18, no. 5, pp. 2419-2437, 1
Sept.-Oct. 2021, doi:
10.1109/TDSC.2019.2950934.
[17]. M. M. Panchbhai and U. S. Ghodeswar,
"Implementation of point addition & point
doubling for Elliptic Curve," 2015 International
Conference on Communications and Signal
Processing (ICCSP), 2015, pp. 0746-0749, doi:
10.1109/ICCSP.2015.7322589.
[18]. T. Chen, H. Li, K. Wu and F. Yu,
"Countermeasure of ECC against Side-Channel
Attacks: Balanced Point Addition and Point
Doubling Operation Procedure," 2009 Asia-
Pacific Conference on Information Processing,
2009, pp. 465-469, doi:
10.1109/APCIP.2009.250.
[19]. W. Wang, Y. Hu, L. Chen, X. Huang, and B.
Sunar, “Exploring the feasibility of fully
homomorphic encryption,” IEEE Trans. Comput.,
vol. 64, no. 3, pp. 698–706, Mar. 2015
[20]. Y. Li and L. Xiao, "Parallel DNA Computing
Model of Point-Doubling in Conic Curves
Cryptosystem over Finite Field GF(2^n)," 2019
IEEE 21st International Conference on High
Performance Computing and Communications;
IEEE 17th International Conference on Smart
City; IEEE 5th International Conference on Data
Science and Systems (HPCC/SmartCity/DSS),
2019, pp. 1564-1571, doi:
10.1109/HPCC/SmartCity/DSS.2019.00215.
[21]. C. Andres Lara-Nino, A. Diaz-Perez and M.
Morales-Sandoval, "A comparison of Differential
Addition and Doubling in Binary Edwards
Curves for Elliptic Curve Cryptography," 2021
Fifth World Conference on Smart Trends in
Systems Security and Sustainability (WorldS4),
2021, pp. 12-18, doi:
10.1109/WorldS451998.2021.9514047.
[22]. A. Sakthivel and R. Nedunchezhian, "Decreasing
point multiplication over ECC (Zp) using tree
computations," 2012 International Conference on
Computing, Communication and Applications,
2012, pp. 1-5, doi:
10.1109/ICCCA.2012.6179229.
[23]. M. M. Islam, M. S. Hossain, M. K. Hasan, M.
Shahjalal and Y. M. Jang, "FPGA
Implementation of High-Speed Area-Efficient
Processor for Elliptic Curve Point Multiplication
Over Prime Field," in IEEE Access, vol. 7, pp.
178811-178826, 2019, doi:
10.1109/ACCESS.2019.2958491.
[24]. M. R. Hossain, M. S. Hossain and Y. Kong,
"Efficient FPGA Implementation of Unified Point
Operation for Twisted Edward Curve
Cryptography," 2019 International Conference on
Computer, Communication, Chemical, Materials
and Electronic Engineering (IC4ME2), 2019, pp.
1-4, doi: 10.1109/IC4ME247184.2019.9036635.
[25]. N. Pirotte, J. Vliegen, L. Batina and N. Mentens,
"Design of a Fully Balanced ASIC Coprocessor
WSEAS TRANSACTIONS on POWER SYSTEMS
DOI: 10.37394/232016.2022.17.25
R. Bhagyalakshmi, Roopashree D., Shruthi K. N