Fig. 1From: Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devicesHash function mutation of curve points (example)Back to article page