However, it scans input scalars from proper to still left. During this paper, our created scalar multiplication algorithms also use their extended affine, but scan from left to appropriate (LR). We also verify the security of our LR ECSM algorithms and evaluate them the two theoretically and experimentally. Our new http://thomasm815boc4.blogsuperapp.com/profile