1. National Institute of Standards and Technology: Security Requirements for Cryptographic Modules. Technical report, Federal Information Processing Standards Publications (FIPS PUBS) 140-2, Change Notice 2 December 03, 2002, U.S. Department of Commerce, Washington, D.C. (2001)
2. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)
3. Bernstein, D.J., Lange, T.: Security dangers of the NIST curves. In: Invited talk. International State of the Art Cryptography Workshop, Athens, Greece (2013)
4. Lecture Notes in Computer Science;DJ Bernstein,2006
5. Lecture Notes in Computer Science;DJ Bernstein,2011