1. Bafandehkar, M., Md Yasin, S., Mahmod, R.: Comparison of ECC and RSA algorithm in resource constrained devices. In: 2013 International Conference on IT Convergence and Security, pp. 1–3 (2013)
2. Hosseinzadeh, N.A.: Elliptic curve cryptography, University of Windsor, 31 July 2016.
www.vlsi.uwindsor.ca/presentations/hossei1.pdf
3. Gajbhiye, S., Karmakar, S.: Application of elliptic curve method in cryptography: a literature review. Int. J. Comput. Sci. Inf. Technol. 3, 4499–4503 (2012)
4. Massey, J., Omura, J.K.: Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission. US Patent 4,567,600, 28 January 1986
5. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theor. IT-31(4), 469–472 (1984)