1. Lecture Notes in Computer Science;C Aguilar-Melchor,2013
2. ARM Limited: Cortex-A57 Software Optimization Guide (2016). http://infocenter.arm.com/help/topic/com.arm.doc.uan0015b
3. Azarderakhsh, R., Fishbein, D., Jao, D.: Efficient implementations of a quantum-resistant key-exchange protocol on embedded systems. Technical report (2014). http://cacr.uwaterloo.ca/techreports/2014/cacr2014-20.pdf
4. Azarderakhsh, R., Jao, D., Kalach, K., Koziel, B., Leonardi, C.: Key compression for isogeny-based cryptosystems. In: Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC 2016, pp. 1–10. ACM, New York (2016). http://doi.acm.org/10.1145/2898420.2898421
5. Bröker, R.: Constructing supersingular elliptic curves. J. Comb. Number Theor. 1(3), 269–273 (2009)