1. The mathematical components project, http://www.msr-inria.fr/projects/mathematical-components/
2. Avalle, M., Pironti, A., Sisto, R.: Formal verification of security protocol implementations: a survey. In: Formal Aspects of Computing, pp. 1–25 (2012)
3. Lecture Notes in Computer Science;E. Brier,2003
4. Brumley, B.B., Barbosa, M., Page, D., Vercauteren, F.: Practical realisation and elimination of an ecc-related software bug attack. Cryptology ePrint Archive, Report 2011/633 (2011), http://eprint.iacr.org/
5. Charlap, L.S., Robbins, D.P.: Crd expository report 31 an elementary introduction to elliptic curves (1988)