1. Bernstein D.J., Lange T.: eBATS: ECRYPT Benchmarking of Asymmetric Systems (eBATS), accessed on August 5, 2011. http://bench.cr.yp.to/ebats.html .
2. Bernstein D.J., Duif N., Lange T., Schwabe P., Yang B.-Y.: High-speed high-security signatures. In: Preneel B., Takagi T. (eds.) CHES 2011, LNCS, vol. 6917 (to appear). Springer, Heidelberg (2011).
3. Birkner P., Sica F.: Four-dimensional Gallant–Lambert–Vanstone scalar multiplication. ArXiv:1106.5149 (2011). http://arxiv.org/abs/1106.5149 .
4. Brown E., Myers B.T., Solinas J.A.: Elliptic curves with compact parameters. Tech. Report, Centre for Applied Cryptographic Research (2001). http://www.cacr.math.uwaterloo.ca/techreports/2001/corr2001-68.ps .
5. Cohen H.: A Course in Computational Algebraic Number Theory. Springer, Berlin (1996)