1. Al-Daoud E., Mahmod R., Rushdan M., Kilicman A.: A new addition formula for elliptic curves over GF(2 n ). IEEE Trans. Comput. 51(8), 972–975 (2002)
2. Avanzi R.: Delaying and merging operations in scalar multiplication: applications to curve-based cryptosystems. In: Biham E., Youssef A.M. (eds.) Selected Areas in Cryptography: 13th International Workshop, SAC 2006, Montreal, Quebec, Canada, August 17–18, 2006, Revised Selected Papers, Lecture Notes in Comput. Sci., vol. 4356, pp. 203–219. Springer, Berlin (2007).
3. Avanzi R., Ciet M., Sica F.: Faster scalar multiplication on Koblitz curves combining point halving with the Frobenius endomorphism. In: Bao F., Deng R.H., Zhou J. (eds.) Public Key Cryptography—PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1–4, 2004, Lecture Notes in Comput. Sci., vol. 2947, pp. 28–40. Springer (2004).
4. Avanzi R., Cohen H., Doche C., Frey G., Lange T., Nguyen K.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press Series on Discrete Mathematics and its Applications, vol. 34. Chapman & Hall/CRC, Boca Raton, FL (2005).
5. Avanzi R., Dimitrov V., Doche C., Sica F.: Extending scalar multiplication using double bases. In: Lai X., Chen K. (eds.) Advances in Cryptology—ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3–7, 2006, Proceedings Lecture Notes in Comput. Sci., vol. 4284, pp. 130–144. Springer (2006).