1. Bach E.: Analytic Methods in the Analysis and Design of Number-Theoretic Algorithms. MIT Press, Cambridge (1984).
2. Bröker R.: Constructing Elliptic Curves of Prescribed Order. PhD thesis, Universiteit Leiden (2006).
3. Charles D.X., Lauter K.E., Goren E.Z.: Cryptographic hash functions from expander graphs. J. Cryptol. 22(1), 93–113 (2009).
4. Cohen H.: A Course in Computational Algebraic Number Theory. Springer, Berlin (1996).
5. Cox D.A.: Primes of the Form $$x^2 + n y^2 $$ x 2 + n y 2 . Wiley, Hoboken (1989).