1. Akinyele, J.A., Lehmanny, C.U., Green, M.D., Pagano, M.W., Peterson, Z.N.J., Rubin, A.D.: Self-protecting electronic medical records using attribute-based encryption. Cryptology ePrint Archive, Report 2010/565 (2010),
http://eprint.iacr.org/2010/565/
2. Lecture Notes in Computer Science;D.F. Aranha,2011
3. Lecture Notes in Computer Science;P.S.L.M. Barreto,2006
4. Lecture Notes in Computer Science;J.-L. Beuchat,2010
5. Ciet, M., Joye, M., Lauter, K., Montgomery, P.L.: Trading inversions for multiplications in elliptic curve cryptography. Des. Codes Cryptography 39(2), 189–206 (2006)