1. Lecture Notes in Computer Science;D.J. Bernstein,2008
2. Certicom Research. Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters, Version 1.0 (2000)
3. Comba, P.: Exponentiation cryptosystems on the IBM PC. IBM Systems Journal 29(4), 526–538 (1990)
4. Lecture Notes in Computer Science;J.-S. Coron,1999
5. Eberle, H., Wander, A., Gura, N., Chang-Shantz, S., Gupta, V.: Architectural Extensions for Elliptic Curve Cryptography over GF(2
m
) on 8-bit Microprocessors. In: International Conference on Application-specific Systems, Architectures and Processors, pp. 343–349. IEEE Computer Society (July 2005)