1. Bailey, D.V., Batina, L., Bernstein, D.J., Birkner, P., Bos, J.W., Chen, H.-C., Cheng, C.-M., van Damme, G., de Meulenaer, G., Dominguez Perez, L.J., Fan, J., Güneysu, T., Gurkaynak, F., Kleinjung, T., Lange, T., Mentens, N., Niederhagen, R., Paar, C., Regazzoni, F., Schwabe, P., Uhsadel, L., Van Herrewege, A., Yang, B.-Y.: Breaking ECC2K-130. Cryptology ePrint Archive, Report 2009/541 (2009), http://eprint.iacr.org/2009/541
2. Lecture Notes in Computer Science;D.J. Bernstein,2009
3. Bernstein, D.J.: Optimizing linear maps modulo 2. In: Workshop Record of SPEED-CC: Software Performance Enhancement for Encryption and Decryption and Cryptographic Compilers, pp. 3–18 (2009), http://cr.yp.to/papers.html#linearmod2
4. Bolotov, A.A., Gashkov, S.B.: On a quick multiplication in normal bases of finite fields. Discrete Mathematics and Its Applications 11, 327–356 (2001)
5. Brauer, A.T.: On addition chains. Bulletin of the American Mathematical Society 45, 736–739 (1939)