1. Abarzúa, R., Martínez, S., Miret, J.M., Tomàs, R., Valera, J.: Evitando ataques Side-Channel mediante el cálculo de curvas isógenas e isomorfas. In Proceedings of VII CIBSI, pp. 173–180, Panamá (2013)
2. Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., Heninger, N., Springall, D., Thomé, E., Valenta, L., et al.: Imperfect forward secrecy: how diffie-hellman fails in practice. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 5–17. ACM (2015)
3. Akishita, T., Takagi, T.: Zero-value point attacks on elliptic curve cryptosystem. ISC, LNCS 2851, 218–233 (2003)
4. Akishita, T., Takagi, T.: On the optimal parameter choice for elliptic curve cryptosystems using isogeny. Public Key Cryptogr. (PKC) 2947, 346–359 (2004)
5. Blake, I.F., Seroussi, G., Smart, N.: Elliptic Curves in Cryptography, London Mathematical Society Lecture Notes, vol. 265. Cambridge University Press, Cambridge (1999)