1. Kumar S S. Elliptic curve cryptography for constrained devices. Dissertation for the Doctoral Degree. Bochum: Ruhr University, 2006
2. Gura N, Patel A, Wander A S, et al. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, Cambridge, 2004. 119–132
3. Liu A, Ning P. Tiny ECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks, St. Louis, 2008. 245–256
4. Liu Z, Seo H, Großschädl J, et al. Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes. IEEE Trans Inf Foren Secur, 2015, in press
5. Liu Z, Wenger E, Großschädl J. MoTE-ECC: energy-scalable elliptic curve cryptography for wireless sensor networks. In: Proceedings of the 12th International Conference on Applied Cryptography and Network Security, Lausanne, 2014. 361–379