1. Lecture Notes in Computer Science;DF Aranha,2012
2. Lecture Notes in Computer Science;DJ Bernstein,2014
3. Birkner, P., Longa, P., Sica, F.: Four-dimensional Gallant-Lambert-Vanstone scalar multiplication. Cryptology ePrint Archive, Report 2011/608 (2011).
http://eprint.iacr.org/
4. Blake-Wilson, S., Bolyard, N., Gupta, V., Hawk, C., Moeller, B.: Elliptic Curve Cryptography (ECC) cipher suites for Transport Layer Security (TLS). RFC 4492. Internet Engineering Task Force (IETF) (2006).
https://tools.ietf.org/html/rfc4492
5. Bluhm, M., Gueron, S.: Fast software implementation of binary elliptic curve cryptography. J. Cryptogr. Eng. 5(3), 215–226 (2015)