1. Lecture Notes in Computer Science;O Acıiçmez,2008
2. Aciiçmez, O., Schindler, W., Koç, Ç.K.: Improving Brumley and Boneh timing attack on unprotected SSL implementations. In: Atluri, V., Meadows, C., Juels, A. (eds.) CCS 2005, pp. 139–146. ACM, New York (2005)
3. Bauer, A., Jaulmes, É., Prouff, E., Reinhard, J.-R., Wild, J.: Horizontal collision correlation attack on elliptic curves - extended version. Cryptogr. Commun. 7(1), 91–119 (2015)
4. Lecture Notes in Computer Science;P Belgarric,2014
5. Bernstein, D.J., Lange, T.: Explicit formulas database.
http://www.hyperelliptic.org/EFD/