1. Aranha, D.F., Barreto, P.S.L.M., Pereira, G.C.C.F., Ricardini, J.: A note on high-security general-purpose elliptic curves (2013).
http://eprint.iacr.org/2013/647
2. Lecture Notes in Computer Science;DJ Bernstein,2006
3. Bernstein, D.J., Chuengsatiansup, C., Lange, T.: Curve41417: Karatsuba revisited. Cryptology ePrint Archive, Report 2014/526 (2014).
http://eprint.iacr.org/
4. Bernstein, D.J., Hamburg, M., Krasnova, A., Lange, T.: Elligator: elliptic-curve points indistinguishable from uniform random strings. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS2013, pp. 967–980. Berlin, Germany, 4–8 November 2013
5. Bernstein, D.J., Lange, T.: Safecurves: choosing safe curves for elliptic-curve cryptography (2014).
http://safecurves.cr.yp.to
. Accessed 11 September 2014