1. Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48, 203–209.
2. Miller, V. (1985). Use of elliptic curves in cryptography. In Advances in Cryptology (pp. 417–426).
3. Hankerson, D., Menezes, A., & Vanstone, S. (2003). Guide to Elliptic Curve Cryptography. Berlin: Springer-Verlag.
4. Okada, S., Torii, N., Itoh, K., & Takenaka, M. (2000). Implementation of elliptic curve cryptographic coprocessor over $${\text{GF}}(2^{m})$$ GF ( 2 m ) on an FPGA. In Cryptographic Hardware and Embedded Systems (pp. 25–40).
5. N. I. of Standards and Technology. (2000). Digital signature standard. FIPS Publication, Technical Report.