1. A.O.L. Atkin, F. Morain: “Elliptic Curves and Primality Proving„, Research Report 1256, INRIA, Juin (1990).
2. J. Chao, K. Tanada, S. Tsujii: “On secure elliptic curves against reduction attack and their design strategy„, IEICE, Symposium on Cryptography and Information Security, SCIS’94, 10A, 1994-1. IEICE, Tech. rep. ISEC-93-100, p29–37, Mar. (1994)
3. Lect Notes Comput Sci;J. Chao,1994
4. J. Chao, K. Harada, N. Matsuda, S. Tsujii: “Design of secure elliptic curves over extension fields with CM fields methods„, IEICE, Symposium on Cryptography and Information Security, SCIS’94, A5.5, 1995-1. IEICE, Tech. rep. ISEC-95-52, p.1–12, 1995–3. Proc. of Pragocrypto’96, p.93-108, (1996)
5. J. Chao, N. Matsuda, S. Tsujii “Efficient construction of secure hyperelliptic discrete logarithm problems„ Springer-Verlag Lecture Notes on Computer Science, Vol.1334, pp.292–301, “Information and Communication Security„ Y. Han, T. Okamoto, S. Qing (Eds.) Proceedings of First International Conference ICICS’97, Beijing, China, Nov., (1997)