1. Miller, V.S.: Use of elliptic curves in cryptography. In: Exploratory Computer Science, pp. 6–10. IBM Research, Yorktown Heights, New York (2013)
2. Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)
3. Perumal, V., Gao, X.: Comparative analysis of elliptic curve cryptosystem and its survey. J. Chem. Pharm. Sci. 10(1), 414–419 (2017)
4. Christi, C., Kancheti, S.: Comparative study of elliptic curve cryptography and RSA in constrained environment (2010)
5. Setiadi, I., Kistijantoro, A.I., Miyaji, A.: Elliptic curve cryptography: algorithms and implementation analysis over coordinate systems. In: International Conference on Advanced Informatics: Concepts, Theory and Applications, November (2015)