1. V.S. Miller, Use of elliptic curves in cryptography, in: Proceedings of the Advances in Cryptology, CRYPTO’85, 1986, pp. 417–426.
2. Elliptic curve cryptosystems;Koblitz;Mathematics of Computation,1987
3. M. Rosing, Implementing elliptic curve cryptography, Manning, 1999.
4. D. Hankerson, J. Hernandez, A. Menezes, Software implementation of elliptic curve cryptography over binary fields, in: Proceedings of the CHES 2000, Lecture Notes in Computer Science, vol. 1965, 2000, pp. 1–24.
5. A scalable dual-field elliptic curve cryptographic processor;Satoh;IEEE Transactions on Computers,2003