1. Use of elliptic curves in cryptography;Miller,1985
2. Elliptic curve cryptosystems;Koblitz;Math. Comput.,1987
3. A method for obtaining digital signatures and public-key cryptosystems;Rivest;Commun. ACM,1978
4. Algorithms, key size and protocols report (2018);Smart,2018
5. Recommendation for key management, part 2: best practices for key management organization;Barker,2018