1. Use of elliptic curves in cryptography;Miller,1986
2. Exceptional procedure attack on elliptic curve cryptosystems;Izu,2003
3. A normal form for elliptic curves;Edwards,2007
4. D.J. Bernstein, T. Lange, R.R. Farashahi, Binary Edwards Curves, Cryptology ePrint Archive, Report 2008/171, 2008 〈http://eprint.iacr.org/〉.
5. Ayantika Chatterjee, Indranil Sengupta, FPGA implementation of binary edwards curve using ternary representation, in: Proceedings of the ACM Great Lakes Symposium on VLSI 2011, pp. 73–78.