1. [7] Darrel Hankerson, Alfred J. Menezes, and Scott Vanstone. Guide to Elliptic Curve Cryptography. Springer-Verlag, Berlin, Heidelberg, 2003.
2. [8] Cameron F. Kerry, Acting Secretary, and Charles Romine Director. Fips pub 186-4 federal information processing standards publication digital signature standard (DSS), 2013.
3. [14] Debdeep Mukhopadhyay Poulami Das, Debapriya Basu Roy. Exploiting the order of multiplier operands: A low cost approach for hcca resistance. Cryptology ePrint Archive, Report 2015/925, 2015. https://eprint.iacr.org/2015/925.
4. [15] Takeshi Sugawara, Daisuke Suzuki, and Minoru Saeki. Two operands of multipliers in side-channel attack. In Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design, volume 9064, Berlin, Heidelberg, 2015. Springer-Verlag.