1. V. S. Miller, Use of elliptic curves in cryptography (Springer, 1986).
2. Elliptic curve cryptosystems
3. The advantages of elliptic curve cryptography for wireless security
4. K. Koyama, U. M. Maurer, T. Okamoto, and S. A. Vanstone, eds., Annual International Cryptology Conference (Springer, 1991).
5. N. Demytko, ed., Advances in Cryptology—EUROCRYPT’93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23–27, 1993 Proceedings 12 (Springer, 1994).