1. [1] R. Avanzi, H. Cohen, C. Doche, G. Frey, T. Lange, K. Nguyen, and F. Vercauteren, Handbook of elliptic and hyperelliptic curve cryptography, CRC Press, Boca Raton, 2005.
2. [2] D. Bleichenbacher, Efficiency and security of cryptosystems based on number theory, Ph.D. Thesis, ETH Zürich, 1996. URL: http://www.bell-labs.com/user/bleichen/diss/thesis.html
3. [3] W. Bosma, J. Cannon, and C. Playoust, MAGMA 2.14-1, available at http://magma.maths.usyd.edu.au/
4. Montgomery Scalar Multiplication for Genus 2 Curves