1. [1] M. Stamp, Information Security - Principles and Practice, John Wiley & Sons Inc., New Jersey, USA, 2006.
2. [2] J. P. Kaps, “Cryptography for Ultra-Low Power Devices,” Ph.D. dissertation, ECE Department, Worcester Polytechnic Institute, Worcester, Massachusetts, USA, May 2006.
3. [3] D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography, Springer-Verlag New York Inc., New York, USA, 2004.
4. [4] S. S. Kumar, “Elliptic Curve Cryptography For Constrained Devices,” Ph.D. dissertation, Electrical Engineering and Information Technology Department, Ruhr-University, Bochum, Germany, June 2006.
5. Elliptic-Curve-Based Security Processor for RFID