[1] Miller Victor S.Uses of elliptic curves in cryptography[C]//Advances in Cryptology—CRYPTO’85, Lecture Notes in Computer Sciences.Springer-Verlag, 1986:417-428.
[2] Koblitz Neal.Elliptic curve cryptosystems [J].Mathematics of Computation, 1987, 48(177):203-209.
[3] Avanzi Roberto M, Cohen Henri, Doche Christophe, et al.Handbook of elliptic and hyperelliptic curve cryptography[M].Boca Raton, FL, USA: Chapman and Hall/CRC Press, 2005.
[4] Hankerson Darrel, Menezes Alfred J, Vanstone Scott.Guide to elliptic curve cryptography[M].Springer-Verlag, 2004.
[5] Montgomery P L.Speeding the Pollard and elliptic curve methods of factorization [J].Mathematics of Computation, 1987, 48(177):143-264.
[6] Okeya Katsuyuki, Sakurai Kouichi.Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a Montgomery-form elliptic curve[C]//Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science.Springer-Verlag, 2001, 2162:126-141.
[7] Kocher P C.Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems[C]//Advances in Cryptology—CRYPTO’96, Lecture Notes in Computer Sciences.Springer-Verlag, 1996:104-113.
[8] Kocher P C, Jaffe J, Jun B.Differential power analysis[C]//Advances in Cryptology—CRYPTO’99, Lecture Notes in Computer Sciences. Springer-Verlag, 1999:388-397.
[9] Chevallier-Mames Benoit, Ciet Mathieu, Joye Marc.Low-cost solutions for preventing simple side-channel analysis:side-channel atomicity [J].IEEE Transactions on Computers, 2004, 53(6):760-768.
[10] Knuth Donald E.The art of computer programming:fundamental algorithms [M].Addison-Wesley, 1981.
[11] Dimitrov Vassil, Imbert Laurent, Mishra Pradeep Kumar.Efficient and secure elliptic curve point multiplication using double-base chains[C]//11th International Conference on the Theory and Application of Cryptology and Information Security, Lecture Notes in Computer Sciences.Springer-Verlag, 2005, 3788:59-78.