Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Knut D. E., Iskusstvo programmirovaniya dlya EVM. Poluchislennye algoritmy, v. 2, 3-e izd., M. Villiams, 2000, 788 pp.
[2] Blake I., Seroussi G., Smart N., Elliptic Curves in Cryptography, Cambridge University Press, 1999, 205 pp. | MR
[3] Henry R., Goldberg I., Solving Discrete Logarithms in Smooth-Order Groups with CUDA, CACR Tech Report 2012-02 http://www.cacr.uwaterloo.ca/techreports/2012/cacr2012-02.pdf
[4] Çetin Kaya Koç, Tolga Acar, Burton S. Laliski(jr.), “Analyzing and Comparing Montgomery Multiplication Algorithms”, IEEE Micro, 16:3 (June 1996), 26–33 | DOI
[5] Koyama K., Tsuruoka Y., “Speeding up elliptic cryptosystems using a signed binary window method”, CRYPTO-92, 1992, 345–357 | MR
[6] Montgomery P., “Modular Multiplication Without Trial Division”, Mathematics of Computation, 44:170 (1985), 519–521 | DOI | MR | Zbl
[7] NVIDIA Corporation. NVIDIA CUDA C Programming Guide, Version 3.2, 2010
[8] Tvrdik P., CS838: Topics in parallel computing, Available in Internet at: , 1999 http://www.cs.wisc.edu/~tvrdik/21/ps/ Section21.ps