Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Explicit-formulas Database, , 2012 http://hyperelliptic.org/EFD
[2] GOST R 34.10-2001. Cryptographic data security, Signature and verification processes of [electronic] digital signature, 2001 (in Russian)
[3] GOST R 34.10-____. Cryptographic data security, Signature and verification processes of [electronic] digital signature (draft, edition 1) , 2011 (in Russian) http://www.infotecs.ru/laws/gost/proj/gost3410.pdf
[4] GOST R 34.11-____. Cryptographic data security, Hash function (draft, edition 1) , 2011 (in Russian) http://www.infotecs.ru/laws/gost/proj/gost3411.pdf
[5] Bernstein D., Birkner P., Joye M., Lange T., Peters C., Twisted Edwards curves, , 2008 http://eprint.iacr.org/2008/013 | MR
[6] Bernstein D., Lange T., Inverted Edwards coordinates, , 2007 http://eprint.iacr.org/2007/410
[7] Doche C., Kohel D. R., Sica F., “Double-base number systems for multi-scalar multiplications”, Proc. EUROCRYPT 2009, Lect. Notes Comput. Sci., 5479, 2009, 502–519 | DOI | MR
[8] Joye M., Quisquater J.-J., “Hessian elliptic curves and side-channel attacks”, Proc. CHES 2001, Lect. Notes Comput. Sci., 2162, 2001, 402–410 | DOI | MR | Zbl
[9] Kalinin M., An Implementation of the GOST R 34.10. Digital signature scheme using novel algorithms of elliptic curve scalar multiplication, Diploma paper, Moscow State Univ., 2010, 50 pp. (in Russian)
[10] Longa P., Accelerating the scalar multiplication on elliptic curve cryptosystems over prime fields, , 2008 http://eprint.iacr.org/2008/100