Use of Elliptic Curves in Cryptography, Lecture Notes in Comput. Sci, vol.218, pp.417-426, 1985. ,
DOI : 10.1007/3-540-39799-X_31
Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987. ,
DOI : 10.1090/S0025-5718-1987-0866109-5
Hyperelliptic cryptosystems, Journal of Cryptology, vol.2, issue.4, pp.139-150, 1989. ,
DOI : 10.1007/BF02252872
Elliptic curves in cryptography, 1999. ,
DOI : 10.1017/CBO9781107360211
Guide to elliptic curve cryptography, 2003. ,
Advances in Elliptic Curve Cryptography, 2005. ,
DOI : 10.1017/CBO9780511546570
Speeding up the computations on an elliptic curve using addition-subtraction chains, RAIRO - Theoretical Informatics and Applications, vol.24, issue.6, pp.24-531, 1990. ,
DOI : 10.1051/ita/1990240605311
URL : https://hal.archives-ouvertes.fr/inria-00075576
Theory and applications of the double-base number system, IEEE Transactions on Computers, vol.48, issue.10, pp.1098-1106, 1999. ,
DOI : 10.1109/12.805158
Efficient elliptic curve exponentiation, Information and Communication ? ICICS'97, pp.282-291, 1997. ,
DOI : 10.1007/BFb0028484
Radix-r Non-Adjacent Form, Information Security Conference ? ISC 2004, pp.99-110, 2004. ,
DOI : 10.1007/978-3-540-30144-8_9
An algorithm for modular exponentiation, Information Processing Letters, vol.66, issue.3, pp.155-159, 1998. ,
DOI : 10.1016/S0020-0190(98)00044-1
On converting numbers to the double-base number system, Advanced Signal Processing Algorithms, pp.70-78, 2004. ,
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm, Progress in Cryptology ? Mycrypt 2005, pp.171-182, 2005. ,
DOI : 10.1007/11554868_12
Scalar Multiplication on Koblitz Curves Using Double Bases, Lecture Notes in Comput. Sci. Report, 2006. ,
DOI : 10.1007/11958239_9
Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains, Advances in Cryptology ? Asiacrypt 2005, pp.59-78, 2005. ,
DOI : 10.1007/11593447_4
URL : https://hal.archives-ouvertes.fr/lirmm-00106638
Extended Double-Base Number System with Applications to Elliptic Curve Cryptography (2006) full version of the present paper, see Cryptology ePrint Archive ,