V. S. Miller, Use of Elliptic Curves in Cryptography, Lecture Notes in Comput. Sci, vol.218, pp.417-426, 1985.
DOI : 10.1007/3-540-39799-X_31

N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987.
DOI : 10.1090/S0025-5718-1987-0866109-5

N. Koblitz, Hyperelliptic cryptosystems, Journal of Cryptology, vol.2, issue.4, pp.139-150, 1989.
DOI : 10.1007/BF02252872

I. F. Blake, G. Seroussi, and N. P. Smart, Elliptic curves in cryptography, 1999.
DOI : 10.1017/CBO9781107360211

D. Hankerson, A. J. Menezes, and S. A. Vanstone, Guide to elliptic curve cryptography, 2003.

I. F. Blake, G. Seroussi, and N. P. Smart, Advances in Elliptic Curve Cryptography, 2005.
DOI : 10.1017/CBO9780511546570

F. Morain and J. Olivos, Speeding up the computations on an elliptic curve using addition-subtraction chains, RAIRO - Theoretical Informatics and Applications, vol.24, issue.6, pp.24-531, 1990.
DOI : 10.1051/ita/1990240605311

URL : https://hal.archives-ouvertes.fr/inria-00075576

V. S. Dimitrov, G. A. Jullien, and W. C. Miller, Theory and applications of the double-base number system, IEEE Transactions on Computers, vol.48, issue.10, pp.1098-1106, 1999.
DOI : 10.1109/12.805158

A. Miyaji, T. Ono, and H. Cohen, Efficient elliptic curve exponentiation, Information and Communication ? ICICS'97, pp.282-291, 1997.
DOI : 10.1007/BFb0028484

T. Takagi, S. M. Yen, and B. C. Wu, Radix-r Non-Adjacent Form, Information Security Conference ? ISC 2004, pp.99-110, 2004.
DOI : 10.1007/978-3-540-30144-8_9

V. S. Dimitrov, G. A. Jullien, and W. C. Miller, An algorithm for modular exponentiation, Information Processing Letters, vol.66, issue.3, pp.155-159, 1998.
DOI : 10.1016/S0020-0190(98)00044-1

V. Berthé and L. Imbert, On converting numbers to the double-base number system, Advanced Signal Processing Algorithms, pp.70-78, 2004.

M. Ciet and F. Sica, An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm, Progress in Cryptology ? Mycrypt 2005, pp.171-182, 2005.
DOI : 10.1007/11554868_12

R. M. Avanzi and F. Sica, Scalar Multiplication on Koblitz Curves Using Double Bases, Lecture Notes in Comput. Sci. Report, 2006.
DOI : 10.1007/11958239_9

V. S. Dimitrov, L. Imbert, and P. K. Mishra, Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains, Advances in Cryptology ? Asiacrypt 2005, pp.59-78, 2005.
DOI : 10.1007/11593447_4

URL : https://hal.archives-ouvertes.fr/lirmm-00106638

C. Doche and L. Imbert, Extended Double-Base Number System with Applications to Elliptic Curve Cryptography (2006) full version of the present paper, see Cryptology ePrint Archive