A. Alexandrescu, Modern C++ design: generic programming and design patterns applied, 2001.

A. Byrne, N. Meloni, A. Tisserand, E. M. Popovici, and W. P. Marnane, Comparison of simple power analysis attack resistant algorithms for an ECC, Journal of Computers, vol.2, issue.10, pp.52-62, 2007.

P. Gaudry and E. Thomé, The mpFq library and implementing curve-based key exchanges, Proc. Software Performance Enhancement for Encryption and Decryption Workshop, pp.49-64, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00168429

D. Hankerson, A. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography, 2004.

L. Imbert, A. Peirera, and A. Tisserand, A library for prototyping the computer arithmetic level in elliptic curve cryptography, Proc. Advanced Signal Processing Algorithms, Architectures and Implementations XVII, pp.1-9, 2007.
URL : https://hal.archives-ouvertes.fr/lirmm-00153369

C. Kaya-koc, T. Acar, J. Burton, and S. Kaliski, Analyzing and comparing Montgomery multiplication algorithms, IEEE Micro, vol.16, issue.3, pp.26-33, 1996.
DOI : 10.1109/40.502403

P. L. Montgomery, Modular multiplication without trial division, Mathematics of Computation, vol.44, issue.170, pp.519-521, 1985.
DOI : 10.1090/S0025-5718-1985-0777282-X

R. Szerwinski and T. Güneysu, Exploiting the Power of GPUs for Asymmetric Cryptography, Proc. Cryptographic Hardware and Embedded Systems, pp.79-99, 2008.
DOI : 10.1007/978-3-540-85053-3_6