T. Eisenbarth, S. S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel, A Survey of Lightweight-Cryptography Implementations, IEEE Design & Test of Computers, vol.24, issue.6, pp.522-533, 2007.
DOI : 10.1109/MDT.2007.178

O. Baudron, F. Boudot, P. Bourel, E. Bresson, J. Corbel et al., GPS -An Asymmetric Identification Scheme for on the Fly Authentication of Low Cost Smart Cards, A proposal to NESSIE, 2001.

M. Mcloone and M. J. Robshaw, Public Key Cryptography and RFID Tags, " in The Cryptographers' Track at the RSA Conference ? CT-RSA, ser. Lecture Notes in Computer Science 4377, pp.372-384, 2007.

M. J. Wirthlin, Constant Coefficient Multiplication Using Look-Up Tables, The Journal of VLSI Signal Processing-Systems for Signal, Image, and Video Technology, vol.36, issue.1, pp.7-15, 2004.
DOI : 10.1023/B:VLSI.0000008066.95259.b8

M. Girault, G. Poupard, and J. Stern, On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order, Journal of Cryptology, vol.19, issue.4, pp.463-487, 2006.
DOI : 10.1007/s00145-006-0224-0

N. Consortium, Portfolio of recommended cryptographic primitives, 2003.

M. Mcloone and M. J. Robshaw, New Architectures for Low-Cost Public Key Cryptography on RFID Tags, 2007 IEEE International Symposium on Circuits and Systems, pp.1827-1830, 2007.
DOI : 10.1109/ISCAS.2007.378269

M. Girault and D. Lefranc, Public Key Authentication with One (Online) Single Addition, Cryptographic Hardware and Embedded Systems -CHES 2004, ser. Lecture Notes in Computer Science 3156, pp.413-427, 2004.
DOI : 10.1007/978-3-540-28632-5_30

J. Coron, D. Lefranc, and G. Poupard, A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis, Cryptographic Hardware and Embedded Systems -CHES 2005, ser. Lecture Notes in Computer Science 3659, pp.47-60, 2005.
DOI : 10.1007/11545262_4

B. Wyseur, White-Box Cryptography, Encyclopedia of Cryptography and Security, pp.1386-1387, 2011.

K. D. Chapman, Constant Coefficient Multipliers for the XC4000E, Tech. Rep, 1996.

N. Brisebarre, F. De-dinechin, and J. Muller, Integer and floatingpoint constant multipliers for FPGAs, pp.239-244, 2008.
URL : https://hal.archives-ouvertes.fr/ensl-00269219

O. Berder and O. Sentieys, PowWow : Power Optimized Hardware/Software Framework for Wireless Motes, International Conference on Architecture of Computing Systems -ARCS '10, pp.229-234, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00554827

Y. Oren and M. Feldhofer, A low-resource public-key identification scheme for RFID tags and sensor nodes, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.59-68, 2009.
DOI : 10.1145/1514274.1514283

M. O. Saarinen, The BlueJay Ultra-Lightweight Hybrid Cryptosystem , " in Workshop on Special Aspects of Cyber Physical Systems - TRUSTED 2012, 2012.

A. Shamir, Memory efficient variants of public-key schemes for smart card applications, Advances in Cryptology -EUROCRYPT '94, ser. Lecture Notes in Computer Science 950, pp.445-449, 1994.
DOI : 10.1007/BFb0053461