D. Hankerson, A. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography, 2004.

V. Dimitrov, T. Cooklev, +. , and +. .. , Hybrid algorithm for the computation of the matrix polynomial I, IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, pp.377-380, 1995.

V. Dimitrov, G. Jullien, and W. Miller, An algorithm for modular exponentiation, Information Processing Letters, vol.66, issue.3, pp.155-159, 1998.
DOI : 10.1016/S0020-0190(98)00044-1

V. Dimitrov, L. Imbert, and P. K. Mishra, Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains, Proc. 11th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), ser. LNCS, pp.59-78, 2005.
DOI : 10.1007/11593447_4

URL : https://hal.archives-ouvertes.fr/lirmm-00106638

C. Doche and L. Imbert, Extended Double-Base Number System with Applications to Elliptic Curve Cryptography, Proc. 7th International Conference on Cryptology (INDOCRYPT), ser, pp.335-348, 2006.
DOI : 10.1007/11941378_24

URL : https://hal.archives-ouvertes.fr/lirmm-00125442

R. Barua, S. K. Pandey, and R. Pankaj, Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System, Proc. 8th International Conference on Progress in Cryptology (IN- DOCRYPT), ser. LNCS, pp.351-360, 2007.
DOI : 10.1007/978-3-540-77026-8_27

D. J. Bernstein, P. Birkner, T. Lange, and C. Peters, Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication, Proc. 8th International Conference on Progress in Cryptology (INDOCRYPT), ser. LNCS, pp.167-182, 2007.
DOI : 10.1007/978-3-540-77026-8_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.8916

C. Doche and L. Habsieger, A Tree-Based Approach for Computing Double-Base Chains, Proc. 13th Australasian Conference on Information Security and Privacy, ser. LNCS, pp.433-446, 2008.
DOI : 10.1007/978-3-540-70500-0_32

V. Dimitrov, L. Imbert, and P. K. Mishra, The double-base number system and its application to elliptic curve cryptography, Mathematics of Computation, vol.77, issue.262, pp.1075-1104, 2008.
DOI : 10.1090/S0025-5718-07-02048-0

URL : https://hal.archives-ouvertes.fr/lirmm-00341742

S. Singha, A. Ghosh, and A. Sinha, A new architecture for FPGA based implementation of conversion of binary to double base number system (DBNS) using parallel search technique, ACM SIGARCH Computer Architecture News, vol.39, issue.5, pp.12-18, 2011.
DOI : 10.1145/2093339.2093343

T. Chabrier, D. Pamula, and A. Tisserand, Hardware implementation of DBNS recoding for ECC processor, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers, pp.1129-1133, 2010.
DOI : 10.1109/ACSSC.2010.5757580

URL : https://hal.archives-ouvertes.fr/inria-00536587

P. K. Mishra and V. Dimitrov, Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation, Proc. 10th International Conference on Information COMPARISON OF SCALAR MULTIPLICATION METHODS
DOI : 10.1007/978-3-540-75496-1_26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.75.9351

P. Longa, Accelerating the scalar multiplication on elliptic curve cryptosystems over prime fields, 2007.

P. Longa and C. Gebotys, Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication, Proc. Public Key Cryptography (PKC), ser. LNCS, pp.443-462, 2009.
DOI : 10.1007/978-3-642-00468-1_25

G. N. Purohit and A. S. Rawat, Fast scalar multiplication in ECC using the multi base number system, International Journal of Computer Science Issues, vol.8, issue.1, pp.131-137, 2011.

X. Yin, T. Yang, and J. Ning, Optimized approach for computing multibase chains, Proc. 7th International Conference on Computational Intelligence and Security (CIS). IEEE, pp.964-968, 2011.

J. Adikari, V. S. Dimitrov, and L. Imbert, Hybrid Binary-Ternary Number System for Elliptic Curve Cryptosystems, IEEE Transactions on Computers, vol.60, issue.2, pp.254-265, 2011.
DOI : 10.1109/TC.2010.138

URL : https://hal.archives-ouvertes.fr/lirmm-00595207

G. Purohit, A. S. Rawat, and M. Kumar, Elliptic curve point multiplication using MBNR and point halving, International Journal of Advanced Networking and Applications, vol.3, issue.5, pp.1329-1337, 2012.

J. Sakarovitch, Elements of Automata Theory. Cambridge, 2009, ch. Prologue: M. Pascal's Division Machine, pp.1-6

T. Jebelean, An Algorithm for Exact Division, Journal of Symbolic Computation, vol.15, issue.2, pp.169-180, 1993.
DOI : 10.1006/jsco.1993.1012

N. Boullis and A. Tisserand, Some Optimizations of Hardware Multiplication by Constant Matrices, IEEE Transactions on Computers, vol.54, issue.10, pp.1271-1282, 2005.
DOI : 10.1109/TC.2005.168

URL : https://hal.archives-ouvertes.fr/lirmm-00113092

A. Byrne, E. Popovici, and W. Marnane, Versatile processor for GF(pm) arithmetic for use in cryptographic applications, 26] S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, pp.253-264, 2007.
DOI : 10.1049/iet-cdt:20070077

E. Oswald, Advances in Elliptic Curve Cryptography, ser Lecture Note Series, pp.69-86, 2005.

M. Joye, Advances in Elliptic Curve Cryptography, ser Lecture Note, ch. Defenses Against Side-Channel Analysis, pp.87-100, 2005.

A. Byrne, N. Meloni, A. Tisserand, E. M. Popovici, and W. P. Marnane, Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem, Journal of Computers, vol.2, issue.10, pp.52-62, 2007.
DOI : 10.4304/jcp.2.10.52-62

URL : https://hal.archives-ouvertes.fr/lirmm-00174648

P. Giorgi, L. Imbert, and T. Izard, Optimizing elliptic curve scalar multiplication for small scalars, Proc. Mathematics for Signal and Information Processing, pp.74-440, 2009.
URL : https://hal.archives-ouvertes.fr/lirmm-00424282

P. Longa and C. Gebotys, Setting speed records with the (fractional) multibase non-adjacent form method for efficient elliptic curve scalar multiplication, Cryptology ePrint Archive, 2008.

P. Longa and A. Miri, New multibase non-adjacent form scalar multiplication and its application to elliptic curve cryptosystems, IACR Eprint, 2008.

K. Itoh, M. Takenaka, N. Torii, S. Temma, and Y. Kurihara, Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201, Proc. Cryptographic Hardware and Embedded Systems (CHES), ser. LNCS, pp.61-72, 1999.
DOI : 10.1007/3-540-48059-5_7