On Lov??sz??? lattice reduction and the nearest lattice point problem, Combinatorica, vol.357, issue.1, pp.1-13, 1986. ,
DOI : 10.1007/BF02579403
Fast cryptography in genus 2, Advances in cryptology ? EUROCRYPT 2013, pp.7881-194, 2013. ,
DOI : 10.1007/s00145-014-9188-7
Handbook of Magma functions, p.19, 2013. ,
Efficient Scalar Multiplication by Isogeny Decompositions, Public Key Cryptography, pp.191-206, 2006. ,
DOI : 10.1007/11745853_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.2150
On Elliptic K-curves, pp.81-92 ,
DOI : 10.1007/978-3-0348-7919-4_6
Q-curves and Galois representations, pp.93-103 ,
Fault Attack on Elliptic Curve Montgomery Ladder Implementation, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.92-98, 2008. ,
DOI : 10.1109/FDTC.2008.15
URL : https://hal.archives-ouvertes.fr/hal-00373562
Mathematics of public key cryptography, 2012. ,
DOI : 10.1017/CBO9781139012843
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves, J. Crypt, vol.47, pp.24-27, 2011. ,
DOI : 10.1007/3-540-48892-8_15
Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms, Advances in Cryptology: CRYPTO 2001, pp.2139-190, 2001. ,
DOI : 10.1007/3-540-44647-8_11
Isogenies of polyquadratic $ \mathbb{Q} $-curves to their Galois conjugates, Archiv der Mathematik, vol.77, issue.5, pp.383-90, 2001. ,
DOI : 10.1007/PL00000508
Q-curves over quadratic fields, Manuscripta Mathematica, vol.141, issue.1, pp.94-95, 1997. ,
DOI : 10.1007/BF02677859
URL : http://www.digizeitschriften.de/download/PPN365956996_0094/PPN365956996_0094___log30.pdf
Twisted Edwards Curves Revisited, Advances in Cryptology ? ASIACRYPT, pp.326-343, 2008. ,
DOI : 10.1007/BFb0053453
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.3196
Efficiently computable endomorphisms for hyperelliptic curves Algorithmic number theory: ANTS-VII, Lecture Notes in Comput. Sci, pp.4076-495, 2006. ,
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication, Advances in Cryptology ? ASIACRYPT 2012, pp.718-739608, 2011. ,
DOI : 10.1007/978-3-642-34961-4_43
Speeding the Pollard and elliptic curve methods of factorization, Mathematics of Computation, vol.48, issue.177, pp.48-177, 1987. ,
DOI : 10.1090/S0025-5718-1987-0866113-7
Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Trans. Inform. Theory, vol.39, pp.5-1639, 1993. ,
Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications, Public Key Cryptography: PKC 2000, pp.1751-238, 2000. ,
DOI : 10.1007/978-3-540-46588-1_17
Elliptic curves over finite fields and the computation of square roots mod p, Math. Comp, vol.44, pp.745-63, 1985. ,
Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves, Selected Areas in Cryptography: SAC 2002, pp.2595-2616, 2003. ,
DOI : 10.1007/3-540-36492-7_3
The arithmetic of elliptic curves, Grad. Texts in Math, 2009. ,
Addition chains of vectors, Amer. Math. Monthly, vol.71, pp.7-806, 1964. ,
A New Type of Fast Endomorphisms on Jacobians of Hyperelliptic Curves and Their Cryptographic Application, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.89, issue.1, pp.124-133, 2006. ,
DOI : 10.1093/ietfec/e89-a.1.124
Isogénies entre courbes elliptiques, C. R. Math. Acad. Sci. Paris, vol.273, pp.238-279, 1971. ,
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems, J. Crypt, vol.17, pp.277-96, 2004. ,
DOI : 10.1007/3-540-44987-6_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.7702
Efficient 3-dimensional GLV method for faster point multiplication on some GLS elliptic curves, Information Processing Letters, vol.110, issue.22, pp.110-132, 2010. ,
DOI : 10.1016/j.ipl.2010.08.014