M. Avalle, A. Pironti, and R. Sisto, Formal verification of security protocol implementations: a survey, Formal Aspects of Computing, vol.155, issue.1, pp.1-25, 2012.
DOI : 10.1007/s00165-012-0269-9

URL : https://hal.archives-ouvertes.fr/hal-00863392

E. Brier and M. Joye, Fast Point Multiplication on Elliptic Curves through Isogenies, AAECC, pp.43-50, 2003.
DOI : 10.1007/3-540-44828-4_6

B. B. Brumley, M. Barbosa, D. Page, and F. Vercauteren, Practical Realisation and Elimination of an ECC-Related Software Bug Attack, Cryptology ePrint Archive Report, vol.48, issue.177, 2011.
DOI : 10.1007/11761679_2

L. S. Charlap and D. P. Robbins, Crd expository report 31 an elementary introduction to elliptic curves, 1988.

C. Cohen, Pragmatic Quotient Types in Coq, ITP, pp.213-228, 2013.
DOI : 10.1007/978-3-642-39634-2_17

M. Dénès, A. Mörtberg, and V. Siles, A refinement-based approach to computational algebra in coq, ITP, pp.83-98, 2012.

C. Doche, T. Icart, and D. R. Kohel, Efficient Scalar Multiplication by Isogeny Decompositions, Public Key Cryptography, pp.191-206, 2006.
DOI : 10.1007/11745853_13

W. Fulton, Algebraic curves -an introduction to algebraic geometry (reprint vrom 1969) Advanced book classics, 1989.

R. P. Gallant, R. J. Lambert, and S. A. Vanstone, Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms, CRYPTO, pp.190-200, 2001.
DOI : 10.1007/3-540-44647-8_11

G. Gonthier, A. Mahboubi, and E. Tassi, A Small Scale Reflection Extension for the Coq system, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00258384

P. Guillot, Courbes Elliptiques, une présentationprésentationélémentaire pour la cryptographie, 2010.

J. Hurd, M. Gordon, and A. Fox, Formalized elliptic curve cryptography, High Confidence Software and Systems, 2006.

N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987.
DOI : 10.1090/S0025-5718-1987-0866109-5

S. Victor and . Miller, Use of elliptic curves in cryptography, CRYPTO, pp.417-426, 1985.

S. Victor, T. J. Miller, . Watson, and . Center, Short programs for functions on curves, IBM, 1986.

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, CRYPTO, pp.47-53, 1984.
DOI : 10.1007/3-540-39568-7_5

E. Whitman, S. , and D. L. Dill, Automatic formal verification of block cipher implementations, In FMCAD, pp.1-7, 2008.

L. Théry, Proving the group law for elliptic curves formally, 2007.