J. Daniel and . Bernstein, qhasm: tools to help write high-speed software

J. Daniel and . Bernstein, Curve25519: new Diffie-Hellman speed records, Moti Yung, Yevgeniy Dodis Public Key Cryptography ? PKC 2006, pp.207-228, 2006.

D. J. Bernstein, N. Duif, T. Lange, P. Schwabe, and B. Yang, High-speed high-security signatures, Cryptographic Hardware and Embedded Systems ? CHES 2011, pp.124-142, 2011.
DOI : 10.1007/978-3-642-23951-9_9

D. J. Bernstein, N. Duif, T. Lange, P. Schwabe, and B. Yang, High-speed high-security signatures, Journal of Cryptographic Engineering, vol.30, issue.2, pp.77-89, 2012.
DOI : 10.1023/A:1025436905711

M. Bond and R. Anderson, API-level attacks on embedded systems, Computer, vol.34, issue.10, pp.67-75, 2001.
DOI : 10.1109/2.955101

URL : http://www.cl.cam.ac.uk/users/mkb23/research/API-Attacks.pdf

B. B. Brumley, M. Barbosa, D. Page, and F. Vercauteren, Practical realisation and elimination of an ecc-related software bug attack Topics in Cryptology -CT-RSA 2012 -The Cryptographers' Track at the RSA Conference, Proceedings, volume 7178 of Lecture Notes in Computer Science, pp.171-186, 2012.

Y. Chen, C. Hsu, H. Lin, P. Schwabe, M. Tsai et al., Verifying Curve25519 Software, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.299-309, 2014.
DOI : 10.1145/363235.363259

J. Choi, M. Vijayaraghavan, B. Sherman, and A. Chlipala, Kami: a platform for high-level parametric hardware specification and its modular verification, Proceedings of the ACM on Programming Languages, vol.1, issue.ICFP, p.24, 2017.
DOI : 10.1109/HPCA.2014.6835949

S. Delaune, S. Kremer, and G. Steel, Formal security analysis of PKCS#11 and proprietary extensions, Journal of Computer Security, vol.18, issue.6, pp.1211-1245, 2010.
DOI : 10.3233/JCS-2009-0394

M. Egele, D. Brumley, Y. Fratantonio, and C. Kruegel, An empirical study of cryptographic misuse in android applications, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.73-84, 2013.
DOI : 10.1145/2508859.2516693

P. Leo, G. , and L. L. Iacono, Towards the usability evaluation of security apis, HAISA, pp.252-265, 2016.

R. Künnemann and G. Steel, YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM, Revised Selected Papers of the 8th Workshop on Security and Trust Management (STM'12), pp.257-272, 2012.
DOI : 10.1007/978-3-642-38004-4_17

D. Longley and S. Rigby, An automatic search for security flaws in key management schemes, Computers & Security, vol.11, issue.1, pp.75-89, 1992.
DOI : 10.1016/0167-4048(92)90222-D

J. Protzenko, J. Zinzindohoué, A. Rastogi, T. Ramananandro, P. Wang et al., Cédric Fournet, et al. Verified low-level programming embedded in f, Proceedings of the ACM on Programming Languages, vol.1, issue.ICFP, p.17, 2017.

A. Whitten and J. Tygar, Why johnny can't encrypt: A usability evaluation of pgp 5.0, Usenix Security, 1999.

J. Karim-zinzindohoué, E. Bartzia, and K. Bhargavan, A Verified Extensible Library of Elliptic Curves, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.296-309, 2016.
DOI : 10.1109/CSF.2016.28