A note on high-security general-purpose elliptic curves, Cryptology ePrint Archive, 2013. ,

, Curve25519: New Diffie-Hellman speed records, vol.3958, pp.207-228, 2006.

Twisted Edwards curves, Progress in Cryptology -AFRICACRYPT, vol.5023, pp.389-405, 2008. ,

Curve41417: Karatsuba revisited, Cryptographic Hardware and Embedded Systems -CHES 2014, vol.8731, pp.316-334, 2014. ,

Faster addition and doubling on elliptic curves, Advances in Cryptology -ASIACRYPT, vol.4833, pp.29-50, 2007. ,

SafeCurves: Choosing safe curves for elliptic-curve cryptography, 2013. ,

Presentation given at the 3rd Workshop on International View of the State-of-the-Art of Cryptography and Security and its Use in Practice, 2013. ,

Elliptic curve cryptography (ECC) nothing up my sleeve (NUMS) curves and curve generation, 2015. ,

Elliptic Curves in Cryptography, London Mathematical Society Lecture Notes Series, vol.265, 1999. ,

Selecting elliptic curves for cryptography: An efficiency and security analysis, Journal of Cryptographic Engineering, vol.6, issue.4, pp.259-286, 2016. ,

Fast point multiplication on elliptic curves through isogenies, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes -AAECC 2003, vol.2643, pp.43-50, 2003. ,

Twisted Edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes, Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography, pp.39-44, 2013. ,

A brief discussion on selecting new elliptic curves, 2015. ,

ECC Brainpool standard curves and curve generation, 2005. ,

A normal form for elliptic curves, Bulletin of the American Mathematical Society, vol.44, issue.3, pp.393-422, 2007. ,

Diversity and transparency for ECC. Cryptology ePrint Archive, 2015. ,

Faster point multiplication on elliptic curves with efficient endomorphism, Advances in Cryptology -CRYPTO, vol.2139, pp.190-200, 2001. ,

Side-channel analysis of cryptographic software via early-terminating multiplications, Lecture Notes in Computer Science, vol.5984, pp.176-192, 2009. ,

Fast and compact elliptic-curve cryptography, Cryptology ePrint Archive, vol.309, 2012. ,

Guide to Elliptic Curve Cryptography, 2004. ,

Twisted Edwards curves revisited, Advances in Cryptology -ASIACRYPT, vol.5350, pp.326-343, 2008. ,

Elliptic curves for security. Internet Engineering Task Force, vol.7748, 2016. ,

TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks, Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), pp.245-256, 2008. ,

Speeding the Pollard and elliptic curve methods of factorization, Mathematics of Computation, vol.48, issue.177, pp.243-264, 1987. ,

, Recommended Elliptic Curves for Federal Government Use. White paper, 1999.

Ed3363 (HighFive) -An alternative elliptic curve, Report 2015/991, 2015. Available for download at ,

Internet Engineering Task Force, Light-Weight Implementation Guidance (LWIG) Working Group, 2017. ,