A. X9, Public Key Cryptography for The Financial Service Industry : The Elliptic Curve Digital Signature Algorithm (ECDSA) American National Standards Institute, pp.62-2005, 2005.

A. X9, Public Key Cryptography for The Financial Service Industry : Key Agreement and Key Transport Using Elliptic Curve Cryptography. American National Standards Institute, pp.63-2001, 2001.

S. Arno and F. Wheeler, Signed digit representations of minimal Hamming weight, IEEE Transactions on Computers, vol.42, issue.8, pp.1007-1009, 1993.
DOI : 10.1109/12.238495

D. J. Bernstein, P. Birkner, M. Joye, T. Lange, and C. Peters, Twisted Edwards Curves, Lecture Notes in Computer Science, vol.5023, pp.389-405, 2008.
DOI : 10.1007/978-3-540-68164-9_26

D. J. Bernstein and T. Lange, Explicit-formulas database

D. J. Bernstein and T. Lange, Faster addition and doubling on elliptic curves. Cryptology ePrint Archive, Report, vol.286, 2007.

E. Brier and M. Joye, Weierstra?? Elliptic Curves and Side-Channel Attacks, Public Key Cryptography ? PKC 2002, pp.335-345, 2002.
DOI : 10.1007/3-540-45664-3_24

M. Brown, D. Hankerson, J. López, and A. Menezes, Software Implementation of the NIST Elliptic Curves Over Prime Fields, Topics in Cryptology ? CT-RSA 2001, pp.250-265, 2001.
DOI : 10.1007/3-540-45353-9_19

B. Chevallier-mames, M. Ciet, and M. Joye, Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity, IEEE Transactions on Computers, vol.53, issue.6, pp.760-768, 2004.
DOI : 10.1109/TC.2004.13

B. Chevallier-mames and M. Joye, Procédé cryptographique protégé contre les attaques de typè a canal caché. French patent, pp.38-210, 2002.

H. Cohen, T. Ono, and A. Miyaji, Efficient Elliptic Curve Exponentiation Using Mixed Coordinates, Advances in Cryptology ? ASIACRYPT '98, pp.51-65, 1998.
DOI : 10.1007/3-540-49649-1_6

J. Coron, Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems ? CHES '99, pp.292-302, 1999.
DOI : 10.1007/3-540-48059-5_25

V. Dimitrov, L. Imbert, and P. Mishra, Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains, Advances in Cryptology ? ASIACRYPT 2005, pp.59-78, 2005.
DOI : 10.1007/11593447_4

URL : https://hal.archives-ouvertes.fr/lirmm-00106638

E. Brainpool, ECC Brainpool Standard Curves and Curve Genera- tion. BSI, Internet Draft v, vol.3, 2009.

H. M. Edwards, A normal form for elliptic curves, Bulletin of the American Mathematical Society, vol.44, issue.03, pp.393-422, 2007.
DOI : 10.1090/S0273-0979-07-01153-6

J. Großschädl, R. M. Avanzi, E. Savas, and S. Tillich, Energy-Efficient Software Implementation of Long Integer Modular Arithmetic, Cryptographic Hardware and Embedded Systems ? CHES 2005, pp.75-90, 2005.
DOI : 10.1007/11545262_6

D. Hankerson, A. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography, 2003.

O. Hesse, ??ber die Elimination der Variabeln aus drei algebraischen Gleichungen vom zweiten Grade mit zwei Variabeln., Journal für die reine und angewandte Mathematik, pp.68-96, 1844.
DOI : 10.1515/crll.1844.28.68

M. Joye, Fast Point Multiplication on Elliptic Curves without Precomputation
DOI : 10.1007/978-3-540-69499-1_4

M. Joye, Highly Regular m-Ary Powering Ladders, Selected Areas in Cryptography ? SAC 2009, pp.135-147, 2009.
DOI : 10.1007/978-3-642-05445-7_22

M. Joye and C. Tymen, Protections against Differential Analysis for Elliptic Curve Cryptography, Cryptographic Hardware and Embedded Systems ? CHES 2001, pp.386-400, 2001.

M. Joye and S. Yen, The Montgomery Powering Ladder, Cryptographic Hardware and Embedded Systems ? CHES 2002, pp.291-302, 2002.
DOI : 10.1007/3-540-36400-5_22

P. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Advances in Cryptology ? CRYPTO '96, pp.104-113, 1996.
DOI : 10.1007/3-540-68697-5_9

P. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, Advances in Cryptology ? CRYPTO '99, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

P. Longa, Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields, 2007.

P. Longa and A. Miri, New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version) Cryptology ePrint Archive, Report, vol.052, 2008.

M. Medwed and E. Oswald, Template attacks on ECDSA. Cryptology ePrint Archive, 2008.

N. Meloni, New Point Addition Formulae for ECC Applications, Arithmetic of Finite Fields ? WAIFI 2007, pp.189-201, 2007.
DOI : 10.1007/978-3-540-73074-3_15

URL : https://hal.archives-ouvertes.fr/lirmm-00188957

N. Meloni and M. A. Hasan, Elliptic Curve Scalar Multiplication Combining Yao???s Algorithm and Double Bases, Cryptographic Hardware and Embedded Systems ? CHES 2009, pp.304-316, 2009.
DOI : 10.1007/978-3-642-04138-9_22

P. Montgomery, Speeding the Pollard and elliptic curve methods of factorization, Mathematics of Computation, vol.48, issue.177, pp.243-264, 1987.
DOI : 10.1090/S0025-5718-1987-0866113-7

A. C. Yao, On the Evaluation of Powers, SIAM Journal on Computing, vol.5, issue.1, pp.100-103, 1976.
DOI : 10.1137/0205008