2 | Billy Bob Brumley and Kimmo U. Järvinen. Conversion algorithms and implementations for Koblitz curve cryptography. IEEE Transactions on Computers, 59(1):81–92, January 2010. |
| ||||
1 | Miia Hermelin and Kaisa Nyberg. Dependent linear approximations - the algorithm of Biryukov and others revisited. In J. Pieprzyk, editor, CT-RSA'10, volume 5985 of Lecture Notes in Computer Science, pages 318–333. Springer, 2010. |
|