A. lotfi and M. Doustari, “A new protocol for mobile payments using cipher-signed based on elliptic curve,” Journal of Electronic and Cyber Defense, vol. 3, no.1, pp. 53-61, 2013. (In Persian)
N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, pp. 203-209, 1987.
V. S. Miller, “Use of Elliptic Curve in Cryptography,” Advances in cryptology CRYPTO 1985, NewYork: Springer-Verlag, pp. 417-429, 1985.
A. kumar, Tyagi, M. Rana, N. ggarwal, P. Bhadana, and M. Rachna, “A Comparative Study of Public Key Cryptosystem based on ECC and RSA,” International Journal on Computer Science and Engineering (IJOARCS), 2011.
T. El Gamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory (IEEE T INFORM THEORY), vol. 31, Issue. 4, pp. 469-472, 1985.
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, “Handbook of Applied Cryptography,” CRC Press, 1997.
D. Hankerson, A. Menezes, and S. Vanstone, “Guide to Elliptic Curve Cryptography,” Springer, 2004.
C. W. Lawrence, “Elliptic Curves Number Theory and Cryptography,” Taylor & rancis Group, Second Edition, 2008.
J. Teeriaho, “Cyclic Group Cryptography with Elliptic Curves,” Brasov., May 2011.
A. Ahmed, A. El-Latif, and X. Niu, “A Hybrid Chaotic System and Cyclic Elliptic Curve for Image Encryption,” AEU-International Journal of Electronics and Communications, Elsevier, issue 2, vol. 67, pp. 136–143, 2013.
H. Liu and Y. Liu, “Cryptanalyzing an Image Encryption Scheme based on Hybrid Chaotic System and Cyclic Elliptic Curve,” Optics and Laser Technology (Opt. Laser Technol.), Elsevier, vol. 56, pp.15–19, 2014.
S. M. Celestin Vigila and K. Muneeswaran, “Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications,” International Journal of Network Security, vol. 14, no. 4, pp. 236–242, July 2012.
A. Soleymani, M. J. Nordin, and M. A. Zulkarnain, “A Novel Public Key Encryption based on Elliptic Curves Over Prime Group Field,” Journal of Image and Graphics, vol. 1, pp. 43–49, 2013.
S. Behnia, A. Akhavan, A. Akhshani, and A. Samsudin, “Image Encryption based on the Jacobian Elliptic Maps,” The Journal of System and Software(J SYST SOFTWARE), Elsevier, vol. 86, pp. 2429–2438, 2013.
L. Li, A. Abd El-Latif, and X. Niu, “Elliptic Curve ElGamal Based Homomorphic Image Encryption Scheme for Sharing Secret Images,” Signal Processing (SIGNAL PROCESS), Elsevier, vol. 92, pp. 1069–1078, 2012.
L. Tawalbeh, M. Mowafi, and W. Aljoby, “Use of Elliptic Curve Cryptography for Multimedia Encryption,” IET Information Security, vol. 7, issue 2, pp. 67–74, 2012.
L. Dolendro Singh and K. Manglem Singh, “Image Encryption using Elliptic Curve Cryptography,” Procedia Computer Science, Elsevier, vol. 54, pp. 472 – 481, 2015.