1. NIST. Call for Additional Digital Signature Schemes for the Post-Quantum Cryptography Standardization Process
2. Aulbach, T., Campos, F., Krämer, J., Samardjiska, S., Stöttinger, M.: Separating oil and vinegar with a single trace side-channel assisted Kipnis-Shamir attack on UOV. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3), 221–245 (2023)
3. Bettale, L., Faugère, J.-C., Perret, L.: Hybrid approach for solving multivariate systems over finite fields. J. Math. Cryptol. 3(3), 177–197 (2009)
4. Bettale, L., Faugere, J.C., Perret, L.: Solving polynomial systems over finite fields: improved analysis of the hybrid approach. In: van der Hoeven, J., van Hoeij, M (eds.), International Symposium on Symbolic and Algebraic Computation, ISSAC’12, Grenoble, France - 22–25 July 2012, pp. 67–74. ACM (2012)
5. Lecture Notes in Computer Science;W Beullens,2021