1. — (no editor), IEEE international conference on communications, ICC 2017, IEEE, 2017. See [38]
2. Gorjan Alagic, Daniel Apon, David Cooper, Quynh Dang, Thinh Dang, John Kelsey, Jacob Lichtinger, Carl Miller, Dustin Moody, Rene Peralta, Ray Perlner, Angela Robinson, Daniel Smith-Tone, Yi-Kai Liu, Status report on the third round of the NIST Post-Quantum Cryptography Standardization Process (2022). NISTIR 8413. Cited in §1.1, §3.14, §3.14, §4.2
3. Roberto Avanzi, Joppe Bos, Léo Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehlé, CRYSTALS-Kyber: Algorithm specifications and supporting documentation (2020). Cited in §3.14
4. Ciprian Baetu, F. Betül Durak, Loïs Huguenin-Dumittan, Abdullah Talayhan, Serge Vaudenay, Misuse attacks on post-quantum cryptosystems, in Eurocrypt 2019 [61] (2019), 747–776. Cited in §3.7
5. Mihir Bellare (editor), Advances in cryptology—CRYPTO 2000, LNCS, 1880, Springer, 2000. See [62]