1. Alagic, G., et al.: Status report on the third round of the NIST post-quantum cryptography standardization process. Interagency or internal report, National Institute of Standards and Technology (2022). https://doi.org/10.6028/NIST.IR.8413-upd1. https://csrc.nist.gov/publications/detail/nistir/8413/final
2. Alioto, M., Bongiovanni, S., Djukanovic, M., Scotti, G., Trifiletti, A.: Effectiveness of leakage power analysis attacks on DPA-resistant logic styles under process variations. IEEE Trans. Circ. Syst. I Regul. Pap. 61(2), 429–442 (2014). https://doi.org/10.1109/TCSI.2013.2278350
3. Avanzi, R., et al.: CRYSTALS-Kyber: algorithm specifications and supporting documentation (version 3.02). NIST PQC Project, 3rd Round Submission Update (2021). https://pq-crystals.org/kyber/data/kyber-specification-round3-20210804.pdf
4. Azouaoui, M., et al.: Leveling Dilithium against leakage: revisited sensitivity analysis and improved implementations. Cryptology ePrint Archive, Paper 2022/1406 (2022). https://eprint.iacr.org/2022/1406. Fourth PQC Standardization Conference, NIST (Virtual) 29 November–1 December 2022
5. Bai, S., et al.: CRYSTALS-Dilithium: algorithm specifications and supporting documentation (version 3.1). NIST PQC Project, 3rd Round Submission Update (2021). https://pq-crystals.org/dilithium/data/dilithium-specification-round3-20210208.pdf