1. M. Ajtai, Generating hard instances of lattice problems (extended abstract), in STOC (ACM, 1996), pp. 99–108
2. B. Bünz, J. Bootle, D. Boneh, A. Poelstra, P. Wuille, G. Maxwell, Bulletproofs: Short proofs for confidential transactions and more, in IEEE S&P 2018, pp. 315–334 (2018)
3. V. Buterin, Understanding serenity, part i: Abstraction, 2015. https://blog.ethereum.org/2015/12/24/understanding-serenity-part-i-abstraction/, accessed on Mar 2, 2021
4. M. F. Esgin, Practice-Oriented Techniques in Lattice-Based Cryptography. PhD thesis, Monash University, 5 2020. https://bridges.monash.edu/articles/Practice-Oriented_Techniques_in_Lattice-Based_Cryptography/12279728
5. M. F. Esgin, N. K. Nguyen, G. Seiler, Practical exact proofs from lattices: New techniques to exploit fully-splitting rings, in ASIACRYPT (2), vol. 12492 of Lecture Notes in Computer Science (Springer, 2020), pp. 259–288