1. Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, C., Dang, Q., Miller, C., Moody, D., Peralta, R., Perlner, R., Robinson, A., Smith-Tone, D., & Liu, Y.-K. (2018). Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process.
2. Albrecht, M. R., Curtis-Maury, M., Davidson, A., Player, R., & Postlethwaite, E. W. (2019). Estimate All the {LWE, NTRU} Schemes!.
3. BBC News. (2010). Hackers ‘Seized Control’ of US Satellites. https://www.bbc.com/news/technology-11504328
4. Bryce Space and Technology: State of the Satellite Industry Report 2017. Resreport (2017). https://brycetech.com/downloads/SIA_SSIR_2017.pdf
5. Boneh, D. (1999). Twenty Years of Attacks on the RSA Cryptosystem. Notices of the AMS, 46(2), 203–213.