1. Avanzi, R., et al.: CRYSTALS-Kyber (2019). https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-2-Submissions
2. Albrecht, M.R., Hanser, C., Hoeller, A., Pöppelmann, T., Virdia, F., Wallner, A.: Implementing RLWE-based schemes using an RSA Co-processor. IACR Trans. Cryptogr. Hardware Embed. Syst. 169–208 (2019)
3. BSI. Migration zu Post-Quanten-Kryptografie - Handlungsempfehlungen des BSI
4. Chowdhury, S., Covic, A., Acharya, R.Y., Dupee, S., Ganji, F., Forte, D.: Physical security in the post-quantum era: a survey on side-channel analysis, random number generators, and physically unclonable functions. arXiv preprint arXiv:2005.04344, 2020. https://arxiv.org/abs/2005.04344
5. Chung, C.-M.M., Hwang, V., Kannwischer, M.J., Seiler, G., Shih, C.J., Yang, B.Y.: NTT multiplication for NTT-unfriendly rings. Cryptology ePrint Archive, Report 2020/1397 (2020). https://eprint.iacr.org/2020/1397