1. Ajtai, M.: Generating hard instances of lattice problems. In: Proceedings of the 28th ACM Symposium on the Theory of Computing (STOC). Philadelphia, Pennsylvania, USA: Association for Computing Machinery, pp. 99–108 (1996). ISBN: 0897917855. https://doi.org/10.1145/237814.237838
2. Alagic, G., et al.: Status report on the third round of the NIST postquantum cryptography standardization process. In: US Department of Commerce, NIST (2022). https://doi.org/10.6028/NIST.IR.8413-upd1
3. Lecture Notes in Computer Science;MR Albrecht,2017
4. Alkim, Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange—a new hope. In: 25th USENIX Security Symposium (USENIX Security 16). Austin, TX: USENIX Association, pp. 327–343 (2016). ISBN: 978-1-931971-32-4
5. Bai, S., et al.: CRYSTALSDilithium: algorithm specifications and supporting documentation (Version 3.1). Current: https://pq-crystals.org/dilithium/resources.shtml; Stable: https://doi.org/10.13154/tches.v2018.i1.238-268 (2021)