1. ARM mbed TLS.
https://tls.mbed.org/
. Accessed 12 Nov 2018
2. C-Muckle source code.
https://github.com/himsen/muckle
. Accessed 29 Jan 2020
3. Microsoft PQCrypto-SIDH.
https://github.com/Microsoft/PQCrypto-SIDH
. Accessed 12 Nov 2018
4. Albrecht, M.R., et al.: Estimate all the $$\{$$LWE, NTRU$$\}$$ schemes! In: Catalano, D., De Prisco, R. (eds.) SCN 2018. LNCS, vol. 11035, pp. 351–367. Springer, Cham (2018).
https://doi.org/10.1007/978-3-319-98113-0_19
5. Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange - a new hope. In: Holz, T., Savage, S. (eds.) 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, 10–12 August 2016, pp. 327–343. USENIX Association (2016)