1. Abdullah, G. M., Mehmood, Q., & Khan, C. B. A. (2018, March). Adoption of Lamport signature scheme to implement digital signatures in IoT. In 2018 International conference on computing, mathematics and engineering technologies (iCoMET)
2. Bernstein, D. J., Chou, T., Lange, T., von Maurich, I., Misoczki, R., Niederhagen, R., ... & Wang, W. (2017). Classic McEliece: conservative code-based cryptography. NIST submissions.
3. Bos, J. W., Kaihara, M. E., Kleinjung, T., Lenstra, A. K., & Montgomery, P. L., (2012). Solving a 112-bit Prime Elliptic Curve Discrete Logarithm Problem on Game Consoles using Sloppy Reduction. International Journal of Applied Cryptography, 2(3):212–228.
4. Chen, M. S., Hülsing, A., Rijneveld, J., Samardjiska, S., & Schwabe, P. (2017). MQDSS-Submission to the NIST post-quantum cryptography project.
5. Ding, J., & Petzoldt, A. (2017). Current state of multivariate cryptography. IEEE Security & Privacy, 15(4), 28-36.