1. Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In Reingold, O., ed.: TCC 2009. Volume 5444 of LNCS., Springer, Heidelberg (March 2009) 474–495
2. Albrecht, M.R., Deo, A., Paterson, K.G.: Cold Boot Attacks on Ring and Module LWE Keys Under the NTT. IACR Transactions on Cryptographic Hardware and Embedded Systems (2018) 173–213
3. Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange—a new hope. Cryptology ePrint Archive, Report 2015/1092 (2015) https://eprint.iacr.org/2015/1092.
4. Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange—a new hope. In Holz, T., Savage, S., eds.: USENIX Security 2016, USENIX Association (August 2016) 327–343
5. Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange—a new hope. Cryptology ePrint Archive, Report 2015/1092 (2015) https://eprint.iacr.org/2015/1092.