1. Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange—a new hope. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 327–343. USENIX Association, Austin (2016)
2. Azarderakhsh, R., Jao, D., Kalach, K., Koziel, B., Leonardi, C.: Key compression for isogeny-based cryptosystems. In: Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC 2016, pp. 1–10. ACM (2016)
3. Bernstein, D.J., Heninger, N., Lou, P., Valenta, L.: Post-quantum RSA. Cryptology ePrint Archive, Report 2017/351 (2017), http://eprint.iacr.org/2017/351
4. Biron, D., Biham, O., Biham, E., Grassl, M., Lidar, D.A.: Generalized grover search algorithm for arbitrary initial amplitude distribution. In: 1st NASA Conference on Quantum Computing and Quantum Communications (1998)
5. Bos, J., Costello, C., Ducas, L., Mironov, I., Naehrig, M., Nikolaenko, V., Raghunathan, A., Stebila, D.: Frodo: take off the ring! practical, quantum-secure key exchange from LWE. In: Proceedings of 23rd ACM Conference on Computer and Communications Security (CCS 2016). ACM, October 2016