1. Albrecht, M.R., Player, R., Scott, S.: On the concrete hardness of learning with errors. IACR Cryptology ePrint Archive report 2015/046 (2015).
https://eprint.iacr.org/2015/046
. 242
2. Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange - a new hope. In: Holz, T., Savage, S. (eds.) Proceedings of the 25th USENIX Security Symposium. USENIX Association (2016).
https://cryptojedi.org/papers/#newhope
. 233, 234, 241, 248
3. Bernstein, D.J., Chuengsatiansup, C., Lange, T., van Vredendaal, C.: NTRU prime. IACR Cryptology ePrint Archive report 2016/461 (2016).
https://eprint.iacr.org/2016/461
. 233, 234, 236, 237, 242, 243, 244, 248
4. Bernstein, D.J., Lange, T.: eBACS: ECRYPT benchmarking of cryptographic systems.
http://bench.cr.yp.to
. 248
5. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak reference (2011).
http://keccak.noekeon.org/
. 236