1. Bennett C.H., Brassard G.: Quantum cryptography: public key distribution and coin tossing. In: International Conference on Computers, Systems and Signal Processing, pp. 175–179 (1984).
2. Bernstein E., Vazirani U.: Quantum complexity theory. SIAM J. Comput. 26, 1411–1473 (1997).
3. Boneh D., Zhandry M.: Secure signatures and chosen ciphertext security in a quantum computing world. In: CRYPTO 2013, Part II, pp. 361–379 (2013).
4. Borst J., Knudsen L.R., Rijmen V.: Two attacks on reduced IDEA. In: EUROCRYPT, pp. 1–13 (1997).
5. Damgård I., Funder J., Nielsen J.B., et al.: Superposition attacks on cryptographic protocols. In: International Conference on Information Theoretic Security, 8317, pp. 142–161 (2013).