1. Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange—a new hope. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 327–343. USENIX Association, Austin, August 2016. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/alkim
2. Askeland, A., Rønjom, S.: A side-channel assisted attack on NTRU. IACR Cryptol. ePrint Arch., p. 790 (2021). https://eprint.iacr.org/2021/790
3. Bos, J., et al.: CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy, pp. 353–367. IEEE (2018). https://doi.org/10.1109/EuroSP.2018.00032
4. Lecture Notes in Computer Science;J Cao,2021
5. Lecture Notes in Computer Science;A Chailloux,2021