1. Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Kelsey, J., Liu, Y.K., Miller, C., Moody, D., Peralta, R., Perlner, R., Robinson, A., Smith-Tone, D.: Status Report on the second round of the nist post-quantum cryptography standardization process. internal report 8309, National Institute of Standards and Technology (NIST) (2020)
2. Aumasson, J.P., Bernstein, D.J., Beullens, W., Dobraunig, C., Eichlseder, M., Fluhrer, S., Gazdag, S.L., Hülsing, A., Kampanakis, P., Kölbl, S., Lange, T., Lauridsen, M.M., Mendel, F., Niederhagen, R., Rechberger, C., Rijneveld, J., Schwabe, P., Westerbaan, B.: SPHINCS$$^{+}$$. Submission to the 3rd round of the NIST post-quantum cryptography standardization process (2020). https://sphincs.org/data/sphincs+-round3-submission-nist.zip
3. Bernstein, D.J., Hülsing, A., Kölbl, S., Niederhagen, R., Rijneveld, J., Schwabe, P.: The SPHINCS$$^{+}$$ signature framework. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security (2019)
4. Bollinger, R.C., Burchard, C.L.: Lucas’s theorem and some related results for extended pascal triangles. Am. Math. Mon. 97(3), 198–204 (1990)
5. Boneh, D., Shen, E., Waters, B.: Strongly unforgeable signatures based on computational Diffie-Hellman. In: M. Yung, Y. Dodis, A. Kiayias, T. Malkin (eds.) Public Key Cryptography—PKC 2006, Lecture Notes in Computer Science, vol. 3958, pp. 229–240 (2006). https://doi.org/10.1007/11745853_15