1. Schwabe, P., Stebila, D., Wiggers, T.: Post-quantum TLS without handshake signatures. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS’20). Association for Computing Machinery, New York, NY, USA, pp. 1461–1480 (2020). https://doi.org/10.1145/3372297.3423350
2. Bindel, N., Brendel, J., Fischlin, M., Goncalves, B., Stebila, D.: Hybrid key encapsulation mechanisms and authenticated key exchange. In: Ding, J., Steinwandt, R. (eds.) Post-Quantum Cryptography, pp. 206–226. Springer, Cham (2019)
3. BSI: BSI-Technical Guideline: Cryptographic Mechanisms: Recommendations and Key Lengths. (Retrieved: 20.04.2021). https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-1.pdf?__blob=publicationFile
4. Chen, L., Moody, D., Yi-Kai, L.: Post Quantum Cryptography—FAQ (Retrieved: 23.06.2021). https://csrc.nist.gov/Projects/post-quantum-cryptography/faqs
5. Basso, A., Bermudo Mera, J.M., D’Anvers, J.P.: SABER: Mod-LWR based KEM (Round 3 Submission). https://www.esat.kuleuven.be/cosic/pqcrypto/saber/files/saberspecround3.pdf