1. Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., Heninger, N., Springall, D., Thomé, E., Valenta, L., VanderSloot, B., Wustrow, E., Zanella-Béguelin, S., Zimmermann, P.: Imperfect forward secrecy: how diffie-hellman fails in practice. In: Association for Computing Machinery, pp. 5–17 (2015)
2. U. S. National Security Agency. Commercial National Security Algorithm Suite and Quantum Computing Faq. https://cryptome.org/2016/01/CNSA-Suite-and-Quantum-Computing-FAQ.pdf (2016)
3. Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Kelsey, J., Liu, Y., Miller, C., Moody, D., Peralta, R., Perlner, R., Robinson, A., Smith-Tonel, D.: Status Report on the Second Round of the Nist Post-Quantum Cryptography Standardization Process. https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8309.pdf (2020)
4. Bently, J.L., Haken, D., Saxe, J.B.: A general method for solving divide-and-conquer recurrences. ACM SIGACT News 12(3), 36–44 (1980)
5. Bernstein, D.J., Chuengsatiansup, C., Lange, T., van Vredendaal, C.: Ntru Prime. NIST Post-Quantum Cryptography Standardization Process-Round-1. https://ntruprime.cr.yp.to/nist/ntruprime-20171130.pdf (2017)