1. Aldaya, A.C., Brumley, B.B., ul Hassan, S., García, C.P., Tuveri, N.: Port contention for fun and profit. Cryptology ePrint Archive, Report 2018/1060 (2018). https://ia.cr/2018/1060
2. Alkim, E., Bos, J.W., Ducas, L., Longa, P., Mironov, I., Naehrig, M., Nikolaenko, V., Peikert, C., Stebila, D., Raghunathan, A. et al.: Frodokem learning with errors key encapsulation (2020)
3. Badampudi, D., Wohlin, C., Petersen, K.: Experiences from using snowballing and database searches in systematic literature studies. In: Proceedings of the 19th International Conference on Evaluation and Assessment in Software Engineering, EASE ’15, New York, NY, USA. Association for Computing Machinery (2015)
4. Ball, P.: First quantum computer to pack 100 qubits enters crowded race (2021). https://www.nature.com/articles/d41586-021-03476-5
5. Barker, E., Chen, L., Davis, R.: Recommendation for key-derivation methods in key-establishment schemes (draft). NIST Spec. Publ. 800, 56C (2020)