1. Ajtai, M. (1996, July). Generating hard instances of lattice problems. In Proceedings of the twenty-eighth annual ACM symposium on Theory of computing (pp. 99-108). ACM. https://dl.acm.org/doi/pdf/10.1145/237814.237838
2. Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Kelsey, J., & Smith-Tone, D. (2020). Status report on the second round of the NIST post-quantum cryptography standardization process. US Department of Commerce, NIST, 2. https://rnbee.kiev.ua/goto/https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8309.pdf
3. Ardehali, M., Chau, H. F., & Lo, H. K. (1998). Efficient quantum key distribution. arXiv preprintquant-ph/9803007. https://link.springer.com/article/10.1007/s00145-004-0142-y
4. Avanzi, R., Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., & Stehlé, D. (2017). Crystals-kyber. NIST, Tech. Rep. https://csrc.nist.gov/csrc/media/Presentations/2022/crystals-kyber-update/images-media/session-1-schwabe-crystals-kyber-pqc2022.pdf
5. Avanzi, R., Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., & Stehlé, D. (2019). CRYSTALS-Kyber algorithm specifications and supporting documentation. NIST PQC Round, 2(4), 1-43. https://pq-crystals.org/kyber/data/kyber-specification-round3-20210131.pdf