1. Algorithms for Quantum Computation: Discrete Logarithms and Factoring;Shor,1994
2. Post-quantum cryptography standardization;NIST,2017
3. CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM;Bos,2018
4. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems;Kocher,1996
5. Power Analysis on NTRU Prime;Huang;IACR Trans. Cryptogr. Hardw. Embed. Syst.,2020