1. Abelson H. and others, “Bugs in our pockets: the risks of client-side scanning” [2021]arXiv:2110.07450 [cs] 2021.
2. Abelson H. and others, “The risks of key recovery, key escrow, and trusted third-party encryption” (1997).
3. The quantum technologies roadmap: a European community view;Acín;New J Phys,2018
4. Andersen L. and Alisson-Hope D., “Human rights impact assessment: meta's expansion of end-to-end encryption” (BSR 2022).
5. Apple, “Apple platform security” (2021).