1. 2022. Announcing the Commercial National Security Algorithm Suite 2.0 . National Security Agency, U.S Department of Defense (Sep 2022 ). https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF. 2022. Announcing the Commercial National Security Algorithm Suite 2.0. National Security Agency, U.S Department of Defense (Sep 2022). https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF.
2. D. Amiet , A. Curiger , L. Leuenberger , and P. Zbinden . 2020. Defeating NewHope with a single trace . In Int. Conference on Post-Quantum Cryptography. Springer, 189–205 . https://doi.org/10.1109/ICDSP. 2018 .8631824 10.1109/ICDSP.2018.8631824 D. Amiet, A. Curiger, L. Leuenberger, and P. Zbinden. 2020. Defeating NewHope with a single trace. In Int. Conference on Post-Quantum Cryptography. Springer, 189–205. https://doi.org/10.1109/ICDSP.2018.8631824
3. Roberto Avanzi Joppe Bos Eike Kilt Léo Ducas Tancrède Lepoint Vadim Lyubashevsky John M. Schanck Peter Schwabe Gregor Seiler and Damien Stehlé. 2020. CRYSTALS-Kyber algorithm specifications and supporting documentation. https://csrc.nist.gov/projects/postquantum-cryptography/round-3-submissions. Roberto Avanzi Joppe Bos Eike Kilt Léo Ducas Tancrède Lepoint Vadim Lyubashevsky John M. Schanck Peter Schwabe Gregor Seiler and Damien Stehlé. 2020. CRYSTALS-Kyber algorithm specifications and supporting documentation. https://csrc.nist.gov/projects/postquantum-cryptography/round-3-submissions.
4. Melissa Azouaoui Yulia Kuzovkova Tobias Schneider and Christine van Vredendaal. 2022. Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks. Cryptology ePrint Archive Paper 2022/916. https://eprint.iacr.org/2022/916. Melissa Azouaoui Yulia Kuzovkova Tobias Schneider and Christine van Vredendaal. 2022. Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks. Cryptology ePrint Archive Paper 2022/916. https://eprint.iacr.org/2022/916.
5. Linus Backlund Kalle Ngo Joel Gartner and Elena Dubrova. 2022. Secret Key Recovery Attacks on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber. Cryptology ePrint Archive Paper 2022/1692. https://eprint.iacr.org/2022/1692. Linus Backlund Kalle Ngo Joel Gartner and Elena Dubrova. 2022. Secret Key Recovery Attacks on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber. Cryptology ePrint Archive Paper 2022/1692. https://eprint.iacr.org/2022/1692.