1. Shaizeen Aga , Supreet Jeloka , Arun Subramaniyan , Satish Narayanasamy , David Blaauw , and Reetuparna Das . 2017 . Compute Caches. In 2017 IEEE Intl. Symp. on High Performance Computer Architecture. 481–492 . Shaizeen Aga, Supreet Jeloka, Arun Subramaniyan, Satish Narayanasamy, David Blaauw, and Reetuparna Das. 2017. Compute Caches. In 2017 IEEE Intl. Symp. on High Performance Computer Architecture. 481–492.
2. Gorjan Alagic , Daniel Apon , David Cooper , Quynh Dang , Thinh Dang , John Kelsey , Jacob Lichtinger , Carl Miller , Dustin Moody , Rene Peralta , 2022. Status report on the third round of the NIST post-quantum cryptography standardization process. US Department of Commerce , NIST ( 2022 ). Gorjan Alagic, Daniel Apon, David Cooper, Quynh Dang, Thinh Dang, John Kelsey, Jacob Lichtinger, Carl Miller, Dustin Moody, Rene Peralta, 2022. Status report on the third round of the NIST post-quantum cryptography standardization process. US Department of Commerce, NIST (2022).
3. Nicolas Aragon , Paulo SLM Barreto , Slim Bettaieb , France Worldline , Loïc Bidoux , Olivier Blazy , Philippe Gaborit , Tim Güneysu , Carlos Aguilar Melchor , Rafael Misoczki , 2021. Bike. Round 3 submission to the NIST PQC Project ( 2021 ). Nicolas Aragon, Paulo SLM Barreto, Slim Bettaieb, France Worldline, Loïc Bidoux, Olivier Blazy, Philippe Gaborit, Tim Güneysu, Carlos Aguilar Melchor, Rafael Misoczki, 2021. Bike. Round 3 submission to the NIST PQC Project (2021).
4. Jean-Philippe Aumasson , Willi Meier , Raphael C-W Phan, and Luca Henzen . 2014 . The hash function BLAKE. In Information Security and Cryptography. Springer . Jean-Philippe Aumasson, Willi Meier, Raphael C-W Phan, and Luca Henzen. 2014. The hash function BLAKE. In Information Security and Cryptography. Springer.
5. Georg T Becker , Alexander Wild , and Tim Güneysu . 2015 . Security Analysis of Index-Based Syndrome Coding for PUF-Based Key Generation. In 2015 IEEE Intl. Symp. on Hardware Oriented Security and Trust. 20–25 . Georg T Becker, Alexander Wild, and Tim Güneysu. 2015. Security Analysis of Index-Based Syndrome Coding for PUF-Based Key Generation. In 2015 IEEE Intl. Symp. on Hardware Oriented Security and Trust. 20–25.