1. [n.d.].Information technology - Security techniques - Encryption algo-rithms - Part 2: Asymmetric ciphers. ISO/IEC 18033-2:2006 and ISO/IEC 18033-2:2006/AMD1:2017. https://www.iso.org/standard/37971.html.
2. [n.d.].Post-Quantum Cryptography Standardization.National Instituteof Standards and Technology.https://csrc.nist.gov/Projects/Post-Quantum-Cryptography.
3. Michel Abdalla, MihirBellare, and Phillip Rogaway. 1999. DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem. In Cryptology ePrint Archive, Report 1999/007.
4. Dan Boneh, Darren Glass, Daniel Krashen, Kristin Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, and Mark Zhandry. 2018. Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. In MATHCRYPT2018. https://eprint.iacr.org/2018/665.
5. Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, and Mark Zhandry. 2011. Random Oracles in a Quantum World. In ASIACRYPT 2011. 41--69.