1. Williams, H.C. Use of Elliptic Curves in Cryptography. Proceedings of the Advances in Cryptology—CRYPTO’85 Proceedings.
2. A method for obtaining digital signatures and public-key cryptosystems;Rivest;Commun. ACM,1978
3. High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware;Basso;IACR Trans. Cryptogr. Hardw. Embed. Syst.,2020
4. Imran, M., Almeida, F., Raik, J., Basso, A., Roy, S.S., and Pagliarini, S. (2021, January 19). Design Space Exploration of SABER in 65 nm ASIC. Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, Virtual Event.
5. NIST (2022, August 11). PQC Standardization Process: Announcing Four Candidates to be Standardized, Plus Fourth Round Candidates, Available online: https://csrc.nist.gov/News/2022/pqc-candidates-to-be-standardized-and-round-4.