1. E. Alkim, J. W. Bos, et al., \begin{document}$ {\sf FrodoKEM}$\end{document}
: Learning With Errors Key Encapsulation Algorithm Specifications and Supporting Documentation, https://frodokem.org/files/FrodoKEM-specification-20210604.pdf, 2021, Accessed on April 28, 2022.
2. E. Alkim, L. Ducas, T. Pöppelmann and P. Schwabe, Post-quantum key exchange – a new hope, Cryptology ePrint Archive, (2015), https://ia.cr/2015/1092.
3. R. Avanzi, J. Bos, L. Ducas, et al., CRYSTALS-Kyber (version 3.02) – submission to round 3 of the NIST post-quantum project, specification document (update from august 2021), 2021-08-04, https://csrc.nist.gov/CSRC/media/Projects/post-quantum-cryptography/documents/round-3/submissions/Kyber-Round3.zip, accessed on September 19, 2022.
4. W. Banaszczyk.New bounds in some transference theorems in the geometry of numbers, Math. Ann., 296 (1993), 625-635.
5. M. Bellare.Practice-oriented provable-security, International Workshop on Information Security, 1396 (1997), 221-231.