References
- Daniel J. Bernstein, Johannes Buchmann, and Erik Dahmen. Post-Quantum Cryptography. Springer Science & Business Media. 2009.
- Jeffrey Hoffstein, Jill Pipher, and J.H. Silverman. An Introduction to Mathematical Cryptography (1st. ed.). Springer Publishing Company, Incorporated. 2008.
- PQShield, Quantum Computing Threat: An Overview of Post-Quantum Cryptography, https://pqshield.com/wp-content/uploads/2021/02/PQShield-Quantum-Threat-3-An-Overview-of-Post-Quantum-Cryptography-August-2022.pdf
- NIST, Post-Quantum Cryptography, https://csrc.nist.gov/Projects/post-quantum-cryptography.
- Peter W. Shor, Algorithms for quantum computation: discrete logarithms and factoring, Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994, pp. 124-134.
Links
- What is lattice-based cryptography? https://thelatticeclub.com/
- Post-quantum board game: https://cyber.ee/resources/stories/what-about-a-post-quantum-board-game/