Micciancio, D., & Goldwasser, S. (2002). Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications. Springer. 10.1007/978-1-4615-0715-9
Micciancio, D., & Goldwasser, S. (2002). Complexity of Lattice Problems: A Cryptographic Perspective. Springer. 10.1007/978-1-4615-0897-7
Ajtai, M. (1996). Generating hard instances of lattice problems. STOC ’96: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, 99–108. 10.1145/237814.237838
Regev, O. (2005). On Lattices, Learning with Errors, Random Linear Codes, and Cryptography. STOC ’05: Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing, 84–93. 10.1145/1060590.1060603
Regev, O. (2010). The Learning with Errors Problem. \\urlhttps://cims.nyu.edu/ regev/papers/lwesurvey.pdf.
Lyubashevsky, V., Peikert, C., & Regev, O. (2010). On Ideal Lattices and Learning with Errors over Rings. In H. Gilbert (Ed.), Advances in Cryptology – EUROCRYPT 2010 (Vol. 6110, pp. 1–23). Springer. 10.1007/978-3-642-13190-5_1
Hoffstein, J., Pipher, J., & Silverman, J. H. (1998). NTRU: A Ring-Based Public Key Cryptosystem. In J. P. Buhler (Ed.), Algorithmic Number Theory, ANTS-III (Vol. 1423, pp. 267–288). Springer. 10.1007/BFb0054868
Alkim, E., Ducas, L., P\\"oppelmann, T., & Schwabe, P. (2015). Post-quantum key exchange - a new hope. Cryptology ePrint Archive, Report 2015/1092. https://eprint.iacr.org/2015/1092
Kyber Team. (2017–Present). CRYSTALS-Kyber: Algorithm Specifications and Supporting Documentation. \\urlhttps://pq-crystals.org/kyber/.
Gentry, C., Peikert, C., & Vaikuntanathan, V. (2008). Trapdoors for Hard Lattices and New Cryptographic Constructions. STOC ’08: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 197–206. 10.1145/1374376.1374407
Falcon Team. (2017–Present). Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU. \\urlhttps://falcon-sign.info/.
Dilithium Team. (2017–Present). CRYSTALS-Dilithium: Algorithm Specifications and Supporting Documentation. \\urlhttps://pq-crystals.org/dilithium/.
Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. STOC ’09: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 169–178. 10.1145/1536414.1536440
Brakerski, Z., & Vaikuntanathan, V. (2011). Fully Homomorphic Encryption without Bootstrapping. Cryptology ePrint Archive, Report 2011/277. https://eprint.iacr.org/2011/277
Brakerski, Z. (2012). (Leveled) fully homomorphic encryption without modulus switching. Cryptology ePrint Archive, Report 2011/344. https://eprint.iacr.org/2011/344