REFERENCES
- Alagic, G., D. Apon, D. Cooper, Q. Dang, T. Dang, J. Kelsey, J. Lichtinger, C. Miller, D. Moody, R. Peralta, R. Perlner, A. Robinson, D. Smith-Tone, and Y. Liu. 2022. Status report on the third round of the NIST post-quantum cryptography standardization process. Technical Report NIST IR 8413-upd1, National Institute of Standards and Technology.
- Avanzi, R., J. Bos, L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, J. M. Schanck, P. Schwabe, G. Seiler, and D. Stehlé. (2021, August 4). Algorithm specifications and supporting documentation. Technical Report (Version 3.02), National Institute of Standards and Technology.
- Chen, L., S. Jordan, Y. Liu, D. Moody, R. Peralta, R. Perlner, and D. Smith-Tone. 2016. Report on post-quantum cryptography. Technical Report NIST IR 8105, National Institute of Standards and Technology.
- Cohen, H. 1993. A Course in Computational Algebraic Number Theory. Graduate Texts in Mathematics, Vol. 138. Berlin, Heidelberg: Springer.
- Daemen, J. and V. Rijmen. (1999, September 3). AES proposal: Rijndael, document version 2, AES proposals. National Institute of Standards and Technology.
- Ducas, L. and J. Schanck. (2021, January 21). security-estimates/Kyber.py at master · pq-crystals/security-estimates. https://github.com/pq-crystals/security-estimates/blob/master/Kyber.py.
- Dummit, D. S. and R. M. Foote. 2004. Abstract Algebra. Hoboken, NJ: Wiley.
- Gentry, C., C. Peikert, and V. Vaikuntanathan. 2008. Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 197–206. https://doi.org/10.1145/1374376.1374407.
- Hoffstein, J., J. Pipher, and J. H. Silverman. 2014. An Introduction to Mathematical Cryptography, Second Edition. Undergraduate Texts in Mathematics. New York, NY: Springer.
- Holden, J. 2004. A comparison of cryptography courses. Cryptologia. 28(2): 97–111. https://doi.org/10.1080/0161110491892809.
- Holden, J. 2013. Demitasse: A “small” version of the tiny encryption algorithm and its use in a classroom setting. Cryptologia. 37(1): 74–83. https://doi.org/10.1080/01611194.2012.660237.
- Holden, J. 2013. A good hash function is hard to find, and vice versa. Cryptologia. 37: 107–119.
- Holden, J. (2022, September 5). security-estimates/Kyber.py at master · joshuarbholden/security-estimates. https://github.com/joshuarbholden/security-estimates/blob/master/Kyber.py.
- Holden, J. (2023, January 1). joshuarbholden/alkaline: Alkaline is a toy version of Kyber for classroom use. https://github.com/joshuarbholden/alkaline.
- Internet Meme Database. (2009, August 26). Aretha's hat. https://knowyourmeme.com/memes/arethas-hat.
- Internet Meme Database. (2021, January 20). Bernie sanders wearing mittens sitting in a chair. https://knowyourmeme.com/memes/bernie-sanders-wearing-mittens-sitting-in-a-chair.
- Lyubashevsky, V., C. Peikert, and O. Regev. 2010. On ideal lattices and learning with errors over rings. In Advances in Cryptology – EUROCRYPT 2010, pp. 1–23. https://doi.org/10.1007/978-3-642-13190-51.
- Musa, M. A., E. F. Schaefer, and S. Wedig. 2003. A simplified AES algorithm and its linear and differential cryptanalyses. Cryptologia. 27(2): 148–177. https://doi.org/10.1080/0161-110391891838.
- Regev, O. 2005. On lattices, learning with errors, random linear codes, and cryptography. In Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing, pp. 84–93. https://doi.org/10.1145/1060590.1060603.
- The Sage Developers. 2021. Sagemath, the Sage Mathematics Software System (Version 9.3). https://www.sagemath.org.
- Schaefer, E. F. 1996. A simplified data encryption standard algorithm. Cryptologia. 20(1): 77–84. https://doi.org/10.1080/0161-119691884799.
- Stinson, D. R. and M. Paterson. 2018. Cryptography: Theory and Practice, Fourth Edition. Boca Raton, FL: Chapman and Hall/CRC.