Discussion about open questions in isogeny-based cryptography
Lattice problems and algorithms
Introduction to LWE and Ring-LWE
Introduction to NTRU encryption
Report on "How to not break SIDH"
Introduction to Lattice-Based Cryptography
Peikert's quantum attack on CSIDH, Part 2
Peikert's quantum attack on CSIDH
On the concrete security of the unique Shortest Vector Problem
Pages
