R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.

W. Diffie and M. Hellman, New directions in cryptography, IEEE transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.

O. Regev, On lattices, learning with errors, random linear codes, and cryptography, Journal of the ACM (JACM), vol.56, issue.6, p.34, 2009.

C. Peikert and B. Waters, Lossy trapdoor functions and their applications, SIAM Journal on Computing, vol.40, issue.6, pp.1803-1844, 2011.

V. Lyubashevsky, C. Peikert, and O. Regev, On ideal lattices and learning with errors over rings, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.1-23, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00921792

Z. Brakerski, C. Gentry, and V. Vaikuntanathan, Leveled) fully homomorphic encryption without bootstrapping, ACM Transactions on Computation Theory (TOCT), vol.6, issue.3, p.13, 2014.

C. Peikert, Lattice cryptography for the internet, International Workshop on Post-Quantum Cryptography, pp.197-219, 2014.

E. Alkim, L. Ducas, T. Pöppelmann, and P. Schwabe, Post-quantum key exchange-a new hope, USENIX Security Symposium, vol.2016, 2016.

E. Alkim, L. Ducas, T. Pöppelmann, and P. Schwabe, NewHope without reconciliation, IACR Cryptology ePrint Archive, vol.2016, p.1157, 2016.

J. H. Conway and N. J. Sloane, Sphere packings, lattices and groups, vol.290, 2013.

D. Micciancio and A. Nicolosi, Efficient bounded distance decoders for Barnes-Wall lattices, 2008 IEEE International Symposium on Information Theory, pp.2484-2488, 2008.

E. Fujisaki and T. Okamoto, Secure integration of asymmetric and symmetric encryption schemes, Annual International Cryptology Conference, pp.537-554, 1999.

J. D'anvers, Q. Guo, T. Johansson, A. Nilsson, F. Vercauteren et al., Decryption failure attacks on IND-CCA secure lattice-based schemes, IACR International Workshop on Public Key Cryptography, pp.565-598, 2019.

F. Oggier and J. Belfiore, Enabling multiplication in lattice codes via construction A, IEEE Information Theory Workshop, 2013.
URL : https://hal.archives-ouvertes.fr/hal-02412347

D. Hsu, S. Kakade, and T. Zhang, A tail inequality for quadratic forms of subgaussian random vectors, Electronic Communications in Probability, vol.17, 2012.

V. Lyubashevsky, C. Peikert, and O. Regev, A toolkit for ring-LWE cryptography, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.35-54, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00864284

R. Zamir, Lattice Coding for Signals and Networks: A Structured Coding Approach to Quantization, Modulation, and Multiuser Information Theory, 2014.