A. C. Atici, L. Batina, J. Fan, I. Verbauwhede, and S. B. Örs, Low-cost implementations of NTRU for pervasive security, 19th IEEE International Conference on Application-Specific Systems, Architectures and Processors, pp.79-84, 2008.

D. V. Bailey, D. Coffin, A. Elbirt, J. H. Silverman, and A. D. Woodbury, NTRU in Constrained Devices, pp.262-272, 2001.

D. V. Bailey, D. Coffin, A. J. Elbirt, J. H. Silverman, and A. D. Woodbury, NTRU in constrained devices, Cryptographic Hardware and Embedded Systems -CHES 2001, Third International Workshop, pp.262-272, 2001.

K. Braun, T. Fritzmann, G. Maringer, T. Schamberger, and J. Sepúlveda, Secure and compact full ntru hardware implementation, 2018 IFIP/IEEE International Conference on Very Large Scale Integration, pp.89-94, 2018.

C. Marie and O. , Master's thesis, Worcester Polytechnic Institute, 2002.

O. M. Guillen, T. Pöppelmann, J. M. Mera, E. F. Bongenaar, G. Sigl et al., Towards post-quantum security for IoT endpoints with NTRU, Design, Automation Test in Europe Conference Exhibition, pp.698-703, 2017.

J. Hoffstein, J. Pipher, J. M. Schanck, J. H. Silverman, W. Whyte et al., Choosing parameters for NTRUEncrypt, vol.708, 2015.

N. Howgrave-graham, P. Q. Nguyen, D. Pointcheval, J. Proos, J. H. Silverman et al., The impact of decryption failures on the security of NTRU encryption, Annual International Cryptology Conference, pp.226-246, 2003.

N. Howgrave-graham, J. H. Silverman, A. Singer, and W. Whyte, NAEP: Provable security in the presence of decryption failures. IACR Cryptology ePrint Archive, vol.172, 2003.

F. Hu, K. Wilhelm, M. Schab, M. Lukowiak, S. Radziszowski et al., Ntrubased sensor network security: a low-power hardware implementation perspective, Security and Communication Networks, vol.2, issue.1, pp.71-81, 2009.

, Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices, IEEE Std 1363.1-2008 pp, pp.1-69, 2009.

D. W. Jones, Modulus without division, a tutorial, 2001.

A. A. Kamal and A. M. Youssef, An FPGA implementation of the NTRUEncrypt cryptosystem, Microelectronics (ICM), 2009 International Conference on, pp.209-212, 2009.

M. K. Lee, J. W. Kim, J. E. Song, and K. Park, Sliding window method for NTRU, ACNS, pp.432-442, 2007.

B. Liu and H. Wu, Efficient architecture and implementation for NTRUEncrypt system, IEEE 58th International Midwest Symposium on, pp.1-4, 2015.

B. Liu and H. Wu, Efficient multiplication architecture over truncated polynomial ring for NTRUEncrypt system, IEEE International Symposium on Circuits and Systems, pp.1174-1177, 2016.

L. K. and G. , A fast quantum mechanical algorithm for database search, 28th Annual ACM Symposium on the Theory of Computing, p.212, 1996.

M. Monteverde, NTRU Software Implementation for Constrained Devices. Master's thesis, 2008.

, Announcing request for nominations for public-key post-quantum cryptographic algorithms, 2016.

A. De-la-piedra, SHA-256 Core, 2013.

J. Sepulveda, A. Zankl, and O. Mischke, Cache attacks and countermeasures for ntruencrypt on mpsocs: Post-quantum resistance for the iot, 30th IEEE International System-on-Chip Conference (SOCC), pp.120-125, 2017.

J. Sepulveda, S. Liu, and J. M. Mera, Post-quantum enabled cyber physical systems, IEEE Embedded Systems Letters. pp, pp.1-4, 2019.

P. W. Shor, Algorithms for quantum computation: Discrete logarithms and factoring, Proceedings., 35th Annual Symposium on, pp.124-134, 1994.

W. Whyte, , 2017.

X. Zhan, R. Zhang, Z. Xiong, Z. Zheng, and Z. Liu, Efficient Implementations of NTRU in Wireless Network, Communications and Network, vol.5, issue.03, p.485, 2013.