7

Selected constructive and destructive approaches to post-quantum cryptography