“…This line of research dates back to the mid eighties with the design of C * [35], later followed by many other proposals, e.g., [44,30,14,41,28,49,50]. While this family of designs is commonly considered to be an interesting alternative to constructions based on number-theoretic problems (in the post-quantum setting), it suffers from a lack of clear security reductions to well-understood problems, leading to a series of attacks, e.g., [29,13,18,24,20,17,19,15].…”