1 \section{Related publications}
4 Ecrypt II (\cite{ii2011ecrypt}), ENISA's report on Algorithms, key sizes and
5 parameters (\cite{ENISA2013}) and BSI's Technische Richtlinie TR-02102 (\cite{TR02102}) are
6 great publications which are more in depth than this guide. However, this guide
7 has a different approach: it focuses on \emph{copy \& paste-able settings} for
8 system administrators, effectively breaking down the complexity in the above
9 mentioned reports to an easy to use format for the intended target audience.