The choice of algorithms is also based on the idea of complementing algorithms on alternative mathematical problems, presumably unbearable for quantum computers:
• search for the shortest vector in the lattice,
• decoding of full linear codes,
• search for the second inverse image / collision / inversion of the hash function.
This approach provides an additional level of security for information systems.
We use a combination of algorithms based on different mathematical paradigms (SPHINCS\XMSS based on hash-based and NewHope based on ring-learning with errors) which gives our solutions an additional level of security.