Return to Article Details Analysis of the end-to-end encryption algorithm NTRU PRIME IIT UKRAINE taking into account known attacks Download Download PDF