Return to Article Details Security analysis of promising key encapsulation mechanisms in the core-SVP model Download Download PDF