[1]
I. Gorbenko, O. Kachko, and M. Yesina, “Analysis of the end-to-end encryption algorithm NTRU PRIME IIT UKRAINE taking into account known attacks”, RT, vol. 4, no. 191, pp. 11–23, Dec. 2017.