1.
Gorbenko I, Kachko O, Yesina M. Analysis of the end-to-end encryption algorithm NTRU PRIME IIT UKRAINE taking into account known attacks. RT [Internet]. 2017Dec.22 [cited 2024Apr.27];4(191):11-23. Available from: http://rt.nure.ua/article/view/176834