Fig. 1From: An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use caseEncryption algorithm in LT schemeBack to article page