Fig. 3From: An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use caseEncryption algorithm in our schemeBack to article page