post-quantum encryption

Implementation vulnerabilities reported for post-quantum encryption algorithm

Two implementation vulnerabilities have been reported in the Kyber key encapsulation mechanism (KEM), an encryption standard designed to protect networks…