Wolfram Language
Paclet Repository
Community-contributed installable additions to the Wolfram Language
Primary Navigation
Categories
Cloud & Deployment
Core Language & Structure
Data Manipulation & Analysis
Engineering Data & Computation
External Interfaces & Connections
Financial Data & Computation
Geographic Data & Computation
Geometry
Graphs & Networks
Higher Mathematical Computation
Images
Knowledge Representation & Natural Language
Machine Learning
Notebook Documents & Presentation
Scientific and Medical Data & Computation
Social, Cultural & Linguistic Data
Strings & Text
Symbolic & Numeric Computation
System Operation & Setup
Time-Related Computation
User Interface Construction
Visualization & Graphics
Random Paclet
Alphabetical List
Using Paclets
Create a Paclet
Get Started
Download Definition Notebook
Learn More about
Wolfram Language
Kyber
Symbols
KyberDecapsulate
KyberEncapsulate
KyberKeyGen
ToneAr`Kyber`
K
y
b
e
r
D
e
c
a
p
s
u
l
a
t
e
K
y
b
e
r
D
e
c
a
p
s
u
l
a
t
e
[
c
i
p
h
e
r
T
e
x
t
,
p
r
i
v
a
t
e
K
e
y
]
r
e
c
o
v
e
r
s
t
h
e
s
h
a
r
e
d
s
e
c
r
e
t
f
r
o
m
c
i
p
h
e
r
T
e
x
t
u
s
i
n
g
t
h
e
r
e
c
i
p
i
e
n
t
’
s
p
r
i
v
a
t
e
K
e
y
.
D
e
t
a
i
l
s
a
n
d
O
p
t
i
o
n
s
Examples
(
3
)
Basic Examples
(
1
)
Generate a key pair, encapsulate a shared secret, then decapsulate it:
I
n
[
1
]
:
=
k
e
y
s
=
K
y
b
e
r
K
e
y
G
e
n
[
7
6
8
]
O
u
t
[
1
]
=
P
u
b
l
i
c
K
e
y
P
u
b
l
i
c
K
e
y
T
y
p
e
:
M
L
-
K
E
M
P
a
r
a
m
e
t
e
r
s
e
t
:
7
6
8
P
u
b
l
i
c
k
e
y
s
i
z
e
:
9
4
7
2
b
,
P
r
i
v
a
t
e
K
e
y
P
r
i
v
a
t
e
K
e
y
T
y
p
e
:
M
L
-
K
E
M
P
a
r
a
m
e
t
e
r
s
e
t
:
7
6
8
P
r
i
v
a
t
e
k
e
y
s
i
z
e
:
1
9
2
0
0
b
I
n
[
2
]
:
=
e
n
c
a
p
=
K
y
b
e
r
E
n
c
a
p
s
u
l
a
t
e
[
k
e
y
s
[
"
P
u
b
l
i
c
K
e
y
"
]
]
O
u
t
[
2
]
=
E
n
c
a
p
s
u
l
a
t
e
d
K
e
y
E
n
c
a
p
s
u
l
a
t
e
d
K
e
y
T
y
p
e
:
M
L
-
K
E
M
P
a
r
a
m
e
t
e
r
s
e
t
:
7
6
8
C
i
p
h
e
r
t
e
x
t
s
i
z
e
:
8
7
0
4
b
,
S
h
a
r
e
d
S
e
c
r
e
t
S
y
m
m
e
t
r
i
c
K
e
y
C
i
p
h
e
r
:
A
E
S
2
5
6
K
e
y
s
i
z
e
:
2
5
6
b
Recover the shared secret using the private key:
I
n
[
3
]
:
=
d
e
c
a
p
=
K
y
b
e
r
D
e
c
a
p
s
u
l
a
t
e
[
e
n
c
a
p
[
"
E
n
c
a
p
s
u
l
a
t
e
d
K
e
y
"
]
,
k
e
y
s
[
"
P
r
i
v
a
t
e
K
e
y
"
]
]
O
u
t
[
3
]
=
S
y
m
m
e
t
r
i
c
K
e
y
C
i
p
h
e
r
:
A
E
S
2
5
6
K
e
y
s
i
z
e
:
2
5
6
b
Verify the shared secrets are identical:
I
n
[
4
]
:
=
e
n
c
a
p
[
"
S
h
a
r
e
d
S
e
c
r
e
t
"
]
=
=
=
d
e
c
a
p
O
u
t
[
4
]
=
T
r
u
e
S
c
o
p
e
(
1
)
P
r
o
p
e
r
t
i
e
s
&
R
e
l
a
t
i
o
n
s
(
1
)
S
e
e
A
l
s
o
K
y
b
e
r
K
e
y
G
e
n
▪
K
y
b
e
r
E
n
c
a
p
s
u
l
a
t
e
▪
D
e
c
r
y
p
t
R
e
l
a
t
e
d
L
i
n
k
s
▪
N
I
S
T
P
o
s
t
-
Q
u
a
n
t
u
m
C
r
y
p
t
o
g
r
a
p
h
y
"
"