const crypto/internal/mlkem768.k

22 uses

	crypto/internal/mlkem768 (current package)
		mlkem768.go#L48: 	k  = 3
		mlkem768.go#L61: 	decryptionKeySize = k * encodingSize12
		mlkem768.go#L62: 	encryptionKeySize = k*encodingSize12 + 32
		mlkem768.go#L64: 	CiphertextSize       = k*encodingSize10 + encodingSize4
		mlkem768.go#L97: 	t [k]nttElement     // ByteDecode₁₂(ek[:384k])
		mlkem768.go#L98: 	A [k * k]nttElement // A[i*k+j] = sampleNTT(ρ, j, i)
		mlkem768.go#L103: 	s [k]nttElement // ByteDecode₁₂(dk[:decryptionKeySize])
		mlkem768.go#L188: 	for i := byte(0); i < k; i++ {
		mlkem768.go#L189: 		for j := byte(0); j < k; j++ {
		mlkem768.go#L193: 			A[i*k+j] = sampleNTT(ρ, j, i)
		mlkem768.go#L203: 	e := make([]nttElement, k)
		mlkem768.go#L213: 			t[i] = polyAdd(t[i], nttMul(A[i*k+j], s[j]))
		mlkem768.go#L308: 	for i := byte(0); i < k; i++ {
		mlkem768.go#L309: 		for j := byte(0); j < k; j++ {
		mlkem768.go#L312: 			ex.A[i*k+j] = sampleNTT(ρ, j, i)
		mlkem768.go#L325: 	r, e1 := make([]nttElement, k), make([]ringElement, k)
		mlkem768.go#L336: 	u := make([]ringElement, k) // NTT⁻¹(AT ◦ r) + e1
		mlkem768.go#L341: 			u[i] = polyAdd(u[i], inverseNTT(nttMul(ex.A[j*k+i], r[j])))
		mlkem768.go#L425: 	u := make([]ringElement, k)
		mlkem768.go#L431: 	b := (*[encodingSize4]byte)(c[encodingSize10*k:])