Skip to main content

Decapsulation using ML‑KEM

POST 

/v1/decapsulate

Perform a key‑decapsulation using the ML‑KEM algorithm. The operation takes the encapsulated ciphertext (produced by ML‑KEM), performs with the private key the decapsulation, and returns the recovered shared secret.

Request

Responses

Successful Operation

Get started withCloudHSM for free.
Other questions?Ask Sales.
Feedback
Need help?