Encapsulation using ML‑KEM
POST/v1/encapsulate
Generate an ephemeral key pair and perform a key‑encapsulation using the ML‑KEM algorithm. The operation takes the public key, generates and encapsulates a shared secret, and returns the ciphertext along with the secret.
Request
Responses
- 200
- 400
- 403
- 404
- 500
- 501
Successful Operation
Client Error
Request refused
Resource not found
Server Error
Implementation Error