{"author_url":"https://blog.hatena.ne.jp/smoking186/","blog_title":"186 @ hatenablog","image_url":null,"provider_name":"Hatena Blog","blog_url":"https://186.hatenablog.com/","version":"1.0","categories":["crypt"],"width":"100%","description":"15\u65e5\u304b\u3089\u3060\u3063\u305f\u306e\u304b\u3002\u30d7\u30ed\u30b0\u30e9\u30e0\u3092\u773a\u3081\u3066\u6c17\u306b\u306a\u3063\u305f\u306e\u3092\u30e1\u30e2\u3002 Victor Shoup 14 Years of Chosen Ciphertext Security: A Survey of Public Key Encryption Alexander May Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring \u30bc\u30ed\u77e5\u8b58\u8a3c\u660e\u5168\u90e8 Kaoru Kurosawa and Yvo Desmedt A New Paradigm of Hybrid Encryption Scheme\u2026","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2F186.hatenablog.com%2Fentry%2F20040818%2F1092807162\" title=\" Crypto2004 - 186 @ hatenablog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","url":"https://186.hatenablog.com/entry/20040818/1092807162","provider_url":"https://hatena.blog","author_name":"smoking186","title":" Crypto2004","height":"190","published":"2004-08-18 14:32:42","type":"rich"}