{"blog_url":"https://186.hatenablog.com/","image_url":null,"title":" CRYTPO 2006\u306eRump Session\u304c\u898b\u305f\u3044","published":"2006-09-04 21:39:08","blog_title":"186 @ hatenablog","type":"rich","categories":["crypt"],"version":"1.0","provider_name":"Hatena Blog","author_name":"smoking186","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2F186.hatenablog.com%2Fentry%2F20060904%2F1157373548\" title=\" CRYTPO 2006\u306eRump Session\u304c\u898b\u305f\u3044 - 186 @ hatenablog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","provider_url":"https://hatena.blog","author_url":"https://blog.hatena.ne.jp/smoking186/","width":"100%","url":"https://186.hatenablog.com/entry/20060904/1157373548","description":"\u53bb\u5e74\u307f\u305f\u3044\u306b\u52d5\u753b\u7121\u3044\u304b\u306a\u30fc. J. Callas, Tamzen Cannoy, N. van Somere \"Lettuce-based cryptography\" John Kelsey \"A knapsack identification and signature protocol\" \u304c\u6c17\u306b\u306a\u308b\u306a\u30fc. \u30ec\u30bf\u30b9\u3092\u3069\u3046\u5f04\u308b\u3093\u3060.","height":"190"}