{"author_url":"https://blog.hatena.ne.jp/smoking186/","description":"\u5148\u3005\u9031\u304f\u3089\u3044\u306b\u7d42\u308f\u3063\u305f, NIST\u306e2nd Hash Function Workshop*1\u304b\u3089. Bentahar, Page, Silverman, Saarinen, and Smart. \"LASH\" Lyubashevsky, Micciancio, Peikert, and Rosen. \"Provably Secure FFT Hashing\" Provably Secure FFT Hashing\u306e\u767a\u8868\u8cc7\u6599 PDF\u306e\u6700\u5f8c\u306e\u30da\u30fc\u30b8\u3067LASH\u306e\u6b63\u5f0f\u30d1\u30e9\u30e1\u30fc\u30bf\u3058\u3083\u306a\u3044\u3082\u306e\u306b\u306f\u30a2\u30bf\u30c3\u30af\u51fa\u6765\u307e\u3057\u305f\u3068\u304b\u66f8\u3044\u3066\u3042\u3063\u3066\u7b11\u3063\u305f. \u304c, \u3053\u306e\u6587\u8108\u3067Lunch-time attack\u304c\u51fa\u3066\u304f\u308b\u306e\u304c\u826f\u2026","author_name":"smoking186","width":"100%","categories":["crypt"],"published":"2006-09-16 18:30:56","provider_name":"Hatena Blog","blog_title":"186 @ hatenablog","blog_url":"https://186.hatenablog.com/","provider_url":"https://hatena.blog","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2F186.hatenablog.com%2Fentry%2F20060916%2F1158399056\" title=\" LASH\u3068FFT Hashing - 186 @ hatenablog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","type":"rich","url":"https://186.hatenablog.com/entry/20060916/1158399056","height":"190","image_url":null,"version":"1.0","title":" LASH\u3068FFT Hashing"}