{"height":"190","provider_name":"Hatena Blog","description":"\u76ee\u306b\u3064\u304f\u3068\u3053\u308d\u304b\u3089\u62fe\u3063\u3066\u307f\u305f Dennis Hofheinz and Eike Kiltz. \"Secure Hybrid Encryption from Weakened Key Encapsulation.\" Ronald Cramer, Eike Kiltz, and C. Padr\u00f3. \"A Note on Secure Computation of the Moore-Penrose Pseudo-Inverse and its Application to Secure Linear Algebra.\" Jonathan Katz and Omer Horvitz. \"Univer\u2026","blog_url":"https://186.hatenablog.com/","url":"https://186.hatenablog.com/entry/20070522/1179842098","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2F186.hatenablog.com%2Fentry%2F20070522%2F1179842098\" title=\" CRYPTO 2007\u306e\u30a2\u30ec\u304c\u51fa\u306a\u3044\u306e\u3067 - 186 @ hatenablog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","author_name":"smoking186","version":"1.0","title":" CRYPTO 2007\u306e\u30a2\u30ec\u304c\u51fa\u306a\u3044\u306e\u3067","type":"rich","categories":["crypt"],"author_url":"https://blog.hatena.ne.jp/smoking186/","width":"100%","provider_url":"https://hatena.blog","image_url":null,"blog_title":"186 @ hatenablog","published":"2007-05-22 22:54:58"}