{"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2F186.hatenablog.com%2Fentry%2F20071229%2F1198908000\" title=\" PKC 2008 - Accepted Paper List - 186 @ hatenablog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","provider_url":"https://hatena.blog","blog_url":"https://186.hatenablog.com/","author_name":"smoking186","categories":["crypt"],"blog_title":"186 @ hatenablog","type":"rich","description":"PKC 2008\u306eAccepted Paper List \u675c\u64b0\u3055\u3093\u306e\u3068\u3053\u308d\u304b\u3089. \u683c\u5b50\u95a2\u4fc2\u306f3\u3064. P. Mol and M. Yung, \u201cRecovering NTRU Secret Key From Inversion Oracles.\u201d V. Lyubashevsky, \u201cLattice-Based Identification Schemes Secure Under Active Attacks.\u201d T. Plantard, W. Susilo, and K. T. Win, \u201cA Digital Signature Scheme based on $CVP_\\infty$.\u201d T\u2026","height":"190","version":"1.0","provider_name":"Hatena Blog","width":"100%","url":"https://186.hatenablog.com/entry/20071229/1198908000","title":" PKC 2008 - Accepted Paper List","image_url":null,"published":"2007-12-29 15:00:00","author_url":"https://blog.hatena.ne.jp/smoking186/"}