{"provider_name":"Hatena Blog","title":" AGV09\u306e\u8a71","url":"https://186.hatenablog.com/entry/20090104/1230995755","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2F186.hatenablog.com%2Fentry%2F20090104%2F1230995755\" title=\" AGV09\u306e\u8a71 - 186 @ hatenablog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","author_url":"https://blog.hatena.ne.jp/smoking186/","type":"rich","categories":["crypt"],"blog_title":"186 @ hatenablog","published":"2009-01-04 00:15:55","provider_url":"https://hatena.blog","height":"190","description":"A. Akavia, S. Goldwasser and V. Vaikuntanathan. \u201cSimultaneous Hardcore Bits and Cryptography against Memory Attacks.\u201d (TCC 2009) Vaikuntanathan\u306e\u3068\u3053\u308d\u304b\u3089. Freezing attack\u306f\u201ccold-boot attack\u201d\u306e\u3053\u3068\u3067\u3042\u3063\u305f\u3053\u3068\u3088. \u5185\u5bb9\u7684\u306b\u306fRegev05\u3068GPV\u306e\u79d8\u5bc6\u9375\u304c\u90e8\u5206\u7684\u306b\u6f0f\u308c\u305f\u3068\u304d\u306e\u5b89\u5168\u6027\u3060\u305d\u3046\u3067. Regev05\u306e\u9375\u751f\u6210 (GPV08, GV08, Peikert08\u306b\u51fa\u3066\u304f\u308b\u4e00\u65b9\u5411\u6027\u95a2\u6570) \u306e\u30cf\u30fc\u30c9\u30b3\u30a2\u6027\u306e\u8a71. Peik\u2026","blog_url":"https://186.hatenablog.com/","image_url":null,"width":"100%","author_name":"smoking186","version":"1.0"}