{"title":" ","height":"190","provider_url":"https://hatena.blog","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2F186.hatenablog.com%2Fentry%2F20090302%2F1236002250\" title=\"  - 186 @ hatenablog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","width":"100%","blog_url":"https://186.hatenablog.com/","image_url":null,"url":"https://186.hatenablog.com/entry/20090302/1236002250","categories":["crypt"],"version":"1.0","type":"rich","description":"Cryptology ePrint Archive: Report 2009/098 - Martin Albrecht and Craig Gentry and Shai Halevi and Jonathan Katz \u201cAttacking Cryptographic Schemes Based on \u2018Perturbation Polynomials\u2019\u201d Katz\u306e\u30b5\u30a4\u30c8\u306b\u540d\u524d\u3060\u3051\u51fa\u3066\u3044\u3066\u9762\u767d\u305d\u3046\u3060\u306a\u3068\u601d\u3063\u3066\u3044\u305f\u306e\u304c\u3001\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u3055\u308c\u3066\u3044\u305f. \u7b26\u53f7\u7cfb\u306e\u8aa4\u308a\u8a02\u6b63\u3068\u683c\u5b50\u7e2e\u5c0f\u306e\u30c6\u30af\u30cb\u30c3\u30af\u3092\u4f7f\u3063\u3066\u653b\u6483\u3059\u308b\u3068\u304b\u4e91\u3005\u3068\u66f8\u3044\u3066\u3042\u308b\u306e\u3067\u3001\u3042\u3068\u3067\u8aad\u3080.","provider_name":"Hatena Blog","author_name":"smoking186","blog_title":"186 @ hatenablog","published":"2009-03-02 22:57:30","author_url":"https://blog.hatena.ne.jp/smoking186/"}