{"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2F186.hatenablog.com%2Fentry%2F20091012%2F1255274913\" title=\" \u6700\u8fd1\u306eePrint - 186 @ hatenablog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","url":"https://186.hatenablog.com/entry/20091012/1255274913","image_url":null,"author_name":"smoking186","height":"190","provider_name":"Hatena Blog","width":"100%","author_url":"https://blog.hatena.ne.jp/smoking186/","published":"2009-10-12 00:28:33","blog_title":"186 @ hatenablog","provider_url":"https://hatena.blog","type":"rich","description":"\u307e\u3041\u51fa\u81ea\u304c\u51fa\u81ea\u306a\u306e\u3067\u516c\u958b\u9375\u7cfb\u3057\u304b\u8aad\u3081\u307e\u305b\u3093\u3051\u3069\u3002 R. P. Singh, A. Saikia and B. K.Sarma. \u201cLittle Dragon Two: An efficient Multivariate Public Key Cryptosystem.\u201d (Cryptology ePrint Archive: Report 2009/488) \u307e\u3055\u304b\u306eLittle Dragon. \u591a\u5909\u6570\u591a\u9805\u5f0f\u7cfb. \u81ea\u5df1\u8a55\u4fa1\u306e\u3068\u3053\u308d\u3067\u3056\u3089\u3063\u3068\u8003\u3048\u3089\u308c\u308b\u653b\u6483\u306b\u95a2\u3059\u308b\u8a71\u304c\u3042\u3063\u305f\u306e\u3067\u8a71\u534a\u5206\u306b\u805e\u3044\u3066\u304a\u304f\u3053\u3068\u306b\u3059\u308b. \u305d\u3046\u3044\u3048\u3070Square (C. Clough, J. Baena, J. Ding, B\u2026","categories":["crypt"],"version":"1.0","title":" \u6700\u8fd1\u306eePrint","blog_url":"https://186.hatenablog.com/"}