Attacking Cryptographic Schemes Based on "Perturbation Polynomials". Albrecht, M. R., Gentry, C., Halevi, S., & Katz, J. IACR Cryptol. ePrint Arch., 2009. Paper bibtex @article{DBLP:journals/iacr/AlbrechtGHK09,
author = {Martin R. Albrecht and
Craig Gentry and
Shai Halevi and
Jonathan Katz},
title = {Attacking Cryptographic Schemes Based on "Perturbation Polynomials"},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {98},
year = {2009},
url = {http://eprint.iacr.org/2009/098},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/AlbrechtGHK09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"7qaBKphv7dboNJBWT","bibbaseid":"albrecht-gentry-halevi-katz-attackingcryptographicschemesbasedonperturbationpolynomials-2009","author_short":["Albrecht, M. R.","Gentry, C.","Halevi, S.","Katz, J."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Martin","R."],"propositions":[],"lastnames":["Albrecht"],"suffixes":[]},{"firstnames":["Craig"],"propositions":[],"lastnames":["Gentry"],"suffixes":[]},{"firstnames":["Shai"],"propositions":[],"lastnames":["Halevi"],"suffixes":[]},{"firstnames":["Jonathan"],"propositions":[],"lastnames":["Katz"],"suffixes":[]}],"title":"Attacking Cryptographic Schemes Based on \"Perturbation Polynomials\"","journal":"IACR Cryptol. ePrint Arch.","pages":"98","year":"2009","url":"http://eprint.iacr.org/2009/098","timestamp":"Mon, 11 May 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/iacr/AlbrechtGHK09.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/iacr/AlbrechtGHK09,\n author = {Martin R. Albrecht and\n Craig Gentry and\n Shai Halevi and\n Jonathan Katz},\n title = {Attacking Cryptographic Schemes Based on \"Perturbation Polynomials\"},\n journal = {{IACR} Cryptol. ePrint Arch.},\n pages = {98},\n year = {2009},\n url = {http://eprint.iacr.org/2009/098},\n timestamp = {Mon, 11 May 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/iacr/AlbrechtGHK09.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Albrecht, M. R.","Gentry, C.","Halevi, S.","Katz, J."],"key":"DBLP:journals/iacr/AlbrechtGHK09","id":"DBLP:journals/iacr/AlbrechtGHK09","bibbaseid":"albrecht-gentry-halevi-katz-attackingcryptographicschemesbasedonperturbationpolynomials-2009","role":"author","urls":{"Paper":"http://eprint.iacr.org/2009/098"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"http://dblp.org/pers/tb2/a/Albrecht:Martin_R=","dataSources":["nNWn9GD9paFhQPHAh"],"keywords":[],"search_terms":["attacking","cryptographic","schemes","based","perturbation","polynomials","albrecht","gentry","halevi","katz"],"title":"Attacking Cryptographic Schemes Based on \"Perturbation Polynomials\"","year":2009}