Attacking cryptographic schemes based on "perturbation polynomials". Albrecht, M. R., Gentry, C., Halevi, S., & Katz, J. In Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pages 1–10, 2009.
Paper doi bibtex @inproceedings{DBLP:conf/ccs/AlbrechtGHK09,
author = {Martin R. Albrecht and
Craig Gentry and
Shai Halevi and
Jonathan Katz},
title = {Attacking cryptographic schemes based on "perturbation polynomials"},
booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
pages = {1--10},
year = {2009},
crossref = {DBLP:conf/ccs/2009},
url = {https://doi.org/10.1145/1653662.1653664},
doi = {10.1145/1653662.1653664},
timestamp = {Tue, 10 Nov 2020 19:58:07 +0100},
biburl = {https://dblp.org/rec/conf/ccs/AlbrechtGHK09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"AAwrkAAdpYS84FcHP","bibbaseid":"albrecht-gentry-halevi-katz-attackingcryptographicschemesbasedonperturbationpolynomials-2009","author_short":["Albrecht, M. R.","Gentry, C.","Halevi, S.","Katz, J."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Martin","R."],"propositions":[],"lastnames":["Albrecht"],"suffixes":[]},{"firstnames":["Craig"],"propositions":[],"lastnames":["Gentry"],"suffixes":[]},{"firstnames":["Shai"],"propositions":[],"lastnames":["Halevi"],"suffixes":[]},{"firstnames":["Jonathan"],"propositions":[],"lastnames":["Katz"],"suffixes":[]}],"title":"Attacking cryptographic schemes based on \"perturbation polynomials\"","booktitle":"Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009","pages":"1–10","year":"2009","crossref":"DBLP:conf/ccs/2009","url":"https://doi.org/10.1145/1653662.1653664","doi":"10.1145/1653662.1653664","timestamp":"Tue, 10 Nov 2020 19:58:07 +0100","biburl":"https://dblp.org/rec/conf/ccs/AlbrechtGHK09.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/ccs/AlbrechtGHK09,\n author = {Martin R. Albrecht and\n Craig Gentry and\n Shai Halevi and\n Jonathan Katz},\n title = {Attacking cryptographic schemes based on \"perturbation polynomials\"},\n booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications\n Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},\n pages = {1--10},\n year = {2009},\n crossref = {DBLP:conf/ccs/2009},\n url = {https://doi.org/10.1145/1653662.1653664},\n doi = {10.1145/1653662.1653664},\n timestamp = {Tue, 10 Nov 2020 19:58:07 +0100},\n biburl = {https://dblp.org/rec/conf/ccs/AlbrechtGHK09.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Albrecht, M. R.","Gentry, C.","Halevi, S.","Katz, J."],"key":"DBLP:conf/ccs/AlbrechtGHK09","id":"DBLP:conf/ccs/AlbrechtGHK09","bibbaseid":"albrecht-gentry-halevi-katz-attackingcryptographicschemesbasedonperturbationpolynomials-2009","role":"author","urls":{"Paper":"https://doi.org/10.1145/1653662.1653664"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"http://dblp.org/pers/tb2/a/Albrecht:Martin_R=","dataSources":["nNWn9GD9paFhQPHAh"],"keywords":[],"search_terms":["attacking","cryptographic","schemes","based","perturbation","polynomials","albrecht","gentry","halevi","katz"],"title":"Attacking cryptographic schemes based on \"perturbation polynomials\"","year":2009}