Attacking cryptographic schemes based on perturbation polynomials

Martin Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz. Attacking cryptographic schemes based on perturbation polynomials . In Ehab Al-Shaer, Somesh Jha, Angelos D. Keromytis, editors, Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. pages 1-10, ACM, 2009. [doi]

@inproceedings{AlbrechtGHK09,
  title = {Attacking cryptographic schemes based on  perturbation polynomials },
  author = {Martin Albrecht and Craig Gentry and Shai Halevi and Jonathan Katz},
  year = {2009},
  doi = {10.1145/1653662.1653664},
  url = {http://doi.acm.org/10.1145/1653662.1653664},
  tags = {rule-based},
  researchr = {https://researchr.org/publication/AlbrechtGHK09},
  cites = {0},
  citedby = {0},
  pages = {1-10},
  booktitle = {Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009},
  editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis},
  publisher = {ACM},
  isbn = {978-1-60558-894-0},
}