Attacking Cryptographic Schemes Based on ‘Perturbation (2009)

by M Albrecht, C Gentry, S Halevi, J Katz