Exploiting Security Holes in Lattice Data Hiding | Publicación