{"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2F186.hatenablog.com%2Fentry%2F20080329%2F1206801759\" title=\" 2008/08\u306bID\u30d9\u30fc\u30b9\u6697\u53f7\u306e\u672c\u304c\u51fa\u308b\u3089\u3057\u3044 - 186 @ hatenablog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","blog_title":"186 @ hatenablog","provider_name":"Hatena Blog","title":" 2008/08\u306bID\u30d9\u30fc\u30b9\u6697\u53f7\u306e\u672c\u304c\u51fa\u308b\u3089\u3057\u3044","description":"\u53c2\u8003:Gregory Neven's Home Page - An edited volume of IOS Press Cryptology and Information Security Series on Identity-Based Cryptography. IACR\u306e\u30ab\u30ec\u30f3\u30c0\u30fc\u3092\u898b\u3066\u3044\u3066\u6c17\u4ed8\u3044\u305f. \u7d0d\u5f97\u306e\u9762\u5b50. \u3069\u3053\u304b\u304c\u90a6\u8a33\u306b\u52d5\u3044\u3066\u3044\u308b\u3053\u3068\u306b\u671f\u5f85.","height":"190","categories":["crypt"],"type":"rich","author_name":"smoking186","width":"100%","published":"2008-03-29 23:42:39","url":"https://186.hatenablog.com/entry/20080329/1206801759","author_url":"https://blog.hatena.ne.jp/smoking186/","blog_url":"https://186.hatenablog.com/","version":"1.0","provider_url":"https://hatena.blog","image_url":null}