{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BA91388409.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BA91388409#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BA91388409.json"},"dc:title":[{"@value":"Cryptanalysis of RSA and its variants"}],"dc:creator":"M. Jason Hinek","dc:publisher":[{"@value":"Chapman & Hall/CRC"}],"dcterms:extent":"xviii, 268 p.","cinii:size":"24 cm","dc:language":"eng","dc:date":"2010","cinii:ncid":"BA91388409","cinii:ownerCount":"5","foaf:maker":[{"@type":"foaf:Person","foaf:name":[{"@value":"Hinek, M. Jason"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA001390","@type":"foaf:Organization","foaf:name":"東北大学 附属図書館 北青葉山分館","rdfs:seeAlso":{"@id":"https://opac.library.tohoku.ac.jp/opac/opac_openurl/?ncid=BA91388409"}},{"@id":"https://ci.nii.ac.jp/library/FA013990","@type":"foaf:Organization","foaf:name":"東京大学 数理科学研究科","rdfs:seeAlso":{"@id":"https://opac.dl.itc.u-tokyo.ac.jp/opac/opac_openurl/?ncid=BA91388409"}},{"@id":"https://ci.nii.ac.jp/library/FA003035","@type":"foaf:Organization","foaf:name":"神戸大学 附属図書館 自然科学系図書館","rdfs:seeAlso":{"@id":"https://op.lib.kobe-u.ac.jp/opac/opac_openurl/?rfe_dat=ncid/BA91388409"}},{"@id":"https://ci.nii.ac.jp/library/FA005019","@type":"foaf:Organization","foaf:name":"学習院大学 図書館","rdfs:seeAlso":{"@id":"https://glim-op.glim.gakushuin.ac.jp/webopac/cattab.do?sp_srh_flg=true&ncid=BA91388409"}},{"@id":"https://ci.nii.ac.jp/library/FA005019","@type":"foaf:Organization","foaf:name":"学習院大学 図書館","rdfs:seeAlso":{"@id":"https://glim-op.glim.gakushuin.ac.jp/webopac/cattab.do?sp_srh_flg=true&ncid=BA91388409"}}],"bibo:lccn":["2009019264"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2009019264"}],"prism:publicationDate":["c2010"],"cinii:note":["Includes bibliographical references and index"],"dc:subject":["LCC:TK5102.94","DC22:005.8/2"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Telecommunication+--+Security+measures+--+Mathematics","dc:title":"Telecommunication -- Security measures -- Mathematics"},{"@id":"https://ci.nii.ac.jp/books/search?q=Public+key+cryptography","dc:title":"Public key cryptography"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security","dc:title":"Computer security"}],"dcterms:isPartOf":[{"@id":"https://ci.nii.ac.jp/ncid/BA8331133X#entity","dc:title":"Chapman & Hall/CRC cryptography and network security / Series editor, Douglas R. Stinson","@type":"bibo:Book"}],"dcterms:hasPart":[{"@id":"urn:isbn:9781420075182"}]}]}