{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB12644985.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB12644985#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB12644985.json"},"dc:title":[{"@value":"Quantum attacks on public-key cryptosystems"}],"dc:creator":"Song Y. Yan","dc:publisher":[{"@value":"Springer"}],"dcterms:extent":"viii, 207 p.","cinii:size":"25 cm","dc:language":"eng","dc:date":"2013","cinii:ncid":"BB12644985","cinii:ownerCount":"9","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA10350257#entity","@type":"foaf:Person","foaf:name":[{"@value":"Yan, Song Y."}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA001492","@type":"foaf:Organization","foaf:name":"東北大学 電気通信研究所 図書室","rdfs:seeAlso":{"@id":"http://opac.library.tohoku.ac.jp/opac/opac_openurl/?ncid=BB12644985"}},{"@id":"https://ci.nii.ac.jp/library/FA013990","@type":"foaf:Organization","foaf:name":"東京大学 数理科学研究科","rdfs:seeAlso":{"@id":"https://opac.dl.itc.u-tokyo.ac.jp/opac/opac_openurl/?ncid=BB12644985"}},{"@id":"https://ci.nii.ac.jp/library/FA002677","@type":"foaf:Organization","foaf:name":"京都大学 理学部","rdfs:seeAlso":{"@id":"https://kuline.kulib.kyoto-u.ac.jp/opac/opac_openurl/?ncid=BB12644985"}},{"@id":"https://ci.nii.ac.jp/library/FA002768","@type":"foaf:Organization","foaf:name":"京都大学 数理解析研究所 図書室","rdfs:seeAlso":{"@id":"https://kuline.kulib.kyoto-u.ac.jp/opac/opac_openurl/?ncid=BB12644985"}},{"@id":"https://ci.nii.ac.jp/library/FA003512","@type":"foaf:Organization","foaf:name":"長崎大学 附属図書館","rdfs:seeAlso":{"@id":"https://opac.lb.nagasaki-u.ac.jp/mylimedio/search/search.do?target=local&mode=comp&ncid=BB12644985"}},{"@id":"https://ci.nii.ac.jp/library/FA007320","@type":"foaf:Organization","foaf:name":"中京大学 豊田図書館","rdfs:seeAlso":{"@id":"https://www.lib.chukyo-u.ac.jp/opac/search?searchmode=complex&target=local&s_ncid=BB12644985"}},{"@id":"https://ci.nii.ac.jp/library/FA007670","@type":"foaf:Organization","foaf:name":"同志社大学 図書館","rdfs:seeAlso":{"@id":"https://doors.doshisha.ac.jp/opac/opac_openurl/?ncid=BB12644985"}},{"@id":"https://ci.nii.ac.jp/library/FA008607","@type":"foaf:Organization","foaf:name":"広島工業大学 附属図書館","rdfs:seeAlso":{"@id":"https://libwww.cc.it-hiroshima.ac.jp/intrasite/CARINOPACLINK.htm?ONI=BB12644985"}},{"@id":"https://ci.nii.ac.jp/library/FA01452X","@type":"foaf:Organization","foaf:name":"奈良先端科学技術大学院大学 附属図書館","rdfs:seeAlso":{"@id":"https://library.naist.jp/opac/en/search?s_ncid=BB12644985"}}],"prism:publicationDate":["c2013"],"cinii:note":["Includes bibliographical references and index"],"dc:subject":["DC22:005.82"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Public+key+cryptography","dc:title":"Public key cryptography"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+networks+--+Security+measures","dc:title":"Computer networks -- Security measures"}],"dcterms:hasPart":[{"@id":"urn:isbn:9781441977212","dc:title":": [hardcover]"}]}]}