{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T16:20:04Z","timestamp":1764606004593,"version":"3.46.0"},"publisher-location":"Cham","reference-count":0,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032122865","type":"print"},{"value":"9783032122872","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-12287-2","type":"book","created":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T16:17:43Z","timestamp":1764605863000},"source":"Crossref","is-referenced-by-count":0,"title":["Theory of Cryptography"],"prefix":"10.1007","member":"297","container-title":["Lecture Notes in Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-12287-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-12287-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T16:17:57Z","timestamp":1764605877000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-12287-2"}},"subtitle":["23rd International Conference, TCC 2025, Aarhus, Denmark, December 1\u20135, 2025, Proceedings, Part I"],"editor":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4792-369X","authenticated-orcid":false,"given":"Benny","family":"Applebaum","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2206-4817","authenticated-orcid":false,"given":"Huijia","family":"Lin","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032122865","9783032122872"],"references-count":0,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-12287-2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}