{"entities":{"Q764863":{"pageid":766712,"ns":120,"title":"Item:Q764863","lastrevid":64311276,"modified":"2026-04-11T19:00:08Z","type":"item","id":"Q764863","labels":{"en":{"language":"en","value":"Techniques for cryptanalysis of block ciphers. (to appear)"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 6015144"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q764863$646F61F8-262E-4EDC-93F0-966C7DDF8CEB","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"897bc87dc146b41574d96ee3c625ce939015b60e","datavalue":{"value":{"text":"Techniques for cryptanalysis of block ciphers. (to appear)","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q764863$39258072-E0FE-43DC-8A27-335237481D8F","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"3da68dd7ab6c5bdd794b7db6eb2ba88ff9b21231","datavalue":{"value":{"entity-type":"item","numeric-id":321308,"id":"Q321308"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q764863$B77AE127-C111-4D92-9A8A-845461C02E64","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"40b84a1df55e23908ba6246ea73fe500638f5ca2","datavalue":{"value":{"entity-type":"item","numeric-id":321298,"id":"Q321298"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q764863$8C12F023-8F38-40B2-AE5E-3F574C273334","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"ccde1a0bba036cf63ad721807d82986b035168c9","datavalue":{"value":{"entity-type":"item","numeric-id":213232,"id":"Q213232"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q764863$7CE50FB9-6479-4844-A8E3-298A5993092F","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"128f9c51694b305b98e371ca2a24075ce0fc9ca7","datavalue":{"value":{"time":"+2012-03-16T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q764863$3001D9CC-EA98-4A5A-8DFF-7FF0DA2C7A49","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"ec639dabb19ee7efd8ad25e9cbf38528c68dd096","datavalue":{"value":"94-01","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q764863$2FB37C91-FB18-4810-8DF8-9457766E73CE","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q764863$B8311214-087B-40DF-9AD5-4F383120C07B","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"65fcb5123a491d9c885cd9dd76483653efa3d5b6","datavalue":{"value":"6015144","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q764863$855B047D-F06E-4C1D-9498-B4CEAB24F726","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q764863$EA8BA8CF-EA9C-4C5B-90F7-09F1F6AF55A1","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Techniques for cryptanalysis of block ciphers. (to appear)","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Techniques_for_cryptanalysis_of_block_ciphers._(to_appear)"}}}}}