{"created":"2023-06-19T12:08:39.639280+00:00","id":244,"links":{},"metadata":{"_buckets":{"deposit":"11c28ec2-84e6-4068-a09f-6f63f6c1e372"},"_deposit":{"created_by":3,"id":"244","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"244"},"status":"published"},"_oai":{"id":"oai:dokkyo.repo.nii.ac.jp:00000244","sets":["13:53:50"]},"author_link":["325","326"],"item_10002_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2013-02","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicPageEnd":"76","bibliographicPageStart":"71","bibliographic_titles":[{"bibliographic_title":"情報学研究"},{"bibliographic_title":"Journal of Informatics","bibliographic_titleLang":"en"}]}]},"item_10002_heading_23":{"attribute_name":"見出し","attribute_value_mlt":[{"subitem_heading_banner_headline":"資料論文","subitem_heading_language":"ja"},{"subitem_heading_banner_headline":"Review Articles","subitem_heading_language":"en"}]},"item_10002_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"獨協大学情報学研究所"}]},"item_10002_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12559097","subitem_source_identifier_type":"NCID"}]},"item_10002_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2186-7666","subitem_source_identifier_type":"ISSN"}]},"item_10002_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"深瀬, 道晴"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Fukase, Masaharu","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2014-07-25"}],"displaytype":"detail","filename":"P-095-J99j-2-9.pdf","filesize":[{"value":"2.0 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"P-095-J99j-2-9.pdf","url":"https://dokkyo.repo.nii.ac.jp/record/244/files/P-095-J99j-2-9.pdf"},"version_id":"c0f7b1a9-a060-46a2-b947-566412ce549a"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"格子と暗号に関する研究動向について : 暗号攻撃、格子暗号、完全準同型暗号","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"格子と暗号に関する研究動向について : 暗号攻撃、格子暗号、完全準同型暗号"},{"subitem_title":"Research Trend in Lattice and Cryptography : Cryptanalysis, Lattice-Based Cryptography, Fully Homomorphic Encryption","subitem_title_language":"en"}]},"item_type_id":"10002","owner":"3","path":["50"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-07-25"},"publish_date":"2014-07-25","publish_status":"0","recid":"244","relation_version_is_last":true,"title":["格子と暗号に関する研究動向について : 暗号攻撃、格子暗号、完全準同型暗号"],"weko_creator_id":"3","weko_shared_id":-1},"updated":"2023-06-19T13:13:00.878288+00:00"}