{"id":2906,"date":"2023-11-19T22:32:19","date_gmt":"2023-11-19T21:32:19","guid":{"rendered":"http:\/\/ff.mhrooz.xyz\/?page_id=2906"},"modified":"2023-11-19T22:34:21","modified_gmt":"2023-11-19T21:34:21","slug":"code-based_cryptography","status":"publish","type":"page","link":"https:\/\/blog.mhrooz.xyz\/index.php\/code-based_cryptography\/","title":{"rendered":"\ud83d\udd12Code-based Cryptography"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.mhrooz.xyz\/index.php\/wp-json\/wp\/v2\/pages\/2906"}],"collection":[{"href":"https:\/\/blog.mhrooz.xyz\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blog.mhrooz.xyz\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mhrooz.xyz\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mhrooz.xyz\/index.php\/wp-json\/wp\/v2\/comments?post=2906"}],"version-history":[{"count":3,"href":"https:\/\/blog.mhrooz.xyz\/index.php\/wp-json\/wp\/v2\/pages\/2906\/revisions"}],"predecessor-version":[{"id":2910,"href":"https:\/\/blog.mhrooz.xyz\/index.php\/wp-json\/wp\/v2\/pages\/2906\/revisions\/2910"}],"wp:attachment":[{"href":"https:\/\/blog.mhrooz.xyz\/index.php\/wp-json\/wp\/v2\/media?parent=2906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}