{"id":355,"date":"2012-01-15T20:56:25","date_gmt":"2012-01-16T01:56:25","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/dlarochelle\/files\/2012\/01\/perl_monger_hash_collisions.pdf"},"modified":"2012-01-15T20:56:25","modified_gmt":"2012-01-16T01:56:25","slug":"perl_monger_hash_collisions","status":"inherit","type":"attachment","link":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/2012\/01\/15\/hash-collision-complexity-attacks-perl-vs-other-languages\/perl_monger_hash_collisions\/","title":{"rendered":"perl_monger_hash_collisions"},"author":2148,"featured_media":0,"comment_status":"open","ping_status":"open","template":"","meta":[],"class_list":["post-355","attachment","type-attachment","status-inherit","hentry"],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/archive.blogs.harvard.edu\/dlarochelle\/files\/2012\/01\/perl_monger_hash_collisions.pdf'>perl_monger_hash_collisions<\/a><\/p>\n"},"caption":{"rendered":"<p>perl_monger_hash_collisions<\/p>\n"},"alt_text":"","media_type":"file","mime_type":"application\/pdf","media_details":{},"post":353,"source_url":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/files\/2012\/01\/perl_monger_hash_collisions.pdf","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/wp-json\/wp\/v2\/media\/355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/wp-json\/wp\/v2\/users\/2148"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/wp-json\/wp\/v2\/comments?post=355"}],"wp:attached-to":[{"embeddable":true,"post_type":"post","id":353,"href":"https:\/\/archive.blogs.harvard.edu\/dlarochelle\/wp-json\/wp\/v2\/posts\/353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}