{"response":{"docs":[{"system_create_dtsi":"2020-01-26T13:35:25Z","system_modified_dtsi":"2020-01-28T13:32:17Z","has_model_ssim":["Document"],"id":"2801ph54m","accessControl_ssim":["a097464e-be79-42b2-818e-20097724a9f6"],"hasRelatedMediaFragment_ssim":["k930bz38z"],"hasRelatedImage_ssim":["k930bz38z"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Chapter 8"],"date_uploaded_dtsi":"2020-01-26T13:35:24Z","date_modified_dtsi":"2020-01-28T13:32:09Z","isPartOf_ssim":["admin_set/default"],"genre_tesim":["Document"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Electrical Engineering and Computer Science"],"creator_tesim":["Petzoldt, Albrecht","Schmidt, Dieter Sam","Ding, Jintai"],"subject_tesim":["Computing"],"description_tesim":["Programs for solving  univariate and multivariate polynomials.\r\n\r\nload \"Univariate\";   will load a collection of routines for polynomials in one variable.\r\nThe file main_univariate shows how to call the different routines.\r\n\r\nload \"solve_overdetermined.txt\";  will generate an overdetermined system and the uses the relinearization method to solve it.  Delete the first part of the program in order to run it with your own system of equations."],"license_tesim":["http://www.opendatacommons.org/licenses/pddl/1.0/"],"date_created_tesim":["2020-01"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["2r36v0001","8c97kr88j","k930bz38z","df65v9429","cj82k861w"],"file_set_ids_ssim":["2r36v0001","8c97kr88j","k930bz38z","df65v9429","cj82k861w"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CHAPTER 8","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["2801ph54m"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697112575657902080,"timestamp":"2021-04-15T13:17:55.455Z","score":0.00049999997},{"system_create_dtsi":"2019-10-01T14:43:45Z","system_modified_dtsi":"2019-10-01T14:53:25Z","has_model_ssim":["Document"],"id":"0c483m090","accessControl_ssim":["21114944-c047-4559-b7a3-e8d7e66c3084"],"hasRelatedMediaFragment_ssim":["t722hb11z"],"hasRelatedImage_ssim":["t722hb11z"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Corrections"],"date_uploaded_dtsi":"2019-10-01T14:43:45Z","date_modified_dtsi":"2019-10-01T14:52:56Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Schmidt, Dieter Sam"],"description_tesim":["Corrections to the book Multivariate Public Key Cryptosystem by ding, Petzoldt and Schmidt"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/downloads/t722hb11z?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["t722hb11z"],"file_set_ids_ssim":["t722hb11z"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CORRECTIONS","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["0c483m090"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697097803376885760,"timestamp":"2021-04-15T09:23:07.510Z","score":0.00049999997},{"system_create_dtsi":"2019-03-28T17:58:05Z","system_modified_dtsi":"2019-03-29T16:05:53Z","has_model_ssim":["Document"],"id":"k643b219p","accessControl_ssim":["cad128ab-d062-44eb-8e7d-6f97a459c506"],"hasRelatedMediaFragment_ssim":["m326m286z"],"hasRelatedImage_ssim":["m326m286z"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["second round submission of Rainbow to NIST"],"date_uploaded_dtsi":"2019-03-28T17:58:05Z","date_modified_dtsi":"2019-03-29T16:05:31Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Arts and Sciences"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Petzoldt, Abrecht","Schmidt, Dieter Sam","Chen, Ming-Shing","Ding, Jintai","Yang, Bo-Yin"],"description_tesim":["Second round submission of Rainbow to NISt.   Attached are two compressed files"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["6969z2130","m326m286z"],"file_set_ids_ssim":["6969z2130","m326m286z"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SECOND ROUND SUBMISSION OF RAINBOW TO NIST","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["k643b219p"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697118351236530176,"timestamp":"2021-04-15T14:49:43.475Z","score":0.00049999997},{"system_create_dtsi":"2019-03-14T20:50:28Z","system_modified_dtsi":"2019-03-14T20:50:50Z","has_model_ssim":["Document"],"id":"pn89d7644","accessControl_ssim":["6bf9b849-2658-4265-b690-ff3b1352b116"],"hasRelatedMediaFragment_ssim":["3f4626587"],"hasRelatedImage_ssim":["3f4626587"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Multivariate-Quadratic-Digital-Signature-Scheme"],"date_uploaded_dtsi":"2019-03-14T20:50:28Z","date_modified_dtsi":"2019-03-14T20:50:28Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Petzoldt, Albrecht","Schmidt, Dieter Sam","Ding, Jintai"],"description_tesim":["Magma programs related to chapter 6 of the book by Ding, Petzoldt and Schmidt..  a 3-pass version and a 5-pass version is given.  After downloading the files use \r\n\r\nload \"MQident3.txt\";\r\n\r\nor\r\n\r\nload \"MQident5.txt\";"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["3f4626587","fn107016z"],"file_set_ids_ssim":["3f4626587","fn107016z"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"MULTIVARIATEQUADRATICDIGITALSIGNATURESCHEME","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["pn89d7644"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697104629468233728,"timestamp":"2021-04-15T11:11:37.378Z","score":0.00049999997},{"system_create_dtsi":"2019-03-14T20:42:28Z","system_modified_dtsi":"2019-03-14T20:42:47Z","has_model_ssim":["Document"],"id":"6d56zx71r","accessControl_ssim":["98a46c32-858e-4b19-b400-5b07b4a2b2c2"],"hasRelatedMediaFragment_ssim":["z316q255q"],"hasRelatedImage_ssim":["z316q255q"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["SFLASH"],"date_uploaded_dtsi":"2019-03-14T20:42:28Z","date_modified_dtsi":"2019-03-14T20:42:28Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Schmidt, Dieter Sam","Ding, Jintai","Schmidt, Dieter"],"description_tesim":["Magma programs related to SFLASH in chapter 3 of the book by Ding, Petzoldt and Schmidt.  The program was inteneded for signing a document.  To run this program in Magma use\r\n\r\n\r\nload \"keygen.txt\";\r\n\r\nload \"sign.txt\";\r\n\r\nload \"verify.txt\";\r\n\r\nA document is generated at random.  Provide your own documentn and change the parameters.\r\n\r\n"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["z316q255q","5425kb680","pc289k13w"],"file_set_ids_ssim":["z316q255q","5425kb680","pc289k13w"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SFLASH","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["6d56zx71r"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697105222739951616,"timestamp":"2021-04-15T11:21:03.166Z","score":0.00049999997},{"system_create_dtsi":"2019-03-14T20:36:01Z","system_modified_dtsi":"2019-03-14T20:36:23Z","has_model_ssim":["Document"],"id":"z316q254f","accessControl_ssim":["4e9bb36c-0eb1-4ccf-8a6a-2f8cef5a73db"],"hasRelatedMediaFragment_ssim":["r207tq36q"],"hasRelatedImage_ssim":["r207tq36q"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["PMI (perturbed Matsumoto_Imai)"],"date_uploaded_dtsi":"2019-03-14T20:36:01Z","date_modified_dtsi":"2019-03-14T20:36:01Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Petzoldt, Albrecht","Schmidt, Dieter Sam","Ding, Jintai"],"description_tesim":["Programs related to the perturbed Matsumoto Imai methods.\r\n\r\nload \"keygen.txt\";\r\nload \"encrypt.txt\";\r\nload \"decrypt.txt\";\r\n\r\nFeel free to change the parameters\r\n"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["12579t447","0v838176w","r207tq36q"],"file_set_ids_ssim":["12579t447","0v838176w","r207tq36q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"PMI PERTURBED MATSUMOTO_IMAI","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["z316q254f"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697129371803844608,"timestamp":"2021-04-15T17:44:53.508Z","score":0.00049999997},{"system_create_dtsi":"2019-03-14T20:30:36Z","system_modified_dtsi":"2021-04-16T14:56:50Z","has_model_ssim":["Document"],"id":"gf06g394h","accessControl_ssim":["1e0d4805-4a8d-49e4-be49-31d4c068a43b"],"hasRelatedMediaFragment_ssim":["pk02cb73m"],"hasRelatedImage_ssim":["pk02cb73m"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["MI (original Matsumoto-Imai method)"],"date_uploaded_dtsi":"2019-03-14T20:30:36Z","date_modified_dtsi":"2019-03-14T20:31:40Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Schmidt, Dieter Sam","Petzoldt, Albrecht","Ding, Jintai"],"description_tesim":["Magma programs for the original method of Matsumoto-Imai.  Download the files and then in Magma use\r\n\r\nload \"keygen.txt\";\r\nload \"encrypt.txt\";\r\nload \"decrypt.txt\";\r\n\r\nThe first program will generate the files private_key.txt and public_key.txt.   \r\n\r\n\r\nWith  load \"LinearizationEquations.txt\";.    the equations are produced to break this method.\r\n\r\nExperiment by changing the parameters."],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"source_tesim":["gf06g394h"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["pk02cb73m","7h149q97x","8k71nj16s","jm214q447"],"file_set_ids_ssim":["pk02cb73m","7h149q97x","8k71nj16s","jm214q447"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"MI ORIGINAL MATSUMOTOIMAI METHOD","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["gf06g394h"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697209396921106432,"timestamp":"2021-04-16T14:56:51.407Z","score":0.00049999997},{"system_create_dtsi":"2019-03-14T19:40:26Z","system_modified_dtsi":"2019-03-14T20:42:32Z","has_model_ssim":["Document"],"id":"0g354g08r","accessControl_ssim":["cc78d8ae-d057-4fdd-bd4e-c1af6657e890"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Matsumoto-Imai"],"date_uploaded_dtsi":"2019-03-14T19:40:26Z","date_modified_dtsi":"2019-03-14T19:40:26Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Schmidt, Dieter Sam","Petzoldt,Albrecht","Ding, Jintai"],"description_tesim":["Magma programs related to chapter 3 of the book by Ding, Pretzoldt and Schmidt"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["gf06g394h","6d56zx71r","z316q254f"],"file_set_ids_ssim":["gf06g394h","6d56zx71r","z316q254f"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"MATSUMOTOIMAI","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["0g354g08r"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697087061863956480,"timestamp":"2021-04-15T06:32:23.605Z","score":0.00049999997},{"system_create_dtsi":"2019-03-09T13:23:42Z","system_modified_dtsi":"2019-03-09T13:23:56Z","has_model_ssim":["Document"],"id":"j38607987","accessControl_ssim":["a8350d8a-7df7-4474-9362-f9cc177e993c"],"hasRelatedMediaFragment_ssim":["6m311q27t"],"hasRelatedImage_ssim":["6m311q27t"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Rectangular Simple Matrix "],"date_uploaded_dtsi":"2019-03-09T13:23:42Z","date_modified_dtsi":"2019-03-09T13:23:42Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Petzoldt, Albrecht","Schmidt, Dieter Sam","Ding, Jintai"],"description_tesim":["Magma programs to chapter 7 pf the book \"Multivariate Public Key Cryptosystems\" by Ding, Petzoldt and Schmidt  using the rectangular simple matrix scheme.\r\n\r\nload \"keygen.txt\" will generate the file public_key.txt and private_key.txt\r\n\r\nload \"encrypt.txt\"; will generate the file \"ciphertexrt.txt\"   by encrypting a randomly generated file\r\n\r\nload \"decrypt.txt\"  will then decrypt that file.\r\n"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["6m311q283","6m311q27t","7h149q96n"],"file_set_ids_ssim":["6m311q283","6m311q27t","7h149q96n"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"RECTANGULAR SIMPLE MATRIX ","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["j38607987"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697124567922769920,"timestamp":"2021-04-15T16:28:32.170Z","score":0.00049999997},{"system_create_dtsi":"2019-03-09T12:57:37Z","system_modified_dtsi":"2019-03-09T13:23:44Z","has_model_ssim":["Document"],"id":"vm40xs59m","accessControl_ssim":["24943604-a34c-49ba-8ec3-521b6863f58f"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Simple Matrix"],"date_uploaded_dtsi":"2019-03-09T12:57:37Z","date_modified_dtsi":"2019-03-09T12:57:37Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Petzoldt, Albrecht","Schmidt, Dieter Sam","Ding, Jintai"],"description_tesim":["Programs to chapter 7 of the book \"Multivariate Public Key Cryptosystems\" by Ding, Petzoldt and Schmidt.\r\n\r\nTwo methods are attached, one for the standard ABC method, the other for the rectangular ABC method"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["5h73px125","j38607987"],"file_set_ids_ssim":["5h73px125","j38607987"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SIMPLE MATRIX","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["vm40xs59m"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697083852569182208,"timestamp":"2021-04-15T05:41:22.983Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Document","hits":17,"label":"Document"},{"value":"Dataset","hits":1,"label":"Dataset"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Schmidt, Dieter Sam","hits":18,"label":"Schmidt, Dieter Sam"},{"value":"Ding, Jintai","hits":11,"label":"Ding, Jintai"},{"value":"Petzoldt, Albrecht","hits":8,"label":"Petzoldt, Albrecht"},{"value":"Chen, Ming-Shing","hits":1,"label":"Chen, Ming-Shing"},{"value":"Petzoldt, Abrecht","hits":1,"label":"Petzoldt, Abrecht"},{"value":"Petzoldt,Albrecht","hits":1,"label":"Petzoldt,Albrecht"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Computing","hits":1,"label":"Computing"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Engineering and Applied Science","hits":17,"label":"Engineering and Applied Science"},{"value":"Arts and Sciences","hits":1,"label":"Arts and Sciences"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"- Computing Sciences \u0026 Informatics","hits":17,"label":"- Computing Sciences \u0026 Informatics"},{"value":"- Electrical Engineering and Computer Science","hits":1,"label":"- Electrical Engineering and Computer Science"}],"label":"Department Sim"},{"name":"language_sim","items":[],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":1,"label":"University of Cincinnati"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2020-01","hits":1,"label":"2020-01"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":18,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":2,"prev_page":null,"total_pages":2,"limit_value":10,"offset_value":0,"total_count":18,"first_page?":true,"last_page?":false}}}