{"response":{"docs":[{"system_create_dtsi":"2019-03-09T13:23:42Z","system_modified_dtsi":"2019-03-09T13:23:56Z","has_model_ssim":["Document"],"id":"j38607987","accessControl_ssim":["a8350d8a-7df7-4474-9362-f9cc177e993c"],"hasRelatedMediaFragment_ssim":["6m311q27t"],"hasRelatedImage_ssim":["6m311q27t"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Rectangular Simple Matrix "],"date_uploaded_dtsi":"2019-03-09T13:23:42Z","date_modified_dtsi":"2019-03-09T13:23:42Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Petzoldt, Albrecht","Schmidt, Dieter Sam","Ding, Jintai"],"description_tesim":["Magma programs to chapter 7 pf the book \"Multivariate Public Key Cryptosystems\" by Ding, Petzoldt and Schmidt  using the rectangular simple matrix scheme.\r\n\r\nload \"keygen.txt\" will generate the file public_key.txt and private_key.txt\r\n\r\nload \"encrypt.txt\"; will generate the file \"ciphertexrt.txt\"   by encrypting a randomly generated file\r\n\r\nload \"decrypt.txt\"  will then decrypt that file.\r\n"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["6m311q283","6m311q27t","7h149q96n"],"file_set_ids_ssim":["6m311q283","6m311q27t","7h149q96n"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"RECTANGULAR SIMPLE MATRIX ","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["j38607987"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697124567922769920,"timestamp":"2021-04-15T16:28:32.170Z","score":0.00049999997},{"system_create_dtsi":"2019-03-09T13:14:54Z","system_modified_dtsi":"2019-03-09T13:15:12Z","has_model_ssim":["Document"],"id":"5h73px125","accessControl_ssim":["f09da45a-19ff-4b10-95de-b2d23e5074a5"],"hasRelatedMediaFragment_ssim":["j3860797z"],"hasRelatedImage_ssim":["j3860797z"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Simple Matrix  (ABC scheme)"],"date_uploaded_dtsi":"2019-03-09T13:14:54Z","date_modified_dtsi":"2019-03-09T13:14:54Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Petzoldt, Albrecht","Ding, Jintai"],"description_tesim":["Magma programs to the book \"Multivariate Public Key Cryptosystems\" by Ding, Petzoldt and Schmidt using the simple ABC scheme.\r\n\r\nload \"keygen.txt\";   will generate the public and private keys in the files public_key.txt and private_key.txt\r\n\r\nload \"encrypt.txt\";  will encrypt a randomly generated text and put the result into ciphertext.txt\r\n\r\nload \"decrypt.txt\";   will decrypt that file"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["dn39x266f","j3860797z","h128nf95d"],"file_set_ids_ssim":["dn39x266f","j3860797z","h128nf95d"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SIMPLE MATRIX ABC SCHEME","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["5h73px125"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697100079875227648,"timestamp":"2021-04-15T09:59:18.548Z","score":0.00049999997},{"system_create_dtsi":"2019-03-09T12:57:37Z","system_modified_dtsi":"2019-03-09T13:23:44Z","has_model_ssim":["Document"],"id":"vm40xs59m","accessControl_ssim":["24943604-a34c-49ba-8ec3-521b6863f58f"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Simple Matrix"],"date_uploaded_dtsi":"2019-03-09T12:57:37Z","date_modified_dtsi":"2019-03-09T12:57:37Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Petzoldt, Albrecht","Schmidt, Dieter Sam","Ding, Jintai"],"description_tesim":["Programs to chapter 7 of the book \"Multivariate Public Key Cryptosystems\" by Ding, Petzoldt and Schmidt.\r\n\r\nTwo methods are attached, one for the standard ABC method, the other for the rectangular ABC method"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["5h73px125","j38607987"],"file_set_ids_ssim":["5h73px125","j38607987"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SIMPLE MATRIX","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["vm40xs59m"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697083852569182208,"timestamp":"2021-04-15T05:41:22.983Z","score":0.00049999997},{"system_create_dtsi":"2019-03-09T12:30:49Z","system_modified_dtsi":"2019-03-09T12:31:05Z","has_model_ssim":["Dataset"],"id":"r207tq35f","accessControl_ssim":["e81ace25-e7e1-465f-9841-b42f2f249f66"],"hasRelatedMediaFragment_ssim":["0p096783v"],"hasRelatedImage_ssim":["0p096783v"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Rainbow"],"date_uploaded_dtsi":"2019-03-09T12:30:49Z","date_modified_dtsi":"2019-03-09T12:30:49Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Petzoldt, Albrecht","Schmidt, Dieter Sam","Ding, Jintai"],"description_tesim":["Magma programs to chapter 5 of the book \"Multivariate Public Key Cryptosystems\"  by Ding, Petzoldt and Schmidt.\r\nFor the rainbow cryptosystems\r\nload \"keygen.txt';  will generate the files public_key.txt and private_key.txt, which are then used via\r\n\r\nload \"sign.txt\"; to genertate the signature of a randomly generated document,  and by\r\n\r\nload \"verify.txt\";  to chack that it is a valid signature\r\n"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["0p096783v","6h440t51n","z316q2535"],"file_set_ids_ssim":["0p096783v","6h440t51n","z316q2535"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"RAINBOW","human_readable_type_tesim":["Dataset"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["r207tq35f"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697114446233600000,"timestamp":"2021-04-15T13:47:39.375Z","score":0.00049999997},{"system_create_dtsi":"2019-03-09T12:22:17Z","system_modified_dtsi":"2019-03-09T12:22:33Z","has_model_ssim":["Document"],"id":"1z40kt89p","accessControl_ssim":["67231bd5-a3c5-4536-9dab-7dc7e7736509"],"hasRelatedMediaFragment_ssim":["kh04dq65d"],"hasRelatedImage_ssim":["kh04dq65d"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Unbalanced Oil and Vinegar"],"date_uploaded_dtsi":"2019-03-09T12:22:17Z","date_modified_dtsi":"2019-03-09T12:22:17Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Schmidt, Dieter Sam"],"description_tesim":["Magma programs to chapter 5 of the book \"Multivariate Public Key Cryptosystems\" by Ding, Petzoldt and Schmidt.\r\n\r\nload \"keygen.txt\" ;   wiil generate the files public_key.txt and private_key.txt.\r\n\r\nload \"sign.txt\" ;   will use the file private_key.txt to sign a randomly generated text and will deposit the signture in the file signature.txt\r\n\r\nload \"veryfy.txt\";   will use the file public_key.txt  and determine if the signature is valid.\r\n"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["fn107015p","j9602172k","kh04dq65d"],"file_set_ids_ssim":["fn107015p","j9602172k","kh04dq65d"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"UNBALANCED OIL AND VINEGAR","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["1z40kt89p"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697116904473231360,"timestamp":"2021-04-15T14:26:43.735Z","score":0.00049999997},{"system_create_dtsi":"2019-03-09T12:12:52Z","system_modified_dtsi":"2019-04-03T10:27:38Z","has_model_ssim":["Document"],"id":"0r967485m","accessControl_ssim":["58c24f8e-b1f9-4606-9431-08803d6f8d38"],"hasRelatedMediaFragment_ssim":["3j3333266"],"hasRelatedImage_ssim":["3j3333266"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Balanced Oil and Vinegar"],"date_uploaded_dtsi":"2019-03-09T12:12:52Z","date_modified_dtsi":"2019-04-03T10:27:15Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Schmidt, Dieter Sam"],"description_tesim":["Programs to chapter 5 of book \"Multivariate Public Key Cryptosystems\"  by Ding, Petzoldt and Schmidt\r\n\r\nFor generating the public and private keys use;  load \"keygen.txt\"\r\n\r\nTo sign a (randomly generated) document:  load \"sign.txt\";\r\n\r\nTo verify the signature:   load \"verify.txt\";\r\n\r\nIf the characteristic is odd use:  load \"forge_odd.txt\";   The program uses only the data in public_key.txt   and a randomly generated document and shows that its signature would be accepted.  \r\n\r\n\r\nThe program \"forge_even.txt\" for the case with even characteristic will be added later\r\n"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["r494vm155","3j3333266","k930bz18g","kd17ct990","wm117q18c"],"file_set_ids_ssim":["r494vm155","3j3333266","k930bz18g","kd17ct990","wm117q18c"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"BALANCED OIL AND VINEGAR","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["0r967485m"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697122336679919616,"timestamp":"2021-04-15T15:53:04.291Z","score":0.00049999997},{"system_create_dtsi":"2019-03-08T19:29:25Z","system_modified_dtsi":"2019-03-09T12:30:53Z","has_model_ssim":["Document"],"id":"0k225b94v","accessControl_ssim":["587d5a80-d455-4fa6-8ade-7638c560f932"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["Oil and Vinegar"],"date_uploaded_dtsi":"2019-03-08T19:29:25Z","date_modified_dtsi":"2019-03-08T19:29:25Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Schmidt, Dieter Sam"],"description_tesim":["Magma programs for chapter 5 in the book \"Multivariate Public Key Cryptosystems\" by Ding, Petzoldt and Schmidt"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["r207tq35f","1z40kt89p","0r967485m"],"file_set_ids_ssim":["r207tq35f","1z40kt89p","0r967485m"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"OIL AND VINEGAR","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["0k225b94v"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697073652439187456,"timestamp":"2021-04-15T02:59:15.381Z","score":0.00049999997},{"system_create_dtsi":"2019-03-08T19:24:43Z","system_modified_dtsi":"2019-03-08T19:24:57Z","has_model_ssim":["Document"],"id":"9z903100w","accessControl_ssim":["e6934052-1d82-4b6c-b6d8-432e6a2ab750"],"hasRelatedMediaFragment_ssim":["w0892c067"],"hasRelatedImage_ssim":["w0892c067"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["HFEv   (variants of Hidden Field Equations)"],"date_uploaded_dtsi":"2019-03-08T19:24:43Z","date_modified_dtsi":"2019-03-08T19:24:43Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Schmidt, Dieter Sam"],"description_tesim":["Magma programs for the variants of the Hidden Field Equations. In order to run these programs use \r\n\r\nload \"keygen.txt\";\r\n\r\nload \"encrypt.txt\";\r\n\r\nload \"decrypt.txt\";\r\n\r\nA message is generated at random. Modify the program to use your own message and/or change the parameters in the file keygen.txt"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["qb98mg526","w0892c067","z316q252w"],"file_set_ids_ssim":["qb98mg526","w0892c067","z316q252w"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"HFEV VARIANTS OF HIDDEN FIELD EQUATIONS","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["9z903100w"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697094272835125248,"timestamp":"2021-04-15T08:27:00.523Z","score":0.00049999997},{"system_create_dtsi":"2019-03-08T19:19:09Z","system_modified_dtsi":"2020-08-12T18:06:41Z","has_model_ssim":["Document"],"id":"4m90dw57w","accessControl_ssim":["b0fc3147-7a87-4276-b48d-4cb82298fc38"],"hasRelatedMediaFragment_ssim":["dv13zv81v"],"hasRelatedImage_ssim":["dv13zv81v"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["HFE   (original HFE)"],"date_uploaded_dtsi":"2019-03-08T19:19:09Z","date_modified_dtsi":"2020-08-12T18:06:25Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Schmidt, Dieter Sam"],"description_tesim":["Magma programs for the original Hidden Field Equations by Patarin  To run these programs use \r\n\r\nload \"keygen.txt\";\r\n\r\nload \"encrypt.txt\";\r\n\r\nload \"decrypt.txt\";\r\n\r\nA message is generated at random.  Modify the program to use your own message and/or  change the parameters\r\n"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["3r074w204","x059c8759","dv13zv81v"],"file_set_ids_ssim":["3r074w204","x059c8759","dv13zv81v"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"HFE ORIGINAL HFE","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["4m90dw57w"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697092692588101632,"timestamp":"2021-04-15T08:01:53.482Z","score":0.00049999997},{"system_create_dtsi":"2019-03-08T19:12:53Z","system_modified_dtsi":"2019-03-08T19:24:45Z","has_model_ssim":["Document"],"id":"6t053g89c","accessControl_ssim":["810408fd-338a-4a9a-b2e4-ab9d4d1f51f6"],"depositor_ssim":["schmiddr@ucmail.uc.edu"],"depositor_tesim":["schmiddr@ucmail.uc.edu"],"title_tesim":["HiddenFieldEquations"],"date_uploaded_dtsi":"2019-03-08T19:12:53Z","date_modified_dtsi":"2019-03-08T19:12:53Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Schmidt, Dieter Sam"],"description_tesim":["Magma programs to chapter 4 of the book \"Multivariate Public Key Cryptosystems\" by Ding, Petzoldt and Schmidt\r\n\r\nThere are two attachments one for the original Hidden Field Equations (HFE) and the other for variants of it (HFEv)"],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["4m90dw57w","9z903100w"],"file_set_ids_ssim":["4m90dw57w","9z903100w"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"HIDDENFIELDEQUATIONS","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["schmiddr@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["6t053g89c"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697099270509821952,"timestamp":"2021-04-15T09:46:26.677Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Image","hits":4797,"label":"Image"},{"value":"Dataset","hits":3723,"label":"Dataset"},{"value":"Etd","hits":994,"label":"Etd"},{"value":"Document","hits":979,"label":"Document"},{"value":"Article","hits":963,"label":"Article"},{"value":"Student Work","hits":755,"label":"Student Work"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Snider, Jerry A. (senior collector)","hits":3484,"label":"Snider, Jerry A. (senior collector)"},{"value":"Tepe, Eric (record/image)","hits":3484,"label":"Tepe, Eric (record/image)"},{"value":"Huston, Ron","hits":2344,"label":"Huston, Ron"},{"value":"He, Si (co-collector)","hits":1093,"label":"He, Si (co-collector)"},{"value":"Meyer, David L.","hits":631,"label":"Meyer, David L."},{"value":"Davis, Jack","hits":611,"label":"Davis, Jack"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Kingdom: Plantae","hits":3453,"label":"Kingdom: Plantae"},{"value":"Phylum: Bryophyta","hits":3146,"label":"Phylum: Bryophyta"},{"value":"Class: Bryopsida","hits":2902,"label":"Class: Bryopsida"},{"value":"Biology","hits":2361,"label":"Biology"},{"value":"Order: Hypnales","hits":1190,"label":"Order: Hypnales"},{"value":"Order: Dicranales","hits":369,"label":"Order: Dicranales"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Arts and Sciences","hits":6145,"label":"Arts and Sciences"},{"value":"Engineering and Applied Science","hits":2769,"label":"Engineering and Applied Science"},{"value":"Design, Architecture, Art and Planning","hits":1235,"label":"Design, Architecture, Art and Planning"},{"value":"Other","hits":1070,"label":"Other"},{"value":"Libraries","hits":666,"label":"Libraries"},{"value":"Education, Criminal Justice, and Human Services","hits":541,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Biological Sciences","hits":3503,"label":"Biological Sciences"},{"value":"Mechanical and Materials Engineering","hits":2264,"label":"Mechanical and Materials Engineering"},{"value":"Other","hits":992,"label":"Other"},{"value":"Simpson Center for Urban Futures ","hits":784,"label":"Simpson Center for Urban Futures "},{"value":"Classics","hits":769,"label":"Classics"},{"value":"Romance \u0026 Arabic Languages \u0026 Literat","hits":644,"label":"Romance \u0026 Arabic Languages \u0026 Literat"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":1951,"label":"English"},{"value":"en_US","hits":224,"label":"en_US"},{"value":"English ","hits":145,"label":"English "},{"value":"Russian","hits":34,"label":"Russian"},{"value":"Spanish","hits":24,"label":"Spanish"},{"value":"German","hits":19,"label":"German"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati, Margaret H. Fulford Herbarium (CINC)","hits":3484,"label":"University of Cincinnati, Margaret H. Fulford Herbarium (CINC)"},{"value":"University of Cincinnati","hits":3005,"label":"University of Cincinnati"},{"value":"University of Cincinnati: Romance and Arabic Languages and Literatures","hits":603,"label":"University of Cincinnati: Romance and Arabic Languages and Literatures"},{"value":"University of Cincinnati ","hits":100,"label":"University of Cincinnati "},{"value":"viDEO sAVant","hits":92,"label":"viDEO sAVant"},{"value":"Benjamin Britton","hits":60,"label":"Benjamin Britton"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2017","hits":2305,"label":"2017"},{"value":"","hits":211,"label":""},{"value":"2001-03-31","hits":181,"label":"2001-03-31"},{"value":"2017-10-31","hits":163,"label":"2017-10-31"},{"value":"2001-03-30","hits":156,"label":"2001-03-30"},{"value":"2001-03-29","hits":127,"label":"2001-03-29"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"1r66j250c","hits":3484,"label":"1r66j250c"},{"value":"79407x47z","hits":2123,"label":"79407x47z"},{"value":"05741w32f","hits":341,"label":"05741w32f"},{"value":"bc3871882","hits":225,"label":"bc3871882"},{"value":"x346d4806","hits":219,"label":"x346d4806"},{"value":"bc387z838","hits":189,"label":"bc387z838"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":12573,"label":"Work"},{"value":"Collection","hits":171,"label":"Collection"}],"label":"Generic Type Sim"}],"pages":{"current_page":283,"next_page":284,"prev_page":282,"total_pages":1275,"limit_value":10,"offset_value":2820,"total_count":12744,"first_page?":false,"last_page?":false}}}