http://206.189.178.169:3001/?freshness=All&show=1&q=Cryptology-Background+INR+loc%3Ain Search: Cryptology Background - Zipri.in

Cryptology Background

Debug Information

Array
(
    [meilisearch] => Array
        (
            [url] => https://msin.fadunews.in/indexes/zipri/search
            [http_code] => 200
            [response] => {"hits":[],"query":"Cryptology-Background","processingTimeMs":2,"limit":3,"offset":0,"estimatedTotalHits":0}
            [curl_error] => 
            [parsed] => Array
                (
                    [hits] => Array
                        (
                        )

                    [query] => Cryptology-Background
                    [processingTimeMs] => 2
                    [limit] => 3
                    [offset] => 0
                    [estimatedTotalHits] => 0
                )

        )

    [image_search] => Array
        (
            [url] => http://206.189.178.169:3001/?freshness=All&show=1&q=Cryptology-Background+INR+loc%3Ain
            [http_code] => 200
            [response] => {"name":"cryptology-background inr loc:in","totalEstimatedMatches":247,"nextOffset":120,"currentOffset":0,"value":{"648A3B8A024F551FAF3F515832B3BA6831653543":{"name":"Himachal Family Tour Packages starting at 25000 INR per person","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.XdEa69vvXfQUDVlScS1blAHaEK?pid=Api","datePublished":"2023-10-29T00:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.indiatourismpackage.com/assets/images/backgrounds/inner-image/himachal-family-tour-package.webp","hostPageUrl":"https://www.indiatourismpackage.com/family-tour-package-in-himachal","contentSize":"99264 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.5dd11aebdbef5df4140d5952712d5b94?rik=RqizqCD0VfH68w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3453561386AB3B238515F3FAF155F420A8B3A846","accentColor":"CA4F01"},"5E1BDF79FCFA30807121410014593C7265830006":{"name":"Book Kullu Tour Packages at 10,000 INR","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.XkzvbQXEjdok8Zl3jO9LegHaCU?pid=Api","datePublished":"2023-12-21T23:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.indiatourismpackage.com/assets/images/backgrounds/kullu-tour-packages.webp","hostPageUrl":"https://www.indiatourismpackage.com/kullu-tour-packages","contentSize":"186524 B","width":1600,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.5e4cef6d05c48dda24f199778cef4b7a?rik=5bH9l8%2bvAwgXEg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6000385627C39541001412170803AFCF97FDB1E5","accentColor":"2971A2"},"11DEEDC5A554209F24979507361D14FAF11F620F":{"name":"Book Kufri Tour Packages at Best Deal starting at 9,999 INR","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Zg5O4SA7CbuDp_Gto2y6MAHaCU?pid=Api","datePublished":"2023-10-29T00:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.indiatourismpackage.com/assets/images/backgrounds/kufri-tour-packages.webp","hostPageUrl":"https://www.indiatourismpackage.com/kufri-tour-packages","contentSize":"100082 B","width":1600,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.660e4ee1203b09bb83a7f1ada36cba30?rik=Ee3eXFpFAvlCeQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F026F11FAF41D16370597942F902455A5CDEED11","accentColor":"0872C3"},"F3BDACCB138F7425ED5F515832B3BA6831653543":{"name":"Himachal Family Tour Packages starting at 25000 INR per person","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.cUA138YqLsWXdbckfIO_jQHaE8?pid=Api","datePublished":"2023-10-29T00:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.indiatourismpackage.com/assets/images/backgrounds/inner-image/family-tour-package-in-himachal-highlight.webp","hostPageUrl":"https://www.indiatourismpackage.com/family-tour-package-in-himachal","contentSize":"59262 B","width":600,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.714035dfc62a2ec59775b7247c83bf8d?rik=P9vKvDH4R1Le9Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3453561386AB3B238515F5DE5247F831BCCADB3F","accentColor":"1F486A"},"8FFF4278716F9419AE7169D1C22A88832A9BB886":{"name":"Cryptology","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.k5A6gDIGyYs40hf9DAz9AwHaEn?pid=Api","datePublished":"2023-07-19T13:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://vajiramandravi.com/current-affairs/wp-content/uploads/2025/03/cryptology-768x479.jpg","hostPageUrl":"https://vajiramandravi.com/current-affairs/cryptology/","contentSize":"49457 B","width":768,"height":479,"cDNContentUrl":"https://th.bing.com/th/id/R.93903a803206c98b38d217fd0c0cfd03?rik=%2bP8khxf2SZHqFw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"688BB9A23888A22C1D9617EA9149F6178724FFF8","accentColor":"0B90C0"},"6E5C7491B9DAA18D2A5FB423CD5D0759C76AAA18":{"name":"Un apunte a la Criptografía Cuántica | Meer","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.iNiAyDbo719oEP0FC_KklQHaEK?pid=Api","datePublished":"2018-10-08T16:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://media.meer.com/attachments/8ac5aec8f6f97a724f0184bbd71aaadd9d1806a1/store/fill/1090/613/70f810155d27fc6c4e027c6bd97d018c89687c9a9a871ac9f6e8f0ed5f9a/La-base-de-la-criptografia-consiste-en-cifrar-o-descifrar-mensajes-por-medio-de-una-llave.jpg","hostPageUrl":"https://www.meer.com/es/43903-un-apunte-a-la-criptografia-cuantica","contentSize":"281551 B","width":1090,"height":613,"cDNContentUrl":"https://th.bing.com/th/id/R.88d880c836e8ef5f6810fd050bf2a495?rik=5sVHGZutGtii9Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"81AAA67C9570D5DC324BF5A2D81AAD9B1947C5E6","accentColor":"0282C4"},"B5C307BD35C6796688007F0188D54B85FA452185":{"name":"Cryptography | Insecure Lab","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.FK-tp5swIGIQz9I5CkMvuQHaD4?pid=Api","datePublished":"2019-11-08T20:33:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.insecure.in/images/cover/cryptography.webp","hostPageUrl":"https://www.insecure.in/cryptography","contentSize":"42882 B","width":1200,"height":628,"cDNContentUrl":"https://th.bing.com/th/id/R.14afada79b30206210cfd2390a432fb9?rik=Wzxw21Nsl2aIAA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"581254AF58B45D8810F7008866976C53DB703C5B","accentColor":"C88203"},"DB4E1B213096B4EC53A9EE5D75CCD20DC378A4BF":{"name":"CRYPTOLOGY | IAS GYAN","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.23Ysi_I29Z_9HLM_fSf4RgHaCq?pid=Api","datePublished":"2022-11-28T16:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.iasgyan.in/ig-uploads/images/image02633.png","hostPageUrl":"https://www.iasgyan.in/daily-current-affairs/cryptology","contentSize":"12217 B","width":1265,"height":454,"cDNContentUrl":"https://th.bing.com/th/id/R.db762c8bf236f59ffd1cb33f7d27f846?rik=veSxEgNpS841mg&pid=ImgRaw&r=0","isTransparent":true,"imageId":"FB4A873CD02DCC57D5EE9A35CE4B690312B1E4BD","accentColor":"009E4F"},"03DB45CEDD752128D937FC3F1203931AB42306F6":{"name":"What is Cryptography?","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.aSErGP5dFfwJdg2eUAWpigHaE7?pid=Api","datePublished":"2020-06-15T20:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://content.kaspersky-labs.com/fm/press-releases/d9/d9de508916a1aa74fef26ded2c93a839/processed/what-is-cryptography-1-q75.jpg","hostPageUrl":"https://www.kaspersky.co.in/resource-center/definitions/what-is-cryptography","contentSize":"38129 B","width":670,"height":446,"cDNContentUrl":"https://th.bing.com/th/id/R.69212b18fe5d15fc09760d9e5005a98a?rik=ML1U7N1XEoKdcw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6F60324BA1393021F3CF739D821257DDEC54BD30","accentColor":"337298"},"612B1C184A635A53D4D19DF74DA77CEED5DA84B0":{"name":"Top 8 Strongest Data Encryption Algorithms in Cryptography","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.bX-gzxfQ0qaudrPs5zwymQHaEj?pid=Api","datePublished":"2020-01-21T10:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://acodez.in/wp-content/uploads/2020/01/how-encryption-works-symmetric-encryption.png","hostPageUrl":"https://acodez.in/data-encryption-algorithms/","contentSize":"67377 B","width":664,"height":408,"cDNContentUrl":"https://th.bing.com/th/id/R.6d7fa0cf17d0d2a6ae76b3ece73c3299?rik=FrLBgaQ2pTVNHQ&pid=ImgRaw&r=0","isTransparent":true,"imageId":"0B48AD5DEEC77AD47FD91D4D35A536A481C1B216","accentColor":"BE550D"},"2970BD9FAD1EEE581FDF24D692FFA06B39776E7F":{"name":"Research Areas","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.r_Ap5NiKvwiJVWcNpjyLnwAAAA?pid=Api","datePublished":"2022-08-22T11:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://crraoaimscs.in/images/2_Cryptography_and_cryptanalysis.png","hostPageUrl":"https://crraoaimscs.in/research-areas.php","contentSize":"341413 B","width":474,"height":355,"cDNContentUrl":"https://th.bing.com/th/id/R.aff029e4d88abf088955670da63c8b9f?rik=kgfb%2bdrh7oXx%2fQ&pid=ImgRaw&r=0","isTransparent":true,"imageId":"F7E67793B60AFF296D42FDF185EEE1DAF9DB0792","accentColor":"0BB5C0"},"65F895BB9A495CE487B04DE2FA79B15986A584AA":{"name":"Century-Old Cryptography Technique With 'Perfect Secrecy' Inspires The ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.sQ48hOvuhUoUq30RXAtrUgHaEe?pid=Api","datePublished":"2019-12-23T09:27:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://sm.mashable.com/mashable_in/seo/default/century-old-cryptography-technique-with-perfect-secrecy-insp_dmd8.jpg","hostPageUrl":"https://in.mashable.com/tech/9733/century-old-cryptography-technique-with-perfect-secrecy-inspires-the-most-secure-chip","contentSize":"717687 B","width":2100,"height":1268,"cDNContentUrl":"https://th.bing.com/th/id/R.b10e3c84ebee854a14ab7d115c0b6b52?rik=Vo9Zu6mUxU54Cw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AA485A68951B97AF2ED40B784EC594A9BB598F56","accentColor":"0583C6"},"DED2F32CA13F921F995D42E874BC3610869A32AE":{"name":"A Novel Secure End-to-End IoT Communication Scheme Using Lightweight ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Ctxz9LR23pIGm_2CdbtY4QHaEI?pid=Api","datePublished":"2022-09-01T15:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/applsci/applsci-12-08817/article_deploy/html/images/applsci-12-08817-g002.png?1662348680","hostPageUrl":"https://www.mdpi.com/2076-3417/12/17/8817","contentSize":"438575 B","width":3230,"height":1805,"cDNContentUrl":"https://th.bing.com/th/id/R.0adc73f4b476de92069bfd8275bb58e1?rik=7S0%2fwhrzKfGZ1Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EA23A9680163CB478E24D599F129F31AC23F2DED","accentColor":"01B04E"},"5BC80EB8ECF4090210E5F20370B7FF341BE4617A":{"name":"Beginner Guide to Classic Cryptography","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.d1x-bYAvpEqfqv6xjWTL7AHaDH?pid=Api","datePublished":"2017-11-03T16:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://1.bp.blogspot.com/--a4AsaCmxwk/WfyheTdApJI/AAAAAAAASO4/aTMlohWjsDsokNpRn6qD63WNFRSF8AsZgCEwYBhgL/s1600/0.png","hostPageUrl":"https://www.hackingarticles.in/beginner-guide-classic-cryptography/","contentSize":"32136 B","width":651,"height":274,"cDNContentUrl":"https://th.bing.com/th/id/R.775c7e6d802fa44a9faafeb18d64cbec?rik=tYzgi85PkCABXg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A7164EB143FF7B07302F5E0120904FCE8BE08CB5","accentColor":"BFAC0C"},"CD3282C252656364B7E7ACFC1F90F8AA6B71A058":{"name":"National Workshop on Cryptology 2025","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.SBOqGjoNg75E-imteNunBQHaG9?pid=Api","datePublished":"2025-11-16T09:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://events.iitbhilai.ac.in/nwc/assets/gm-Kk_ePBbu.jpeg","hostPageUrl":"https://events.iitbhilai.ac.in/nwc/","contentSize":"338787 B","width":1600,"height":1503,"cDNContentUrl":"https://th.bing.com/th/id/R.4813aa1a3a0d83be44fa29ad78dba705?rik=3CMoLCVWNkZ7fg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"850A17B6AA8F09F1CFCA7E7B463656252C2823DC","accentColor":"852E2D"},"F83504E20E8090B34B8B21CF1CF96821A5DC14E7":{"name":"Cryptography Services at Zettawise | Zettawise Consulting Services","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.8t15MDQoSz5gTV_JfISOSwHaJC?pid=Api","datePublished":"2025-08-12T16:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://zettawise.in/upload/cryptology-service-zettawise.jpg","hostPageUrl":"https://zettawise.in/cryptography.php","contentSize":"631303 B","width":2633,"height":3212,"cDNContentUrl":"https://th.bing.com/th/id/R.f2dd793034284b3e604d5fc97c848e4b?rik=j1NALuAICTu0uA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7E41CD5A12869FC1FC12B8B43B0908E02E40538F","accentColor":"4F4F4F"},"13FB2929F51F15A542557414B578C547FB2C4E44":{"name":"Cryptology Research Society of India","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.R59WnbXkrjnruCW-mtGzxwHaKe?pid=Api","datePublished":"2018-01-08T20:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://crsind.in/crsind-content/uploads/2024/07/ISCISC2024.jpg","hostPageUrl":"https://crsind.in/","contentSize":"1941583 B","width":1578,"height":2231,"cDNContentUrl":"https://th.bing.com/th/id/R.479f569db5e4ae39ebb825be9ad1b3c7?rik=Mb%2bSkl%2fxUVokVQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"44E4C2BF745C875B414755245A51F15F9292BF31","accentColor":"1485B7"},"7A8AF763C0E360773F1AD7BFC11EC373AE7C8797":{"name":"Cryptography Cheat Sheet for 2025","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.RUJjMM073oUXe4OrS-2chAHaD4?pid=Api","datePublished":"2023-08-19T09:01:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.insecure.in/images/cover/cryptography-cheat-sheet.webp","hostPageUrl":"https://www.insecure.in/cryptography-cheat-sheet","contentSize":"28968 B","width":1200,"height":628,"cDNContentUrl":"https://th.bing.com/th/id/R.45426330cd3bde85177b83ab4bed9c84?rik=p6h%2fNgw%2bBnfzoQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7978C7EA373CE11CFB7DA1F377063E0C367FA8A7","accentColor":"CB4500"},"25177186C2D19F46188A581751C4B90D1880A943":{"name":"Buy Cryptology and Network Security with Machine Learning: Proceedings ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.0pcpIC_DGdqy9jxkIdN5kwAAAA?pid=Api","datePublished":"2023-04-28T00:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/4128lbVHe-L._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Cryptology-Network-Security-Machine-Learning/dp/9819922283","contentSize":"21953 B","width":295,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.d29729202fc319dab2f63c6421d37993?rik=UnEXaCwd%2bWSBqA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"349A0881D09B4C157185A88164F91D2C68177152","accentColor":"B93112"},"871ED834FA2E343C4E1E245FB066C58AEA8A0363":{"name":"Mastering Blockchain: Inner workings of blockchain, from cryptography ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.uJFGfZBtza8ASzm-xuiVywHaJI?pid=Api","datePublished":"2022-09-05T21:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/81RkhtwQcPL._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/Mastering-Blockchain-technical-blockchain-cryptography-ebook/dp/B0B4P2VC76","contentSize":"147022 B","width":1216,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.b891467d906dcdaf004b39bec6e895cb?rik=eOGNQ6%2fiQ8Pk4Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3630A8AEA85C660BF542E1E4C343E2AF438DE178","accentColor":"BA4011"},"15616739B9082363FDE2E1BF7D99E71520E6B124":{"name":"International Conference on Cryptology and Cybersecurity - 2020 ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.yjz8Gqt_e_30gzs5dBmH7wHaEM?pid=Api","datePublished":"2025-03-25T09:36:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.n-coe.in/sites/default/files/2025-03/international-conference-on-cryptology-and-cybersecurity-2020.png","hostPageUrl":"https://www.n-coe.in/events/international-conference-cryptology-and-cybersecurity-2020","contentSize":"85964 B","width":960,"height":544,"cDNContentUrl":"https://th.bing.com/th/id/R.ca3cfc1aab7f7bfdf4833b39741987ef?rik=URZ2k5uAMjbfLg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"421B6E02517E99D7FB1E2EDF3632809B93761651","accentColor":"931AB1"},"B9A75B58540A6440FC43CB9C3E44A61A1AB52392":{"name":"What is Cryptography - What is Cryptography Definition: Cryptography is ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.gwCBAyUS5i1xHkhL8tseMQHaJl?pid=Api","datePublished":"2022-09-18T12:27:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/3545159973a45af60704f4f5f80c7938/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/university-of-calicut/mathematics/what-is-cryptography/30785795","contentSize":"159501 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.830081032512e62d711e484bf2db1e31?rik=m3q1hUWgRgTPNA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"29325BA1A16A44E3C9BC34CF0446A04585B57A9B","accentColor":"434343"},"BD91253D3B4F7A97CAB3C14D3BCDE4B36BEEEF4D":{"name":"Buy Advances in Cryptology – ASIACRYPT 2020 Book Online at Low Prices ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.F_xSReTL_pwmjPotdHt4_gAAAA?pid=Api","datePublished":"2024-10-04T07:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41mJjKS7ypL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Advances-Cryptology-Huaxiong-Shiho-Moriai/dp/3030648370","contentSize":"13843 B","width":294,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.17fc5245e4cbfe9c268cfa2d747b78fe?rik=2xlS07P0p3msOw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D4FEEEB63B4EDCB3D41C3BAC79A7F4B3D35219DB","accentColor":"690309"},"1D8E139AAF995D6D4CE8ACFC1F90F8AA6B71A058":{"name":"National Workshop on Cryptology 2025","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.m3iSBAxA5kYWLlHeuuWTzQHaHa?pid=Api","datePublished":"2025-11-16T09:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://events.iitbhilai.ac.in/nwc/assets/nc-DBba_zbK.jpeg","hostPageUrl":"https://events.iitbhilai.ac.in/nwc/","contentSize":"64558 B","width":592,"height":592,"cDNContentUrl":"https://th.bing.com/th/id/R.9b7892040c40e646162e51debae593cd?rik=0egxqfqZ1dbEjg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"850A17B6AA8F09F1CFCA8EC4D6D599FAA931E8D1","accentColor":"B6152C"},"B86DDC175584D2E437A4B3DDA040D4598DFD3121":{"name":"Cryptography - Free security icons","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Klyi4Va_5oF7qwUK6Bdr2AHaHa?pid=Api","datePublished":"2022-11-17T11:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn-icons-png.flaticon.com/512/8948/8948693.png","hostPageUrl":"https://www.flaticon.com/free-icon/cryptography_8948693","contentSize":"37375 B","width":512,"height":512,"cDNContentUrl":"https://th.bing.com/th/id/R.2a5ca2e156bfe6817bab050ae8176bd8?rik=i9bNcVVILU5zSg&pid=ImgRaw&r=0","isTransparent":true,"imageId":"1213DFD8954D040ADD3B4A734E2D485571CDD68B","accentColor":"0C6DBF"},"13A7D2474C4164CF50F3C476AA0162B95F8B938E":{"name":"Buy Codes, Cryptology and Information Security Book Online at Low ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.vubNZxaEFvc619TtTodIfwAAAA?pid=Api","datePublished":"2025-03-11T01:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/21JxKId51CL.jpg","hostPageUrl":"https://www.amazon.in/Cryptology-Information-Security-Abderrahmane-Mamoun/dp/3319555898","contentSize":"5675 B","width":182,"height":277,"cDNContentUrl":"https://th.bing.com/th/id/R.bee6cd67168416f73ad7d4ed4e87487f?rik=MXotdMQURvwFPw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E839B8F59B2610AA674C3F05FC4614C4742D7A31","accentColor":"AE102F"},"98A906B14DEEE18029421BAA8AEA7DBCF8889C9F":{"name":"Индикаторы и полезные материалы Cryptology — Teletype","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.ES0zuUiBxZclPYV22_fzKQHaCs?pid=Api","datePublished":"2022-08-27T08:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img1.teletype.in/files/4e/2e/4e2ecb34-74a5-4172-9775-94377cc58a83.png","hostPageUrl":"https://teletype.in/@cryptologykey/cryptology-indicators","contentSize":"670436 B","width":1918,"height":696,"cDNContentUrl":"https://th.bing.com/th/id/R.112d33b94881c597253d8576dbf7f329?rik=iZpgG9TuHgiSJA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F9C9888FCBD7AEA8AAB12492081EEED41B609A89","accentColor":"B75B14"},"D4E67A1FE983AA7DA9C2CA3077C395EA367D6D06":{"name":"Cybersecurity Trends: Emerging Threats and Technologies in the ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.Blr_tWM0JCEWIdvYnTOjgAHaE7?pid=Api","datePublished":"2023-12-09T17:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://prod.ifacet.in/images/uploads/Introduction-to-Cryptography-for-Beginners.jpg","hostPageUrl":"https://www.eicta.iitk.ac.in/knowledge-hub/cyber-security/cybersecurity-trends-emerging-threats-and-technologies-in-the-cybersecurity-landscape","contentSize":"48430 B","width":640,"height":426,"cDNContentUrl":"https://th.bing.com/th/id/R.065affb5633424211621dbd89d33a380?rik=TW6n8Z44qteaLA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"60D6D763AE593C7703AC2C9AD7AA389EF1A76E4D","accentColor":"1D92AE"},"F0A3451B8ECE907A216FB0C80EF2CF0FC9783A73":{"name":"Groups, Complexity, Cryptology Walter de Gruyter Journal Impact Factor ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.UeXUMtTeCHtfUmwVJa8KbQHaDI?pid=Api","datePublished":"2022-04-22T18:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/journals/groups-complexity-cryptology.jpg","hostPageUrl":"https://slogix.in/research/journals/groups-complexity-cryptology/","contentSize":"17160 B","width":850,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.51e5d432d4de087b5f526c1525af0a6d?rik=DzpUsejsCacS9g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"37A3879CF0FC2FE08C0BF612A709ECE8B1543A0F","accentColor":"161847"},"F34E5A237199113DE4431122686470808BFF824E":{"name":"Journal of Mathematical Cryptology Walter de Gruyter Impact Factor | S ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.eO7PAeOs2siqTPMkYimRHgHaDI?pid=Api","datePublished":"2022-04-22T18:46:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/journals/journal-of-mathematical-cryptology.jpg","hostPageUrl":"https://slogix.in/research/journals/journal-of-mathematical-cryptology/","contentSize":"32816 B","width":850,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.78eecf01e3acdac8aa4cf3246229911e?rik=P%2bSlMheZEdNONA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E428FFB8080746862211344ED311991732A5E43F","accentColor":"0B2777"},"7B25DE65CDFED97758E7D452AEA388D681384A2E":{"name":"Buy Information Theory, Coding and Cryptography Book Online at Low ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.hkQzTIED1OKVO-0UlWKblQAAAA?pid=Api","datePublished":"2008-04-25T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/51moK3xsktL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Information-Theory-Coding-Cryptography-Ranjan/dp/0070669015","contentSize":"17438 B","width":339,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.8644334c8103d4e2953bed1495629b95?rik=t1LtVtzvnXeFfg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E2A483186D883AEA254D7E85779DEFDC56ED52B7","accentColor":"BA5411"},"9E9C62D1D463FF9F6378FDC9B206E1E1B9B15C20":{"name":"CB3491 CCS unit 1,2,4 - Cryptography and Cyber Security two mark ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.q3hvC7eKbnVJsEfIWojpQAHaFO?pid=Api","datePublished":"2023-11-06T02:51:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/5e9c2cf93290550524e05b508cb5ece7/thumb_1200_848.webp","hostPageUrl":"https://www.studocu.com/in/document/anna-university/cryptography-and-cybersecurity/cb3491-ccs-unit-124-cryptography-and-cyber-security-two-mark-question-and-answers/75058985","contentSize":"170642 B","width":1200,"height":848,"cDNContentUrl":"https://th.bing.com/th/id/R.ab786f0bb78a6e7549b047c85a88e940?rik=6ckmHU02%2f%2fk2hw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"02C51B9B1E1E602B9CDF8736F9FF364D1D26C9E9","accentColor":"5D423F"},"A3F11B95E887E348732171439F9BA3E8D96C0854":{"name":"Indocrypt 2024","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.rktX2TCt07K0-eML6CBK6wAAAA?pid=Api","datePublished":"2024-03-07T16:02:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://setsindia.in/indocrypt2024/indocrypt2024/crsi_small.png","hostPageUrl":"https://setsindia.in/indocrypt2024/indocrypt","contentSize":"233645 B","width":400,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.ae4b57d930add3b2b4f9e30be8204aeb?rik=Oh%2bxWY54PoQ3Eg&pid=ImgRaw&r=0","isTransparent":true,"imageId":"4580C69D8E3AB9F934171237843E788E59B11F3A","accentColor":"AD241E"},"0926449C620D6D64A9FD1BAA8AEA7DBCF8889C9F":{"name":"Индикаторы и полезные материалы Cryptology — Teletype","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.qEZY2wwWG5rI5TyoNCR3WgHaD4?pid=Api","datePublished":"2022-08-27T08:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img2.teletype.in/files/17/9d/179d7499-2077-4ab5-ac91-a1eec04b8fb5.png","hostPageUrl":"https://teletype.in/@cryptologykey/cryptology-indicators","contentSize":"114139 B","width":1200,"height":630,"cDNContentUrl":"https://th.bing.com/th/id/R.a84658db0c161b9ac8e53ca83424775a?rik=kGJEySbQ1kaa3w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F9C9888FCBD7AEA8AAB1DF9A46D6D026C9446290","accentColor":"CC0000"},"05D8C6BE9FE064EDD8239DF74DA77CEED5DA84B0":{"name":"Top 8 Strongest Data Encryption Algorithms in Cryptography","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP._AmD9FmXegNtZ92-ASX9kAHaED?pid=Api","datePublished":"2020-01-21T10:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://acodez.in/wp-content/uploads/2020/01/Asymmetric-Encryption.png","hostPageUrl":"https://acodez.in/data-encryption-algorithms/","contentSize":"42146 B","width":796,"height":435,"cDNContentUrl":"https://th.bing.com/th/id/R.fc0983f459977a036d67ddbe0125fd90?rik=UI1s6%2fkORt6NMg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0B48AD5DEEC77AD47FD9328DDE460EF9EB6C8D50","accentColor":"264D7F"},"BF93AFA5123DF8C8FC0CCFF25D662F8C367741F2":{"name":"@cryptology_01 — Teletype","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.oEZwB-6CYddlJfhPI1oEsgHaD4?pid=Api","datePublished":"2022-10-18T08:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img1.teletype.in/files/42/31/423133c0-ad69-45fd-846b-90727169d766.png","hostPageUrl":"https://teletype.in/@cryptology_01","contentSize":"25103 B","width":1200,"height":630,"cDNContentUrl":"https://th.bing.com/th/id/R.a0467007ee8261d76525f84f235a04b2?rik=%2bzn6WiHTj4zPwA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2F147763C8F266D52FFCC0CF8C8FD3215AFA39FB","accentColor":"272724"},"D174F4BEFEDFAC5BBCA6A2ABFBCEAAC9FE092868":{"name":"Buy Identity-based Cryptography: v. 2 (Cryptology and Information ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.uWJELQdJih-JhlfUyFWxMQAAAA?pid=Api","datePublished":"2020-10-06T00:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41aQwdRZCeL.jpg","hostPageUrl":"https://www.amazon.in/Identity-based-Cryptography-Cryptology-Information-Security/dp/1586039474","contentSize":"26940 B","width":345,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.b962442d07498a1f898657d4c855b131?rik=HUdP6%2b%2f9yrXLag&pid=ImgRaw&r=0","isTransparent":false,"imageId":"868290EF9CAAECBFBA2A6ACBB5CAFDEFEB4F471D","accentColor":"00A2B8"},"F747A62828B9CB41470323F31190A646A2E28445":{"name":"Cryptology — Teletype","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.G2RC7tPiOSbElGdq9HG0PQHaEK?pid=Api","datePublished":"2021-12-15T02:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://telegra.ph/file/b26d0d6385457a20bef07.png","hostPageUrl":"https://teletype.in/@cryptologykey","contentSize":"1072931 B","width":1920,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.1b6442eed3e23926c494676af471b43d?rik=f3RqgoKbvBR0MA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"54482E2A646A09113F32307414BC9B82826A747F","accentColor":"09C24E"},"0CD62573FA7E2CE7C40DACFC1F90F8AA6B71A058":{"name":"National Workshop on Cryptology 2025","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.aPmuxwJxAvdpvYOvWwXsNwHaHa?pid=Api","datePublished":"2025-11-16T09:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://events.iitbhilai.ac.in/nwc/assets/paul-oToXYMQt.png","hostPageUrl":"https://events.iitbhilai.ac.in/nwc/","contentSize":"317709 B","width":512,"height":512,"cDNContentUrl":"https://th.bing.com/th/id/R.68f9aec7027102f769bd83af5b05ec37?rik=wG1SN6%2fnwn5M0A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"850A17B6AA8F09F1CFCAD04C7EC2E7AF37526DC0","accentColor":"376194"},"BEEE814F2745A5F5AE1D433AB72D619233FC01F4":{"name":"NATIONAL CRYPTOLOGIC MUSEUM (2024) All You Need to Know BEFORE You Go ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.51_D35vugI8ow5DjNK-nOgHaEH?pid=Api","datePublished":"2022-12-08T17:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://dynamic-media-cdn.tripadvisor.com/media/photo-o/07/be/b8/73/national-cryptologic.jpg?w=1800&h=1000&s=1","hostPageUrl":"https://www.tripadvisor.in/Attraction_Review-g29495-d117071-Reviews-National_Cryptologic_Museum-Annapolis_Junction_Maryland.html","contentSize":"396377 B","width":1800,"height":1000,"cDNContentUrl":"https://th.bing.com/th/id/R.e75fc3df9bee808f28c390e334afa73a?rik=6%2b4Y9HJUWl%2fq0Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4F10CF332916D27BA334D1EA5F5A5472F418EEEB","accentColor":"43651D"},"C9143A573C4A5393FC41433AB72D619233FC01F4":{"name":"NATIONAL CRYPTOLOGIC MUSEUM (2026) All You Need to Know BEFORE You Go ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.6bsUyTqDZKBZPuD8_R6KFwHaEO?pid=Api","datePublished":"2022-12-08T17:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://dynamic-media-cdn.tripadvisor.com/media/photo-o/0c/6a/a7/a1/photo0jpg.jpg?w=1400&h=800&s=1","hostPageUrl":"https://www.tripadvisor.in/Attraction_Review-g29495-d117071-Reviews-National_Cryptologic_Museum-Annapolis_Junction_Maryland.html","contentSize":"215696 B","width":1400,"height":800,"cDNContentUrl":"https://th.bing.com/th/id/R.e9bb14c93a8364a0593ee0fcfd1e8a17?rik=nEGjdcOkNTnPFA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4F10CF332916D27BA33414CF3935A4C375A3419C","accentColor":"99323E"},"EEF540DEC0D47D562DF9ECC16BE2E7FBA7C4B03C":{"name":"NIWC-2023","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.rwqdL7Vqh3gdTtJTaZZ4_QHaCx?pid=Api","datePublished":"2023-05-13T15:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://conferences.iitbhu.ac.in/NIWC2023/Background.jpg","hostPageUrl":"https://conferences.iitbhu.ac.in/NIWC2023/","contentSize":"146448 B","width":800,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.af0a9d2fb56a87781d4ed253699678fd?rik=7l8E7QxN12XSnw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C30B4C7ABF7E2EB61CCE9FD265D74D0CED045FEE","accentColor":"AC5C1F"},"E7DB0AB84EA8BF2872FDCFC7FDF1CA4D349757BA":{"name":"National Workshop on Cryptology 2025","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.RODBF2-WZolVPQGtxkl-pQHaJ4?pid=Api","datePublished":"2025-11-20T10:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://events.iitbhilai.ac.in/nwc/assets/sahiba-SH3dATOH.jpeg","hostPageUrl":"https://events.iitbhilai.ac.in/nwc/submission-of-poster","contentSize":"385230 B","width":1200,"height":1600,"cDNContentUrl":"https://th.bing.com/th/id/R.44e0c1176f966689553d01adc6497ea5?rik=fr2gi%2bSK%2b4In3w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AB757943D4AC1FDF7CFCDF2782FB8AE48BA0BD7E","accentColor":"AE1D3B"},"EFEE4FEBF8CB6DED547B85CB5D4B779F5BB8A37C":{"name":"Cryptographyandnetworksecurity - CRYPTOGRAPHY AND NETWORK SECURITY BCS ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.eYsJm_KFG9kC89QCKaM20wHaKe?pid=Api","datePublished":"2022-06-19T19:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/e4df71c2679c72e87126782fbbef7c73/thumb_1200_1698.png","hostPageUrl":"https://www.studocu.com/in/document/mahatma-gandhi-university/computer-science/cryptographyandnetworksecurity/24203273","contentSize":"210849 B","width":1200,"height":1698,"cDNContentUrl":"https://th.bing.com/th/id/R.798b099bf2851bd902f3d40229a336d3?rik=%2fu70vo%2b81t5Ftw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C73A8BB5F977B4D5BC58B745DED6BC8FBEF4EEFE","accentColor":"474747"},"22A4FBC305975805F1DF5740CCD0A76D90E631FD":{"name":"Leading Research Books for Introduction to Modern Cryptography | S-Logix","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.knN6W3QEtu9yOEOpj_rmPQHaDN?pid=Api","datePublished":"2022-08-10T22:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/network-security/introduction-to-modern-cryptography-second-edition.jpg","hostPageUrl":"https://slogix.in/network-security/introduction-to-modern-cryptography-second-edition/","contentSize":"54935 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.92737a5b7404b6ef723843a98ffae63d?rik=Ikq%2fPFB5hVAf%2fQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DF136E09D67A0DCC0475FD1F508579503CBF4A22","accentColor":"004B95"},"8242249A2F598EB78B1866E823048BEBB39DEA4E":{"name":"Applied Cryptography LAB - APPLIED CRYPTOGRAPHY LAB B. III Year I Sem L ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.muVc-QreCWfj3VOo4tNchwHaKe?pid=Api","datePublished":"2022-08-24T14:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/f4ac81507778edc9f12989b2b3a7ad3d/thumb_1200_1698.png","hostPageUrl":"https://www.studocu.com/in/document/jawaharlal-nehru-technological-university-hyderabad/computer-science-and-engineering/applied-cryptography-lab/31336481","contentSize":"279906 B","width":1200,"height":1698,"cDNContentUrl":"https://th.bing.com/th/id/R.9ae55cf90ade0967e3dd53a8e2d35c87?rik=KCRCqfKV6Hu4gQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E4AED93BBEB840328E6681B87BE895F2A9422428","accentColor":"3C3C3C"},"48332C95F64621EB4121ACFC1F90F8AA6B71A058":{"name":"National Workshop on Cryptology 2025","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.H1kUNxvViPQezqyrrXHmKQAAAA?pid=Api","datePublished":"2025-11-16T09:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://events.iitbhilai.ac.in/nwc/assets/avijit-Btj2t7lj.jpg","hostPageUrl":"https://events.iitbhilai.ac.in/nwc/","contentSize":"57629 B","width":400,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.1f5914371bd588f41eceacabad71e629?rik=hDPCWW9kEr4UEg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"850A17B6AA8F09F1CFCA1214BE12646F59C23384","accentColor":"436D1C"},"8B23C0E53746945DCB2A8B5A3B36A87D7D1FC071":{"name":"Quantum Time Bomb: When Encryption Stops Working","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.WO-3aYZCYPMEsVbpnLKEywHaDe?pid=Api","datePublished":"2025-06-08T23:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.securew2.com/wp-content/uploads/2024/01/RSA-Encryption-Works.png","hostPageUrl":"https://blog.acmvit.in/quantum-timebomb","contentSize":"25372 B","width":812,"height":381,"cDNContentUrl":"https://th.bing.com/th/id/R.58efb769864260f304b156e99cb284cb?rik=uDIMXnNkSdW8og&pid=ImgRaw&r=0","isTransparent":false,"imageId":"170CF1D7D78A63B3A5B8A2BCD54964735E0C32B8","accentColor":"BE850D"},"2A54DF5B73C0C732448E1D9A6133A2FF91AC6A4A":{"name":"What is a cryptologic Token - Blockchain technology has immense ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.qJJzglAKRn4suut93Qrx9gHaJl?pid=Api","datePublished":"2022-09-10T22:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/a1afff865372ed920b8e84c9d6865c15/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/indian-institute-of-technology-kharagpur/computer-networks/what-is-a-cryptologic-token/27702351","contentSize":"156315 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.a8927382500a467e2cbaeb7ddd0af1f6?rik=okX9tTcMfCNE6A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A4A6CA19FF2A3316A9D1E844237C0C37B5FD45A2","accentColor":"393939"},"405E6291E252B3C53814CE3DD4E8AD7D446F5803":{"name":"Information Security and Cryptology - ICISC 2021: Buy Information ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.dnwx2lf7NcXp75mgs76AIAAAAA?pid=Api","datePublished":"2023-07-01T07:44:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://rukmini1.flixcart.com/image/300/300/l5ld8y80/book/g/g/j/information-security-and-cryptology-icisc-2021-original-imagg84ugh5yfcgm.jpeg","hostPageUrl":"https://www.flipkart.com/information-security-cryptology-icisc-2021/p/itmc53e87adad0e1","contentSize":"9673 B","width":198,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.767c31da57fb35c5e9ef99a0b3be8020?rik=BOUmGS4lO1yDQQ&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fl5ld8y80%2fbook%2fg%2fg%2fj%2finformation-security-and-cryptology-icisc-2021-original-imagg84ugh5yfcgm.jpeg&ehk=CzekqTjYMlzN4l26v9aqkvmGoRNH2aZ6jq%2fcO0rO5kU%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3085F644D7DA8E4DD3EC41835C3B252E1926E504","accentColor":"AC1130"},"B2B9A53C87C497F944C612AD5894FCFC3E0E5E1C":{"name":"Layers 0, 1, 2, 3 — Teletype","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.LCOYiOVus-sO7shOws0_lgHaHE?pid=Api","datePublished":"2022-05-27T01:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img4.teletype.in/files/fc/65/fc6551e5-fb6a-4a16-9d78-3139c332cdd3.png","hostPageUrl":"https://teletype.in/@cryptologykey/layers","contentSize":"97855 B","width":700,"height":668,"cDNContentUrl":"https://th.bing.com/th/id/R.2c239888e56eb3eb0eeec84ec2cd3f96?rik=K5taw3hMeZ9EbA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C1E5E0E3CFCF4985DA216C449F794C78C35A9B2B","accentColor":"C60516"},"AC86C63F33878DEA3732F68B1C8C703C25730376":{"name":"Cryptography","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.C8CmP9OA8yW2npgGOSeFpAAAAA?pid=Api","datePublished":"2024-12-18T04:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://isea.gov.in/assets/img/thematic-areas/62.png","hostPageUrl":"https://isea.gov.in/crypto/","contentSize":"7497 B","width":144,"height":144,"cDNContentUrl":"https://th.bing.com/th/id/R.0bc0a63fd380f325b69e9806392785a4?rik=ymhs8zN42K5zIw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"67303752C307C8C1B86F2373AED87833F36C68CA","accentColor":"663299"},"72812F13A311B457B92B72F636CA6F910A4E96A5":{"name":"Cryptography - Study thoroughly - Cryptography Plaintext: An original ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.xSBgRZ_y_tl1EDFx2QOEfQHaJl?pid=Api","datePublished":"2022-11-19T05:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/54770bae8b40cb3a73eebbe446d18685/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/manipur-university/computer-network-security/cryptography-study-thoroughly/35863327","contentSize":"453327 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.c52060459ff2fed975103171d903847d?rik=JxjyMToRS3Wbsg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5A69E4A019F6AC636F27B29B754B113A31F21827","accentColor":"CC0000"},"74F8F4B66F0BB56F92706710BB0AE0DAD654BE1C":{"name":"Buy Introduction to Cryptography Book Online at Low Prices in India ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.V0iFk0_-yJsonPsfpGPo_QHaLL?pid=Api","datePublished":"2021-04-19T00:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/71PlcOrjjlL._SL1248_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Cryptography-Sahadeo-Padhye/dp/0367781018","contentSize":"238106 B","width":827,"height":1248,"cDNContentUrl":"https://th.bing.com/th/id/R.574885934ffec89b289cfb1fa463e8fd?rik=R49Pa%2fawW%2fYpBw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C1EB456DAD0EA0BB01760729F65BB0F66B4F8F47","accentColor":"ABA620"},"5155B4A981B7A433573BDCACD06CC9ED0877C11D":{"name":"C-DoT organises 3-day National Workshop on Cryptology, Government News ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.SC6gYeS_6bthOt4kg4DYHQHaEu?pid=Api","datePublished":"2022-11-25T03:05:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://etimg.etb2bimg.com/thumb/msid-95753005,imgsize-9086,width-1200,height=765,overlay-etgovernment/news/technology/c-dot-organises-3-day-national-workshop-on-cryptology.jpg","hostPageUrl":"https://government.economictimes.indiatimes.com/news/technology/c-dot-organises-3-day-national-workshop-on-cryptology/95753005","contentSize":"62865 B","width":1200,"height":765,"cDNContentUrl":"https://th.bing.com/th/id/R.482ea061e4bfe9bb613ade248380d81d?rik=FVVLmhh7SjN1sw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D11C7780DE9CC60DCACDB375334A7B189A4B5515","accentColor":"505A3B"},"6BB5CA246A89CE1EF1EACFC7FDF1CA4D349757BA":{"name":"National Workshop on Cryptology 2025","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.OboLAn6UzPhW7DwqvrTTeAAAAA?pid=Api","datePublished":"2025-11-20T10:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://events.iitbhilai.ac.in/nwc/assets/shiman-BL_hqhGf.png","hostPageUrl":"https://events.iitbhilai.ac.in/nwc/submission-of-poster","contentSize":"168363 B","width":473,"height":423,"cDNContentUrl":"https://th.bing.com/th/id/R.39ba0b027e94ccf856ec3c2abeb4d378?rik=tlusQqaY7OEfrg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AB757943D4AC1FDF7CFCAE1FE1EC98A642AC5BB6","accentColor":"102014"},"160CB514763B4C1DAD4BB51DB240A40B2D308C65":{"name":"Cryptology School. Cryptology 8.0 base+advanced+pro. 2023. Слив курса ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.CEm5H7RigUlusburLOmO8gHaD4?pid=Api","datePublished":"2023-09-13T08:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img3.teletype.in/files/e0/18/e018914a-d0ac-4f3b-8d37-4f9ce0a1cc0e.png","hostPageUrl":"https://teletype.in/@kursisliv/3dlPXmvTkJy","contentSize":"52198 B","width":1200,"height":630,"cDNContentUrl":"https://th.bing.com/th/id/R.0849b91fb46281496eb1bbab2ce98ef2?rik=YcBbQWezxNHatA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"56C803D2B04A042BD15BB4DAD1C4B367415BC061","accentColor":"252523"},"93A84BF0DF103AF699C361D657F85EC8C101EA0C":{"name":"Buy Codes Over Rings: 6 (Series On Coding Theory And Cryptology) Book ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.KUxHCvXoqF5OJ2Ipjk9Z1QAAAA?pid=Api","datePublished":"2009-07-17T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41PZjbodLLL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Codes-Rings-Coding-Theory-Cryptology/dp/981283768X","contentSize":"16252 B","width":305,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.294c470af5e8a85e4e2762298e4f59d5?rik=OYq0D%2f0Bo2%2bZPA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C0AE101C8CE58F756D163C996FA301FD0FB48A39","accentColor":"AA6921"},"2FD2CE27F7C9902DA68FC5A1BB4677D76912FF71":{"name":"Отчёт a16z о состоянии и перспективах криптовалютного рынка на 2022 год ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.HjqXkkSA6pAWbCD4cp5sQQHaEM?pid=Api","datePublished":"2024-04-16T01:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img4.teletype.in/files/79/af/79af0173-2377-4cbb-bee7-9a10d4d7f35d.png","hostPageUrl":"https://teletype.in/@cryptologykey/a16z-report-22","contentSize":"221714 B","width":1024,"height":581,"cDNContentUrl":"https://th.bing.com/th/id/R.1e3a97924480ea90166c20f8729e6c41?rik=8i3scn%2bcCdJq%2bA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"17FF21967D7764BB1A5CF86AD2099C7F72EC2DF2","accentColor":"079AC4"},"898CD2F1C012B98EE3F1813CD941181FED1584D5":{"name":"VTU 18EC744 Cryptography Exam QP & Solutions March 2022 - Studocu","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.eHlYVmc4y2V4gqEwl-rmLQHaKN?pid=Api","datePublished":"2023-11-11T07:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/6e16e1ccc3a729d40b65a38e2a727b0e/thumb_1200_1655.png","hostPageUrl":"https://www.studocu.com/in/document/jss-academy-of-technical-education-bengaluru/cryptography/vtu-exam-question-paper-with-solution-of-18ec744-cryptography-march-2022-anindita-sahoo-copy/75396838","contentSize":"904151 B","width":1200,"height":1655,"cDNContentUrl":"https://th.bing.com/th/id/R.787958566738cb657882a13097eae62d?rik=mMgtHwwhm%2bg%2bHw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5D4851DEF181149DC3181F3EE89B210C1F2DC898","accentColor":"5F5F6C"},"C87D79F8AAE7CCDEA57F7C9CEB561673D868666E":{"name":"- NWC 2021","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.efd83UdfjWQfFzXBmniUiAHaHa?pid=Api","datePublished":"2021-10-07T20:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://jnnce.ac.in/nwc2021/logo.png","hostPageUrl":"http://jnnce.ac.in/nwc2021/index.html","contentSize":"158803 B","width":500,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.79f77cdd475f8d641f1735c19a789488?rik=jNeXj6p%2bzO1a9w&riu=http%3a%2f%2fjnnce.ac.in%2fnwc2021%2flogo.png&ehk=jioixXrm5YSLwtTF621q2t%2fitGV%2fBUJg139UPWTVfJE%3d&risl=&pid=ImgRaw&r=0","isTransparent":true,"imageId":"E666868D376165BEC9C7F75AEDCC7EAA8F97D78C","accentColor":"C8AA03"},"D6D38CC66F501B71104222048B910BE749E5FA6E":{"name":"Foundations of Security Analysis and Design VIII: FOSAD 2014/2015/2016 ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.9w-OlBCQLFZgLTPCkN2_RAAAAA?pid=Api","datePublished":"2025-07-27T21:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41Fx1PulXqL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Foundations-Security-Analysis-Design-VIII/dp/3319430041","contentSize":"19430 B","width":294,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.f70f8e9410902c56602d33c290ddbf44?rik=bT3IbPYFsRcBJA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E6AF5E947EB019B84022240117B105F66CC83D6D","accentColor":"09A76B"},"8907C07A47862BD439BBDA1B995EF489B634B589":{"name":"Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.u-IiKzs9Sdsgy1Zj8gq6xgHaEQ?pid=Api","datePublished":"2022-09-27T10:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/sensors/sensors-22-07332/article_deploy/html/images/sensors-22-07332-g001.png","hostPageUrl":"https://www.mdpi.com/1424-8220/22/19/7332","contentSize":"318186 B","width":3169,"height":1823,"cDNContentUrl":"https://th.bing.com/th/id/R.bbe2222b3b3d49db20cb5663f20abac6?rik=mHAMp3Rosk2Tuw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"985B436B984FE599B1ADBB934DB26874A70C7098","accentColor":"BF0CBF"},"F7723C2267AAA9E37E2B1354234613ADF26024E2":{"name":"Advances in Cryptology: Proceedings of CRYPTO '85: 218 (Lecture Notes ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.G4qOMy9rXZI2NtTgwNmbWwAAAA?pid=Api","datePublished":"2020-08-24T07:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41aJjXw6vqL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Advances-Cryptology-Proceedings-Lecture-Computer/dp/3540164634","contentSize":"11249 B","width":295,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.1b8a8e332f6b5d923636d4e0c0d99b5b?rik=fyfDInaqmj7nsg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2E42062FDA3164324531B2E73E9AAA7622C3277F","accentColor":"C71904"},"9035031C87D6AA324856DCF22EC7D266435A032D":{"name":"21IS71 Cryptography & Network Security VTU Exam Paper Analysis - Studocu","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.q5QOYKzKMZrElSumRYl_GAHaKe?pid=Api","datePublished":"2025-01-11T07:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/498e489353d8748e4be55d58928e74e2/thumb_1200_1698.png","hostPageUrl":"https://www.studocu.com/in/document/cmr-institute-of-technology/cryptography-and-network-security/21is71-cryptography-and-network-security-vtu-paper/115007256","contentSize":"1197730 B","width":1200,"height":1698,"cDNContentUrl":"https://th.bing.com/th/id/R.ab940e60acca319ac4952ba645897f18?rik=CVMwwXhtqiOEZQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D230A534662D7CE22FCD658423AA6D78C1305309","accentColor":"5A5A49"},"1E67835E043EDC328B001593A0A64DF0BE2CDAFA":{"name":"Process Authentication through Blockchain: Three Case Studies","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.xlteZLX7Lkp3xKOuwdvZ3gHaDz?pid=Api","datePublished":"2022-11-11T08:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/cryptography/cryptography-06-00058/article_deploy/html/images/cryptography-06-00058-g001.png","hostPageUrl":"https://www.mdpi.com/2410-387X/6/4/58","contentSize":"596221 B","width":2870,"height":1476,"cDNContentUrl":"https://th.bing.com/th/id/R.c65b5e64b5fb2e4a77c4a3aec1dbd9de?rik=4XY45UDjzSO4AA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AFADC2EB0FD46A0A395100B823CDE340E53876E1","accentColor":"C8B703"},"E2ADAF2DA8D773627C55199888F8BD6AE13158A1":{"name":"17 Best Cryptography Books – Free Download (PDF) – Tech Hyme","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.xc-U26BIDff7rGIcQ-805gHaEc?pid=Api","datePublished":"2024-07-13T11:27:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://techhyme.com/wp-content/uploads/2024/07/Cryptography-Books-Free-Download-Techhyme-1024x614.jpg","hostPageUrl":"https://techhyme.com/17-best-cryptography-books-free-download-pdf/","contentSize":"100147 B","width":1024,"height":614,"cDNContentUrl":"https://th.bing.com/th/id/R.c5cf94dba0480df7fbac621c43ef34e6?rik=Ltr60op9NybHVQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1A85131EA6DB8F88899155C726377D8AD2FADA2E","accentColor":"31649A"},"177B49161647584D509CAD28450C59BE57CB59D2":{"name":"BOS/CONF — Teletype","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.VyR9I_9yU2JfsOuAm6nswAHaDi?pid=Api","datePublished":"2023-01-31T22:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img4.teletype.in/files/f4/f1/f4f1b513-ad4c-4acc-8946-49e19fa3a550.png","hostPageUrl":"https://teletype.in/@cryptologykey/Struktura-rynka-06-27","contentSize":"91588 B","width":1918,"height":918,"cDNContentUrl":"https://th.bing.com/th/id/R.57247d23ff7253625fb0eb809ba9ecc0?rik=cbeUYWF0hdQFyQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2D95BC75EB95C05482DAC905D48574616194B771","accentColor":"B0201B"},"433D56DCD20753747D559F944DF6D3C71442795B":{"name":"Editorial Board | Stechnolock Journal of Cryptology | Open Access","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.2eOhnvtgKhkkyXiCx2oAagAAAA?pid=Api","datePublished":"2023-07-15T13:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://www.stechnolock.com/STL/oamsecure/up_images/390editor_image.jpg","hostPageUrl":"https://www.stechnolock.com/journals/stechnolock-journal-of-cryptology/editorial-board.php","contentSize":"11313 B","width":90,"height":118,"cDNContentUrl":"https://th.bing.com/th/id/R.d9e3a19efb602a1924c97882c76a006a?rik=NNNlzS1wNUfXVQ&riu=http%3a%2f%2fwww.stechnolock.com%2fSTL%2foamsecure%2fup_images%2f390editor_image.jpg&ehk=72xh5RukDAwUASx7J%2bYPaHx5yIfxKi4npAnYBx%2fH%2fq0%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B59724417C3D6FD449F955D74735702DCD65D334","accentColor":"435188"},"130D906B90D3E05ADD96E65F7099DAED9AF8AC27":{"name":"暗号化アルゴリズムRSA (Rivest-Shamir-Adleman)の基本 | Splunk","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.EyhgPyqMc1Ni01B3ta6TZAHaGx?pid=Api","datePublished":"2024-12-23T15:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.splunk.com/content/dam/splunk-blogs/images/en_us/2023/02/key-mgmt1.png","hostPageUrl":"https://www.splunk.com/ja_jp/blog/security/rsa-algorithm-cryptography.html","contentSize":"20249 B","width":500,"height":457,"cDNContentUrl":"https://th.bing.com/th/id/R.1328603f2a8c735362d35077b5ae9364?rik=MdAJtgk9DqXdaQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"72CA8FA9DEAD9907F56E69DDA50E3D09B609D031","accentColor":"C60579"},"0021C36953F20F0F60F75187C50A0E1B6AA252F8":{"name":"Gift Voucher Worth ₹ 2500 – The Indian Trunk","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.uJFevzrtiSSPbuRWVNOStQHaFd?pid=Api","datePublished":"2023-05-21T15:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://theindiantrunk.com/cdn/shop/products/2500.jpg?v=1676275308","hostPageUrl":"https://theindiantrunk.com/products/gift-voucher-worth-2500","contentSize":"170331 B","width":1202,"height":886,"cDNContentUrl":"https://th.bing.com/th/id/R.b8915ebf3aed89248f6ee45654d392b5?rik=ABI8ljUv8PAGfw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8F252AA6B1E0A05C78157F06F0F02F35963C1200","accentColor":"C7040D"},"806467B380DCD6161FEDFC3F1203931AB42306F6":{"name":"What is Cryptography?","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.BIb4B4j0XiyGcdr9kWgYaAAAAA?pid=Api","datePublished":"2020-06-15T20:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn.kaspersky.com/se/media/rc/side-banner-coin.gif","hostPageUrl":"https://www.kaspersky.co.in/resource-center/definitions/what-is-cryptography","contentSize":"111703 B","width":300,"height":600,"proxyContentUrl":"https://tse2.mm.bing.net/th/id/OGC.0486f80788f45e2c8671dafd91681868?pid=Api&rurl=https%3a%2f%2fcdn.kaspersky.com%2fse%2fmedia%2frc%2fside-banner-coin.gif&ehk=%2ftneSr3fAXRJzvuDDEAl88kjYE9%2f1rZraW%2beAmabL%2bY%3d","cDNContentUrl":"https://th.bing.com/th/id/R.0486f80788f45e2c8671dafd91681868?rik=CEZ2OwjNbWHx3g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6F60324BA1393021F3CFDEF1616DCD083B764608","accentColor":"118DBA"},"B30A943D4A0467AC97D6999B157A0B5D8E494179":{"name":"'Cryptography will break': SEBI Chief urges proactive password security ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.jUgT1270PgNbpOMGl7kIoQHaEA?pid=Api","datePublished":"2025-10-08T12:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.etimg.com/thumb/msid-124387226,width-1070,height-580,overlay-economictimes/videoshow.jpg","hostPageUrl":"https://economictimes.indiatimes.com/news/india/cryptography-will-break-sebi-chief-urges-proactive-password-security-in-quantum-age/videoshow/124387226.cms","contentSize":"41644 B","width":1070,"height":580,"cDNContentUrl":"https://th.bing.com/th/id/R.8d4813d76ef43e035ba4e30697b908a1?rik=O6BJ06RAdsp5bQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"971494E8D5B0A751B9996D79CA7640A4D349A03B","accentColor":"791B20"},"96514FE876FE877543059AFCB101FA804E0124B1":{"name":"Know More on Types of Cryptography - Tech Hyme","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.gF773DhvxfwXsNhxC3-9ZwHaE7?pid=Api","datePublished":"2022-09-21T05:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://techhyme.com/wp-content/uploads/2022/09/Cryptography-Types-Techhyme.jpg","hostPageUrl":"https://techhyme.com/know-more-on-types-of-cryptography/","contentSize":"211292 B","width":1373,"height":915,"cDNContentUrl":"https://th.bing.com/th/id/R.805efbdc386fc5fc17b0d8710b7fbd67?rik=aRX0jmfveFc0UA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1B4210E408AF101BCFA950345778EF678EF41569","accentColor":"9B6C30"},"8E6CB744E1FB9CC1D1894B9C8CFABA7EDC7D5F8D":{"name":"Реферальные ссылки Cryptology — Teletype","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.SXvAwfFeFTLzojrM9Uo7HwHaD4?pid=Api","datePublished":"2022-07-27T14:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img3.teletype.in/files/e2/04/e204ee2c-9714-416f-9887-158e954666a7.png","hostPageUrl":"https://teletype.in/@cryptologykey/ref","contentSize":"29966 B","width":1200,"height":630,"cDNContentUrl":"https://th.bing.com/th/id/R.497bc0c1f15e1532f3a23accf54a3b1f?rik=6MZ7RB6%2fyRwdmA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D8F5D7CDE7ABAFC8C9B4981D1CC9BF1E447BC6E8","accentColor":"242421"},"93CEA91C488667338E68BD0FD67EB18039ECD658":{"name":"Buy Cryptography And Network Security | 3rd Edition Book Online at Low ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.9lOF-u05h-JYhP7gGj3DrwAAAA?pid=Api","datePublished":"2015-11-13T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images-eu.ssl-images-amazon.com/images/I/91U3brATbmL._AC_UL160_SR160,160_.jpg","hostPageUrl":"https://www.amazon.in/Crypt-Network-Security-Forouzan/dp/9339220943","contentSize":"8448 B","width":160,"height":160,"cDNContentUrl":"https://th.bing.com/th/id/R.f65385faed3987e25884fee01a3dc3af?rik=OeyawYRodjPohg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"856DCE93081BE76DF0DB86E833766884C19AEC39","accentColor":"A44C27"},"5F280830E75D284200003C136BC856970A394DC5":{"name":"Buy Radio Frequency Identification System Security: Rfidsec'13 Asia ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.FezNw8T8tfVrbrShyI0QMwAAAA?pid=Api","datePublished":"2013-11-01T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/51OyqkKrK5L._SY385_.jpg","hostPageUrl":"https://www.amazon.in/Radio-Frequency-Identification-System-Security/dp/1614993270","contentSize":"14412 B","width":256,"height":385,"cDNContentUrl":"https://th.bing.com/th/id/R.15eccdc3c4fcb5f56b6eb4a1c88d1033?rik=9YKAA37VgiQAAA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5CD493A079658CB631C300002482D57E038082F5","accentColor":"0499B8"},"9B62C39D138F8CF30D49115E922512996CF02F8A":{"name":"Buy Beginning Cryptography with Java Book Online at Low Prices in India ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.yrMAUvnX9xYQyXIej3R5qwAAAA?pid=Api","datePublished":"2005-09-01T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/411kr9nNlqL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Beginning-Cryptography-Java-David-Hook/dp/8126506261","contentSize":"16457 B","width":341,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.cab30052f9d7f71610c9721e8f7479ab?rik=uSY82TH4yD%2fQlA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A8F20FC699215229E51194D03FC8F831D93C26B9","accentColor":"C7B904"},"ECCA75015D1F709A090975A321D4B9D67C8358A4":{"name":"Buy Introduction to Cryptography Book Online at Low Prices in India ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.ugcpVRlpM_MmRABCkhFBugAAAA?pid=Api","datePublished":"2017-09-14T07:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/415YAIy605L._SY445_SX342_ML2_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Cryptography-Information-Security/dp/3662479737","contentSize":"14551 B","width":295,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.ba072955196933f326440042921141ba?rik=zqxXENXxB6mQkA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4A8538C76D9B4D123A579090A907F1D51057ACCE","accentColor":"B4A417"},"11DE8C664232E8CAE18198681943101EC65CC8AE":{"name":"What is Quantum Key Distribution? All you need to know about QKD technology","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.ZxMwFTfcnqU3dMoe8_xGrgHaEK?pid=Api","datePublished":"2020-12-11T14:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://newsd.in/wp-content/uploads/2020/12/QKD-1.jpg","hostPageUrl":"https://newsd.in/what-is-quantum-key-distribution-all-you-need-to-know-about-qkd-technology/","contentSize":"67633 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.6713301537dc9ea53774ca1ef3fc46ae?rik=Ee3IZiQjjqweGA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EA8CC56CE10134918689181EAC8E232466C8ED11","accentColor":"0295C9"},"AF66D9EBC6C5952C3AA2BD06101748A3BA1EB43E":{"name":"Teaching Faculty","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.HkUrRsFl1OvofQ9twPNKPgAAAA?pid=Api","datePublished":"2023-05-29T15:46:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://crraoaimscs.ac.in/images/teachars/10.jpg","hostPageUrl":"https://crraoaimscs.ac.in/teaching-faculty.php","contentSize":"102869 B","width":300,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.1e452b46c165d4ebe87d0f6dc0f34a3e?rik=%2bmadvmxcWcKjKg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E34BE1AB3A84710160DB2AA3C2595C6CBE9D66FA","accentColor":"814A5C"},"D2C77E43E7671344028F4133D1567DD7CB830C16":{"name":"Рыночная капитализация — Teletype","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.WlfSZMbeOmcMKlXWz2v6nQHaEW?pid=Api","datePublished":"2022-05-10T08:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img2.teletype.in/files/91/71/917160de-3d91-4681-8cf5-08bd583f21fc.png","hostPageUrl":"https://teletype.in/@cryptologykey/M5lKkIyCgW2","contentSize":"51846 B","width":1548,"height":909,"cDNContentUrl":"https://th.bing.com/th/id/R.5a57d264c6de3a670c2a55d6cf6bfa9d?rik=LXznNH52MUQg%2bA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"61C038BC7DD7651D3314F8204431767E34E77C2D","accentColor":"222631"},"64FC3ACF1086EAD19FDA7D1C691A4E15E4338BA2":{"name":"NIC LMS","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.kk1KjvXukbxmN2zWDd1MmwHaEL?pid=Api","datePublished":"2024-04-03T13:46:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://vidyakosh-v2.nic.in/public/storage/uploads/1651216521-cryptography.PNG","hostPageUrl":"https://www.vidyakosh-v2.nic.in/public/course/cryptography-2022","contentSize":"1416569 B","width":1182,"height":667,"cDNContentUrl":"https://th.bing.com/th/id/R.924d4a8ef5ee91bc66376cd60ddd4c9b?rik=Rs%2bj%2fAForh35rQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2AB8334E51E4A196C1D7ADF91DAE6801FCA3CF46","accentColor":"07C1C4"},"2679F9A35056DF35CCD34B9C8CFABA7EDC7D5F8D":{"name":"Реферальные ссылки Cryptology — Teletype","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.IHEn35HRbl_LlQRPGjjxcQHaCN?pid=Api","datePublished":"2022-07-27T14:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img1.teletype.in/files/0a/5e/0a5e2e37-8e3a-4806-a365-5e1eb63178cf.jpeg","hostPageUrl":"https://teletype.in/@cryptologykey/ref","contentSize":"44429 B","width":875,"height":262,"cDNContentUrl":"https://th.bing.com/th/id/R.207127df91d16e5fcb95044f1a38f171?rik=YpefOgVl%2fVPMPQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D8F5D7CDE7ABAFC8C9B43DCC53FD65053A9F9762","accentColor":"B49218"},"20D6B4777E7A228DC006A4C49E51B29ADAECFF45":{"name":"IISc-IACR School on Cryptology","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.SYztX7RxmuhG8UQsuv38jAHaHa?pid=Api","datePublished":"2017-11-17T14:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.csa.iisc.ac.in/~crysp/IACRSchool/img/speakers/divesh_aggarwal.jpg","hostPageUrl":"https://www.csa.iisc.ac.in/~crysp/IACRSchool/","contentSize":"650746 B","width":2268,"height":2268,"cDNContentUrl":"https://th.bing.com/th/id/R.498ced5fb4719ae846f1442cbafdfc8c?rik=Am1Ld%2benItgMYA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"54FFCEADA92B15E94C4A600CD822A7E7774B6D02","accentColor":"51525A"},"88D29673C9736C6467CA7B326771CF4ED0313D84":{"name":"Object Oriented Programming - CS3391 3rd Semester CSE Dept | 2021 ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.SgtGSGnw5QNtII6XugHoywHaEK?pid=Api","datePublished":"2023-03-31T21:20:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.poriyaan.in/media/cata/size/193-Crypt-Yr.jpg","hostPageUrl":"https://www.poriyaan.in/paper/object-oriented-programming-76/","contentSize":"323937 B","width":800,"height":450,"cDNContentUrl":"https://th.bing.com/th/id/R.4a0b464869f0e5036d208e97ba01e8cb?rik=iC1pN5w3xkZ2rA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"48D3130DE4FC177623B7AC7646C6379C37692D88","accentColor":"1A9BB1"},"2D50C4A14E23628ECAB99F944DF6D3C71442795B":{"name":"Editorial Board | Stechnolock Journal of Cryptology | Open Access","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.iUIdbldz6J_UepIa8n03rgAAAA?pid=Api","datePublished":"2023-07-15T13:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://www.stechnolock.com/STL/oamsecure/up_images/226editor_image.jpg","hostPageUrl":"https://www.stechnolock.com/journals/stechnolock-journal-of-cryptology/editorial-board.php","contentSize":"8712 B","width":90,"height":118,"cDNContentUrl":"https://th.bing.com/th/id/R.89421d6e5773e89fd47a921af27d37ae?rik=0gVMGuQyJuismw&riu=http%3a%2f%2fwww.stechnolock.com%2fSTL%2foamsecure%2fup_images%2f226editor_image.jpg&ehk=eMm%2bL%2bp135hCzIu9w9shlkMtYSYs4Nn0QVR5SfRy0cU%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B59724417C3D6FD449F99BACE82632E41A4C05D2","accentColor":"943737"},"6D584B4042705BF9FD00278ED39DE51ED91FB194":{"name":"Indian 5 rupees coin Images - Free Download on Freepik","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.uxhXHW8coT5JF8603sx93QHaHa?pid=Api","datePublished":"2025-01-17T07:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.freepik.com/free-vector/digital-currency-indian-rupee-symbol-golden-coin_1017-42459.jpg","hostPageUrl":"https://www.freepik.com/free-photos-vectors/indian-5-rupees-coin","contentSize":"32589 B","width":626,"height":626,"cDNContentUrl":"https://th.bing.com/th/id/R.bb18571d6f1ca13e4917ceb4decc7ddd?rik=1oW0BCQHtZ%2ffAA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"491BF19DE15ED93DE87200DF9FB5072404B485D6","accentColor":"AF5402"},"1026666C37630EBE5EDF0A608648139349AF295A":{"name":"CS3591-Networks Lab Manual-converted - 1 Lab Manual CS3591- Computer ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.pGqL5H3Dx6hEFklhIdA_lQHaKd?pid=Api","datePublished":"2023-08-28T23:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/035e0f474b7ba25d6dd378ffb521be01/thumb_1200_1696.webp","hostPageUrl":"https://www.studocu.com/in/document/university-of-rajasthan/cognitive-neuroscience/cs3591-networks-lab-manual-converted/67472723","contentSize":"57726 B","width":1200,"height":1696,"cDNContentUrl":"https://th.bing.com/th/id/R.a46a8be47dc3c7a84416496121d03f95?rik=AWJmxnM24Ovl%2fQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A592FA943931846806A0FDE5EBE03673C6666201","accentColor":"323232"},"FC8142856C563BF0EAE9508BFC619BE936914D7F":{"name":"Birthday attack in Cryptography - Birthday attack in Cryptography ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.giPPlvjTaUF2XsxekMQQDAHaJl?pid=Api","datePublished":"2023-02-04T14:02:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/7d2cd959bf823bbc096303eb5813bc7c/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/indian-institute-of-technology-kharagpur/computer-networks/birthday-attack-in-cryptography/27581334","contentSize":"140905 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.8223cf96f8d36941765ecc5e90c4100c?rik=zxgkWMZlsw%2bung&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F7D419639EB916CFB8059EAE0FB365C6582418CF","accentColor":"2D2D2D"},"2493DD8B745A3A2810A5A3237B38D64E3EF9DD9A":{"name":"Fake notes worth over Rs 14 lakh in Rs 500 denominations seized in Odisha","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.pp3MDCn5_nOIf0lMZ3QgzgHaEK?pid=Api","datePublished":"2022-07-07T11:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.odishatv.in/uploadimage/library/16_9/16_9_5/IMAGE_1657193786.webp","hostPageUrl":"https://odishatv.in/news/crime/fake-notes-worth-over-rs-14-lakh-in-rs-500-denominations-seized-in-odisha-180288","contentSize":"76340 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.a69dcc0c29f9fe73887f494c677420ce?rik=QjnduEelo4IBWg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A9DD9FE3E46D83B7323A5A0182A3A547B8DD3942","accentColor":"7A6251"},"21E0B5C56AE94756BF6DCC31D37088A8E67E35DC":{"name":"Mahatma Gandhi picture on indian currency on note where it was taken ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.lbFJOgfrY3rQfGj9RYJh1AHaEK?pid=Api","datePublished":"2023-08-01T12:46:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://resize.indiatv.in/resize/newbucket/1200_-/2023/08/untitled-design-2023-08-01t180958-1690893665.jpg","hostPageUrl":"https://www.indiatv.in/viral/news/mahatma-gandhi-picture-on-indian-currency-on-note-where-it-was-taken-and-when-2023-08-01-978364","contentSize":"144723 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.95b1493a07eb637ad07c68fd458261d4?rik=Eg5bXKaedGX71g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CD53E76E8A88073D13CCD6FB65749EA65C5B0E12","accentColor":"446A87"},"EACC21F4D0EEE618BCD487F68DABB843D406ADED":{"name":"Substitution techniques in Cryptography in hindi","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.tFRcutIhREbuFVnrJUyg2wHaE_?pid=Api","datePublished":"2022-10-24T03:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGGSFFc2I60rzg-_Pjm8nA11XCr795V0y0ZFmMhv58T3o2_f8jOgpm9Jck5XabAei7PSVHdxqYG3S0qQLlnLBMp6MMHm6xT4OuuzzVJJHoiuvGmmo5wSj4E72zuYdfRqz3Hj43Yoct4vqw9PsY-eMqrtukY8f4xiTkRsU0lP4w8QrfiKGQqMpRvXEo_A/w698-h471/Types%20of%20Substitution%20Techniques.png","hostPageUrl":"https://www.computernetworksite.in/2022/10/substitution-techniques-in-cryptography.html","contentSize":"41007 B","width":698,"height":471,"cDNContentUrl":"https://th.bing.com/th/id/R.b4545cbad2214446ee1559eb254ca0db?rik=rswSTw3uboHLTQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DEDA604D348BBAD86F784DCB816EEE0D4F12CCAE","accentColor":"BE1F0D"},"205216C64E8EDA66599DBD3F41D5635554210157":{"name":"Professionelle Cybersicherheitslösungen","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.63UnQbvxUwdSlQzkD3E-7gHaEK?pid=Api","datePublished":"2012-06-05T09:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://utimaco.com/sites/default/files/2023-01/solution-post-quantum-cryptography.png","hostPageUrl":"https://utimaco.com/de","contentSize":"43641 B","width":960,"height":540,"cDNContentUrl":"https://th.bing.com/th/id/R.eb752741bbf1530752950ce40f713eee?rik=AiVhbOTorWaV2Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7510124555365D14F3DBD99566ADE8E46C612502","accentColor":"00539C"},"5F33181DD8B3018CA4A39F944DF6D3C71442795B":{"name":"Editorial Board | Stechnolock Journal of Cryptology | Open Access","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.LvTamZwNtqgKmgEsVU0nPAAAAA?pid=Api","datePublished":"2023-07-15T13:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://www.stechnolock.com/STL/oamsecure/up_images/198editor_image.jpg","hostPageUrl":"https://www.stechnolock.com/journals/stechnolock-journal-of-cryptology/editorial-board.php","contentSize":"9791 B","width":90,"height":118,"cDNContentUrl":"https://th.bing.com/th/id/R.2ef4da999c0db6a80a9a012c554d273c?rik=9TOB0Y07EMhKOg&riu=http%3a%2f%2fwww.stechnolock.com%2fSTL%2foamsecure%2fup_images%2f198editor_image.jpg&ehk=qQhyVXbHIlOwetYF%2buX0RcrguaFgeDyjWeH3fhqBQmQ%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B59724417C3D6FD449F93A4AC8103B8DD18133F5","accentColor":"124A9A"},"CD1ED4D2909F013D7BEEC88AE4AD2731BBBD0D66":{"name":"Buy Cryptography and Network Security - Principles and Practice ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.sFuBdQeUymk-lYnAoXFjTwAAAA?pid=Api","datePublished":"2021-09-07T18:36:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/G/31/personalization/ybh/loading-4x-gray._CB485916689_.gif","hostPageUrl":"https://www.amazon.in/Cryptography-Network-Security-Principles-Practice/dp/9332585229","contentSize":"8865 B","width":64,"height":64,"proxyContentUrl":"https://tse2.mm.bing.net/th/id/OGC.b05b81750794ca693e9589c0a171634f?pid=Api&rurl=https%3a%2f%2fm.media-amazon.com%2fimages%2fG%2f31%2fpersonalization%2fybh%2floading-4x-gray._CB485916689_.gif&ehk=2eeT8cBhv2ypBrMv%2fmKeEhubbHylh3mewk%2bzIbIVtYk%3d","cDNContentUrl":"https://th.bing.com/th/id/R.b05b81750794ca693e9589c0a171634f?rik=3OFNLQn5ENO37g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"66D0DBBB1372DA4EA88CEEB7D310F9092D4DE1DC","accentColor":"666666"},"BBA9FB0F37717ADC19D4E20CE207DC4E46AD1028":{"name":"Что такое криптовалюта? — Teletype","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.X356FBottGFVo3WuyiRiNwHaE8?pid=Api","datePublished":"2022-11-21T20:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn.pixabay.com/photo/2018/02/05/16/21/bitcoin-3132574_960_720.jpg","hostPageUrl":"https://teletype.in/@trandinvestclub/kriptovaluta","contentSize":"281343 B","width":960,"height":640,"cDNContentUrl":"https://th.bing.com/th/id/R.5f7e7a141a2db46155a375aeca246237?rik=u5q%2f8HMXp82RTQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8201DA64E4CD702EC02E4D91CDA71773F0BF9ABB","accentColor":"B8B313"},"4CA6D3DFBF804DEA78C5D5144DEA83C8C29B6811":{"name":"Indian 500 rupee Images - Free Download on Freepik","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.a8csLDoHpr4pvCESLcmKhwHaF7?pid=Api","datePublished":"2023-08-29T05:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.freepik.com/free-vector/glowing-indian-inr-rupee-symbol-background-retail-market_1017-53777.jpg?semt=ais_hybrid&w=740&q=80","hostPageUrl":"https://www.freepik.com/free-photos-vectors/indian-500-rupee","contentSize":"21275 B","width":740,"height":592,"cDNContentUrl":"https://th.bing.com/th/id/R.6bc72c2c3a07a6be29bc21122dc98a87?rik=xGo9%2ffsI1K6HXA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1186B92C8C38AED4415D5C87AED408FBFD3D6AC4","accentColor":"02C9A5"},"9F0A13C9D0F50F4A1035FB8A9A3A02E70C9E028D":{"name":"Зачем нужны криптовалютные кошельки? — Teletype","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.5UFYfuDZHwjd2gHavEtORwHaD9?pid=Api","datePublished":"2023-04-07T15:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cheapsslsecurity.com/p/wp-content/uploads/2019/08/private-key-encryption.png","hostPageUrl":"https://teletype.in/@cryptoscamm/wallet_basic","contentSize":"22502 B","width":624,"height":334,"cDNContentUrl":"https://th.bing.com/th/id/R.e541587ee0d91f08ddda01dabc4b4e47?rik=%2baAxnA1f8KQBUw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D820E9C07E20A3A9A8BF5301A4F05F0D9C31A0F9","accentColor":"BB3810"},"9A5430A663B773C49559C07B433FA489AA480D07":{"name":"2.2 / Блокчейн Bitcoin и его эволюция — Teletype","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.fnYw5Ae_YTCJUFsgc--ZrwHaFj?pid=Api","datePublished":"2022-03-04T11:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img1.teletype.in/files/4a/a5/4aa5abb2-75aa-42e6-88e5-02c7bcaa47af.png","hostPageUrl":"https://teletype.in/@cryptologykey/SFvkJn3Ya6t","contentSize":"2993974 B","width":480,"height":360,"proxyContentUrl":"https://tse3.mm.bing.net/th/id/OGC.7e7630e407bf613089505b2073ef99af?pid=Api&rurl=https%3a%2f%2fimg1.teletype.in%2ffiles%2f4a%2fa5%2f4aa5abb2-75aa-42e6-88e5-02c7bcaa47af.png&ehk=rG%2b%2bDT0DEG3WoSh4aR0m75dv2SWkXVYUFz%2fVxNKvxTw%3d","cDNContentUrl":"https://th.bing.com/th/id/R.7e7630e407bf613089505b2073ef99af?rik=qUUDajZ7N0xZlQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"70D084AA984AF334B70C95594C377B366A0345A9","accentColor":"417028"},"9A5E8053C6D241B404AE62628F666BB15BCF4519":{"name":"About Us","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.fAkb3y1XkLlvX8DPsu1VhAHaHa?pid=Api","datePublished":"2024-06-25T12:27:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://setsindia.in/wp-content/uploads/2024/06/pngwing.com_.png","hostPageUrl":"https://setsindia.in/about-us/","contentSize":"4633 B","width":512,"height":512,"cDNContentUrl":"https://th.bing.com/th/id/R.7c091bdf2d5790b96f5fc0cfb2ed5584?rik=qeUINWwtFEtA6g&pid=ImgRaw&r=0","isTransparent":true,"imageId":"9154FCB51BB666F82626EA404B142D6C3508E5A9","accentColor":"0070AA"},"2317EC62FE7E21CB03BF1593A0A64DF0BE2CDAFA":{"name":"Process Authentication through Blockchain: Three Case Studies","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.rrcxD8CO4zLh6UrskNajcwHaEA?pid=Api","datePublished":"2022-11-11T08:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/cryptography/cryptography-06-00058/article_deploy/html/images/cryptography-06-00058-g005.png","hostPageUrl":"https://www.mdpi.com/2410-387X/6/4/58","contentSize":"258879 B","width":3184,"height":1722,"cDNContentUrl":"https://th.bing.com/th/id/R.aeb7310fc08ee332e1e94aec90d6a373?rik=MnHOJu%2fnErww%2bw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AFADC2EB0FD46A0A3951FB30BC12E7EF26CE7132","accentColor":"1491B7"},"5140CA27F46E73B55F2ACD0A3AD8B117F9F58EFF":{"name":"Teaching Faculty","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.1lNc6ZrTwlSlVRagKilxOQAAAA?pid=Api","datePublished":"2023-04-26T08:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://crraoaimscs.res.in/btech/images/teachars/9.jpg","hostPageUrl":"https://crraoaimscs.res.in/btech/teaching-faculty.php","contentSize":"88414 B","width":300,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.d6535ce99ad3c254a55516a02a297139?rik=FQSsck%2fmN1v1og&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FFE85F9F711B8DA3A0DCA2F55B37E64F72AC0415","accentColor":"AB2320"},"09B2CABE086E33F6ABD0A4C49E51B29ADAECFF45":{"name":"IISc-IACR School on Cryptology","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.GCyhP9z3SHOsWGJLGN3hXgHaE1?pid=Api","datePublished":"2017-11-17T14:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.csa.iisc.ac.in/~crysp/IACRSchool/img/slider/1.jpeg","hostPageUrl":"https://www.csa.iisc.ac.in/~crysp/IACRSchool/","contentSize":"213437 B","width":1080,"height":705,"cDNContentUrl":"https://th.bing.com/th/id/R.182ca13fdcf74873ac58624b18dde15e?rik=kCus64DmM2%2b6DQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"54FFCEADA92B15E94C4A0DBA6F33E680EBAC2B90","accentColor":"0791C4"},"E0148B1D8E7274ACE8AAAA5BDDEDEA0CCEFE1B46":{"name":"Personalized Photo Calendars 2023 | Optimalprint | Optimalprint","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.jCiR53Ocfv7K885xBZqkPAAAAA?pid=Api","datePublished":"2019-11-19T06:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn-adl.live.gelato.tech/do/HpTfqQ1b4As/small_3d-p1-en-IN?v=1690403204","hostPageUrl":"https://www.optimalprint.in/wall-calendars/designs","contentSize":"27872 B","width":241,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.8c2891e7739c7efecaf3ce71059aa43c?rik=DkG40egnR8qOqg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"64B1EFECC0AEDEDDB5AAAA8ECA4727E8D1B8410E","accentColor":"9E652D"},"2E6B0322BBBED2BF5AD9B4A0407BFE730C7334FE":{"name":"Ликвидность — Teletype","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.PdM-OmFZMa80EG7lrc3wZAHaFb?pid=Api","datePublished":"2022-04-14T06:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img3.teletype.in/files/e3/34/e33447f7-fbb8-4e5d-a71b-1fee6e65e61c.jpeg","hostPageUrl":"https://teletype.in/@cryptologykey/Likvidnost-07-16","contentSize":"34722 B","width":1230,"height":902,"cDNContentUrl":"https://th.bing.com/th/id/R.3dd33e3a615931af34106ee5adcdf064?rik=4rYwIrvrLfulnQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EF4337C037EFB7040A4B9DA5FB2DEBBB2230B6E2","accentColor":"AC1F24"},"FA0CBE2D2B50303EBE77839345B40D9DBB2C6778":{"name":"Topps FC Barcelona Forever 25/26 – Barça Official Store","thumbnailUrl":"https://tse3.mm.bing.net/th?id=OIF.Sw5hXpkwDKZO0%2fMBB82wGA&pid=Api","datePublished":"2026-03-07T17:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://store.fcbarcelona.com/cdn/shop/files/Disenosintitulo_1_b9b07baa-d3bd-4747-8c33-09a96bb5c94e.jpg?v=1770204072&width=1200","hostPageUrl":"https://store.fcbarcelona.com/en-in/collections/gifts-and-accessories/products/fc-barcelona-forever-25-26","contentSize":"112563 B","width":1200,"height":1601,"cDNContentUrl":"https://th.bing.com/th/id/R.2804701bad4f4423e4afd0d5b1cd9dc1?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8776C2BBD9D04B54393877EBE30305B2D2EBC0AF","accentColor":"B31825","isFresh":true},"7709B3F529180DFE37D58E5A402F9BF70DADD8D1":{"name":"Ronaldinho FC Barcelona 2005/06 Reissue Long Sleeve Shirt | FC ...","thumbnailUrl":"https://tse2.mm.bing.net/th?id=OIF.RpxRq0Uec7Al%2fV0QQ%2feNig&pid=Api","datePublished":"2026-03-22T15:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://store.fcbarcelona.com/cdn/shop/files/Reissue_Ronnie_BLM_FCB_Ecom_012.jpg?v=1774184770&width=1200","hostPageUrl":"https://store.fcbarcelona.com/en-in/collections/on-pitch/products/ronaldinho-fc-barcelona-2005-06-reissue-long-sleeve-jersey","contentSize":"239833 B","width":1200,"height":1600,"cDNContentUrl":"https://th.bing.com/th/id/R.f3a92c8e67ea22ee4bb0338ee7239049?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1D8DDAD07FB9F204A5E85D73EFD081925F3B9077","accentColor":"0066BA","isFresh":true},"485CEB7D67870078E4265D63B61FBAF15D51E03A":{"name":"Рыночная структура — Teletype","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Iu0_f4Vbc4s41YpbjFuoqgHaEe?pid=Api","datePublished":"2022-04-22T14:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://telegra.ph/file/22df86b269cfe95e506db.png","hostPageUrl":"https://teletype.in/@cryptologykey/STRUKTURA-RYNKA-06-23","contentSize":"100174 B","width":1778,"height":1076,"cDNContentUrl":"https://th.bing.com/th/id/R.22ed3f7f855b738b38d58a5b8c5ba8aa?rik=hMW%2b13Z4AIdOYg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A30E15D51FABF16B36D5624E87007876D7BEC584","accentColor":"BA1F11"},"F9A39B9EDF3B2BFF1A53D5144DEA83C8C29B6811":{"name":"Indian 500 rupee Images - Free Download on Freepik","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.SsYgSNXhJFo9sDQA6eCxnwHaF8?pid=Api","datePublished":"2023-08-29T05:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.freepik.com/free-vector/indian-inr-rupee-sign-background-exchange-security_1017-44465.jpg?semt=ais_hybrid&w=740&q=80","hostPageUrl":"https://www.freepik.com/free-photos-vectors/indian-500-rupee","contentSize":"33466 B","width":740,"height":594,"cDNContentUrl":"https://th.bing.com/th/id/R.4ac62048d5e1245a3db03400e9e0b19f?rik=nzq56f2zsv%2bhNQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1186B92C8C38AED4415D35A1FFB2B3FDE9B93A9F","accentColor":"1A8AB1"},"3844D431102605FE076FC5EBF6A05747C4C0466A":{"name":"Can A Face Towel Trigger Acne Mechanica? – Doctor Towels","thumbnailUrl":"https://tse1.mm.bing.net/th?id=OIF.QgB%2b1di3eniNcROZ0qp9oA&pid=Api","datePublished":"2026-04-16T04:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.doctortowels.com/cdn/shop/files/Box_Packing_converted.avif?v=1763360582&width=3840","hostPageUrl":"https://www.doctortowels.com/blogs/tips-and-diy-on-skincare-wellness-personal-hygiene-1/can-a-face-towel-trigger-acne-mechanica","contentSize":"75505 B","width":1001,"height":1192,"cDNContentUrl":"https://th.bing.com/th/id/R.47a529b4060c986b2be1ff519f930fab?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A6640C4C74750A6FBE5CF670EF506201134D4483","accentColor":"585450","isFresh":true},"A190C0AA449E9694754D581C9356DD8B977347C6":{"name":"Shop Electronics Products Online in India – Top Gadgets & Accessories ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.B8985WGAUuKDCwxkpU5epwHaFC?pid=Api","datePublished":"2019-01-06T19:33:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images-cdn.ubuy.co.in/635ed26b75c9654bbb4e1593-aofoto-10x7ft-nebula-starry-sky-backdrop.jpg","hostPageUrl":"https://www.ubuy.co.in/category/electronics-10171","contentSize":"148093 B","width":1089,"height":741,"cDNContentUrl":"https://th.bing.com/th/id/R.07cf7ce5618052e2830b0c64a54e5ea7?rik=GgkMqkTpaUlX1A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6C743779B8DD6539C185D4574969E944AA0C091A","accentColor":"210E37"},"C1B7D34FBB1AB7055B5211B26A43D94F35302496":{"name":"FC Barcelona 2005/06 Reissue Long Sleeve Shirt | FC Barcelona – Barça ...","thumbnailUrl":"https://tse2.mm.bing.net/th?id=OIF.IAe1WGt%2fBecdE4pz%2fcbvFw&pid=Api","datePublished":"2026-04-14T15:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://store.fcbarcelona.com/cdn/shop/files/Reissue_Ronnie_BLM_FCB_Ecom_011.jpg?v=1774184752&width=1200","hostPageUrl":"https://store.fcbarcelona.com/en-in/collections/clothing/products/fc-barcelona-2005-06-reissue-long-sleeve-jersey","contentSize":"246152 B","width":1200,"height":1600,"cDNContentUrl":"https://th.bing.com/th/id/R.7c469a09649a6e10ad6d8e2f7e5e5fed?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"69420353F49D34A62B1125B5507BA1BBF43D7B1C","accentColor":"0068BE","isFresh":true},"7894547D0E4F6AA4BBC011B26A43D94F35302496":{"name":"FC Barcelona 2005/06 Reissue Long Sleeve Shirt | FC Barcelona – Barça ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIF.T8bhM4GZEffTtVolbWPB1A?pid=Api","datePublished":"2026-04-14T15:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://store.fcbarcelona.com/cdn/shop/files/Reissue_Ronnie_BLM_FCB_Ecom_009.jpg?v=1774184752&width=1200","hostPageUrl":"https://store.fcbarcelona.com/en-in/collections/clothing/products/fc-barcelona-2005-06-reissue-long-sleeve-jersey","contentSize":"326587 B","width":1200,"height":1600,"cDNContentUrl":"https://th.bing.com/th/id/R.abd5323f6403827727531a66d18542ca?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"69420353F49D34A62B110CBB4AA6F4E0D7454987","accentColor":"0062BA","isFresh":true},"2CDBC1CA9917E5DBE36A7421DAFDCD2403385DFA":{"name":"Cryptocurrencies aren’t really a solution to our problems","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.lvQpbJ7s2C4aU3F58gFJ3wHaFN?pid=Api","datePublished":"2020-08-06T09:05:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://iit-techambit.in/content/images/2020/05/image-34-1.png","hostPageUrl":"https://iit-techambit.in/cryptocurrenciesarent-really-a-solutionto-our-problems/","contentSize":"1115151 B","width":1022,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.96f4296c9eecd82e1a537179f20149df?rik=wr0crJlxXr0%2bpg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AFD5833042DCDFAD1247A63EBD5E7199AC1CBDC2","accentColor":"2988A2"},"2D4AAB691B0F2E98AC29CD0A3AD8B117F9F58EFF":{"name":"Teaching Faculty","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.TjXMSjj9pEF95HY9V3mobgAAAA?pid=Api","datePublished":"2023-04-26T08:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://crraoaimscs.res.in/btech/images/teachars/7.jpg","hostPageUrl":"https://crraoaimscs.res.in/btech/teaching-faculty.php","contentSize":"111705 B","width":300,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.4e35cc4a38fda4417de4763d5779a86e?rik=0qS6lrHw4onKkg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FFE85F9F711B8DA3A0DC92CA89E2F0B196BAA4D2","accentColor":"394A92"},"0BF226DDAAA382AC8D4B8E5A402F9BF70DADD8D1":{"name":"Ronaldinho FC Barcelona 2005/06 Reissue Long Sleeve Shirt | FC ...","thumbnailUrl":"https://tse3.mm.bing.net/th?id=OIF.RCT%2bKTp%2fdFIaSgTHlv7YgQ&pid=Api","datePublished":"2026-03-22T15:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://store.fcbarcelona.com/cdn/shop/files/Reissue_Ronnie_BLM_FCB_Ecom_002.jpg?v=1774184770&width=1200","hostPageUrl":"https://store.fcbarcelona.com/en-in/collections/on-pitch/products/ronaldinho-fc-barcelona-2005-06-reissue-long-sleeve-jersey","contentSize":"277505 B","width":1200,"height":1600,"cDNContentUrl":"https://th.bing.com/th/id/R.2a29ef4298029b0f3411035ce99b5b34?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1D8DDAD07FB9F204A5E8B4D8CA283AAADD622FB0","accentColor":"006AB8","isFresh":true},"3A23B9EEBE1530BF0F4BBD06101748A3BA1EB43E":{"name":"Teaching Faculty","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.rWYA0-hZbBf4i1HIxNchNwAAAA?pid=Api","datePublished":"2023-05-29T15:46:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.crraoaimscs.ac.in/images/teachars/11.jpg","hostPageUrl":"https://crraoaimscs.ac.in/teaching-faculty.php","contentSize":"84903 B","width":300,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.ad6600d3e8596c17f88b51c8c4d72137?rik=ozKb7utRA%2fvwtA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E34BE1AB3A84710160DBB4F0FB0351EBEE9B32A3","accentColor":"44486B"},"AC2AA088375D5317E08F2F610809A880A7B4B4B2":{"name":"Nike Academy Tee – Alexia Putellas Junior – Barça Official Store","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIF.RnBBNIhRchw1esGAsm0pjw?pid=Api","datePublished":"2026-03-24T14:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://store.fcbarcelona.com/cdn/shop/files/Mesadetrabajo1-07.png?v=1769776572&width=1200","hostPageUrl":"https://store.fcbarcelona.com/en-in/collections/match-day-women/products/tee-nike-academy-alexia-putellas-junior","contentSize":"2095201 B","width":1200,"height":1601,"cDNContentUrl":"https://th.bing.com/th/id/R.94cd5c978dd5a2dc5f6ed4df03d07313?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2B4B4B7A088A908016F2F80E7135D573880AA2CA","accentColor":"734F5A","isFresh":true},"BBE238080D8E7AA3F873B4A0407BFE730C7334FE":{"name":"Ликвидность — Teletype","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.8l_QE1Y3L9ZiL1jtFrC9XAHaF1?pid=Api","datePublished":"2022-04-14T06:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img2.teletype.in/files/d8/c0/d8c05cb2-7efd-4fed-b541-b7a361b05dce.jpeg","hostPageUrl":"https://teletype.in/@cryptologykey/Likvidnost-07-16","contentSize":"42199 B","width":1232,"height":972,"cDNContentUrl":"https://th.bing.com/th/id/R.f25fd01356372fd6622f58ed16b0bd5c?rik=uy6DgNDopzqPNw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EF4337C037EFB7040A4B378F3AA7E8D080832EBB","accentColor":"626469"}},"relatedSearches":[{"text":"Cryptography Background","displayText":"Cryptography Background","webSearchUrl":"https://www.bing.com/images/search?q=Cryptography+Background&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6072.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cryptography+Background","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Cryptography+Background&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cryptology Symbols","displayText":"Cryptology Symbols","webSearchUrl":"https://www.bing.com/images/search?q=Cryptology+Symbols&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6074.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cryptology+Symbols","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Cryptology+Symbols&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Quantum Cryptography","displayText":"Quantum Cryptography","webSearchUrl":"https://www.bing.com/images/search?q=Quantum+Cryptography&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6076.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Quantum+Cryptography","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Quantum+Cryptography&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cryptic Background","displayText":"Cryptic Background","webSearchUrl":"https://www.bing.com/images/search?q=Cryptic+Background&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6078.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cryptic+Background","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Cryptic+Background&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cryptography Wallpaper","displayText":"Cryptography Wallpaper","webSearchUrl":"https://www.bing.com/images/search?q=Cryptography+Wallpaper&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6080.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cryptography+Wallpaper","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Cryptography+Wallpaper&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Computer Cryptography","displayText":"Computer Cryptography","webSearchUrl":"https://www.bing.com/images/search?q=Computer+Cryptography&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6082.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Computer+Cryptography","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Computer+Cryptography&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cryptology David Ware","displayText":"Cryptology David Ware","webSearchUrl":"https://www.bing.com/images/search?q=Cryptology+David+Ware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6084.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cryptology+David+Ware","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Cryptology+David+Ware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cryptology Photos","displayText":"Cryptology Photos","webSearchUrl":"https://www.bing.com/images/search?q=Cryptology+Photos&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6086.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cryptology+Photos","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Cryptology+Photos&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cryptography Images","displayText":"Cryptography Images","webSearchUrl":"https://www.bing.com/images/search?q=Cryptography+Images&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6088.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cryptography+Images","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Cryptography+Images&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Post Quantum Cryptography","displayText":"Post Quantum Cryptography","webSearchUrl":"https://www.bing.com/images/search?q=Post+Quantum+Cryptography&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6090.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Post+Quantum+Cryptography","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Post+Quantum+Cryptography&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cryptographic","displayText":"Cryptographic","webSearchUrl":"https://www.bing.com/images/search?q=Cryptographic&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6092.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cryptographic","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Cryptographic&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cryptography Poster","displayText":"Cryptography Poster","webSearchUrl":"https://www.bing.com/images/search?q=Cryptography+Poster&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6094.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cryptography+Poster","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Cryptography+Poster&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Symmetric-Key Cryptography","displayText":"Symmetric-Key Cryptography","webSearchUrl":"https://www.bing.com/images/search?q=Symmetric-Key+Cryptography&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6096.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Symmetric-Key+Cryptography","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Symmetric-Key+Cryptography&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cryptologic Designs","displayText":"Cryptologic Designs","webSearchUrl":"https://www.bing.com/images/search?q=Cryptologic+Designs&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6098.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cryptologic+Designs","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Cryptologic+Designs&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Mathematical Background for Cryptography","displayText":"Mathematical Background for Cryptography","webSearchUrl":"https://www.bing.com/images/search?q=Mathematical+Background+for+Cryptography&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6100.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Mathematical+Background+for+Cryptography","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Mathematical+Background+for+Cryptography&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Crytography Images","displayText":"Crytography Images","webSearchUrl":"https://www.bing.com/images/search?q=Crytography+Images&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6102.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Crytography+Images","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Crytography+Images&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Kriptography","displayText":"Kriptography","webSearchUrl":"https://www.bing.com/images/search?q=Kriptography&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6104.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Kriptography","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Kriptography&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Modern Cryptology","displayText":"Modern Cryptology","webSearchUrl":"https://www.bing.com/images/search?q=Modern+Cryptology&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6106.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Modern+Cryptology","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Modern+Cryptology&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cryptology School","displayText":"Cryptology School","webSearchUrl":"https://www.bing.com/images/search?q=Cryptology+School&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6108.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cryptology+School","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Cryptology+School&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cryptology Images","displayText":"Cryptology Images","webSearchUrl":"https://www.bing.com/images/search?q=Cryptology+Images&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,6110.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cryptology+Images","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Cryptology+Images&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}}],"createdate":1776326682095}
            [curl_error] => 
            [product_name_used] => Cryptology-Background
            [parsed] => Array
                (
                    [name] => cryptology-background inr loc:in
                    [totalEstimatedMatches] => 247
                    [nextOffset] => 120
                    [currentOffset] => 0
                    [value] => Array
                        (
                            [648A3B8A024F551FAF3F515832B3BA6831653543] => Array
                                (
                                    [name] => Himachal Family Tour Packages starting at 25000 INR per person
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.XdEa69vvXfQUDVlScS1blAHaEK?pid=Api
                                    [datePublished] => 2023-10-29T00:17:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.indiatourismpackage.com/assets/images/backgrounds/inner-image/himachal-family-tour-package.webp
                                    [hostPageUrl] => https://www.indiatourismpackage.com/family-tour-package-in-himachal
                                    [contentSize] => 99264 B
                                    [width] => 1200
                                    [height] => 675
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5dd11aebdbef5df4140d5952712d5b94?rik=RqizqCD0VfH68w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3453561386AB3B238515F3FAF155F420A8B3A846
                                    [accentColor] => CA4F01
                                )

                            [5E1BDF79FCFA30807121410014593C7265830006] => Array
                                (
                                    [name] => Book Kullu Tour Packages at 10,000 INR
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.XkzvbQXEjdok8Zl3jO9LegHaCU?pid=Api
                                    [datePublished] => 2023-12-21T23:03:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.indiatourismpackage.com/assets/images/backgrounds/kullu-tour-packages.webp
                                    [hostPageUrl] => https://www.indiatourismpackage.com/kullu-tour-packages
                                    [contentSize] => 186524 B
                                    [width] => 1600
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5e4cef6d05c48dda24f199778cef4b7a?rik=5bH9l8%2bvAwgXEg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6000385627C39541001412170803AFCF97FDB1E5
                                    [accentColor] => 2971A2
                                )

                            [11DEEDC5A554209F24979507361D14FAF11F620F] => Array
                                (
                                    [name] => Book Kufri Tour Packages at Best Deal starting at 9,999 INR
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Zg5O4SA7CbuDp_Gto2y6MAHaCU?pid=Api
                                    [datePublished] => 2023-10-29T00:17:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.indiatourismpackage.com/assets/images/backgrounds/kufri-tour-packages.webp
                                    [hostPageUrl] => https://www.indiatourismpackage.com/kufri-tour-packages
                                    [contentSize] => 100082 B
                                    [width] => 1600
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.660e4ee1203b09bb83a7f1ada36cba30?rik=Ee3eXFpFAvlCeQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F026F11FAF41D16370597942F902455A5CDEED11
                                    [accentColor] => 0872C3
                                )

                            [F3BDACCB138F7425ED5F515832B3BA6831653543] => Array
                                (
                                    [name] => Himachal Family Tour Packages starting at 25000 INR per person
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.cUA138YqLsWXdbckfIO_jQHaE8?pid=Api
                                    [datePublished] => 2023-10-29T00:17:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.indiatourismpackage.com/assets/images/backgrounds/inner-image/family-tour-package-in-himachal-highlight.webp
                                    [hostPageUrl] => https://www.indiatourismpackage.com/family-tour-package-in-himachal
                                    [contentSize] => 59262 B
                                    [width] => 600
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.714035dfc62a2ec59775b7247c83bf8d?rik=P9vKvDH4R1Le9Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3453561386AB3B238515F5DE5247F831BCCADB3F
                                    [accentColor] => 1F486A
                                )

                            [8FFF4278716F9419AE7169D1C22A88832A9BB886] => Array
                                (
                                    [name] => Cryptology
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.k5A6gDIGyYs40hf9DAz9AwHaEn?pid=Api
                                    [datePublished] => 2023-07-19T13:49:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://vajiramandravi.com/current-affairs/wp-content/uploads/2025/03/cryptology-768x479.jpg
                                    [hostPageUrl] => https://vajiramandravi.com/current-affairs/cryptology/
                                    [contentSize] => 49457 B
                                    [width] => 768
                                    [height] => 479
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.93903a803206c98b38d217fd0c0cfd03?rik=%2bP8khxf2SZHqFw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 688BB9A23888A22C1D9617EA9149F6178724FFF8
                                    [accentColor] => 0B90C0
                                )

                            [6E5C7491B9DAA18D2A5FB423CD5D0759C76AAA18] => Array
                                (
                                    [name] => Un apunte a la Criptografía Cuántica | Meer
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.iNiAyDbo719oEP0FC_KklQHaEK?pid=Api
                                    [datePublished] => 2018-10-08T16:38:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://media.meer.com/attachments/8ac5aec8f6f97a724f0184bbd71aaadd9d1806a1/store/fill/1090/613/70f810155d27fc6c4e027c6bd97d018c89687c9a9a871ac9f6e8f0ed5f9a/La-base-de-la-criptografia-consiste-en-cifrar-o-descifrar-mensajes-por-medio-de-una-llave.jpg
                                    [hostPageUrl] => https://www.meer.com/es/43903-un-apunte-a-la-criptografia-cuantica
                                    [contentSize] => 281551 B
                                    [width] => 1090
                                    [height] => 613
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.88d880c836e8ef5f6810fd050bf2a495?rik=5sVHGZutGtii9Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 81AAA67C9570D5DC324BF5A2D81AAD9B1947C5E6
                                    [accentColor] => 0282C4
                                )

                            [B5C307BD35C6796688007F0188D54B85FA452185] => Array
                                (
                                    [name] => Cryptography | Insecure Lab
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.FK-tp5swIGIQz9I5CkMvuQHaD4?pid=Api
                                    [datePublished] => 2019-11-08T20:33:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.insecure.in/images/cover/cryptography.webp
                                    [hostPageUrl] => https://www.insecure.in/cryptography
                                    [contentSize] => 42882 B
                                    [width] => 1200
                                    [height] => 628
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.14afada79b30206210cfd2390a432fb9?rik=Wzxw21Nsl2aIAA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 581254AF58B45D8810F7008866976C53DB703C5B
                                    [accentColor] => C88203
                                )

                            [DB4E1B213096B4EC53A9EE5D75CCD20DC378A4BF] => Array
                                (
                                    [name] => CRYPTOLOGY | IAS GYAN
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.23Ysi_I29Z_9HLM_fSf4RgHaCq?pid=Api
                                    [datePublished] => 2022-11-28T16:28:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.iasgyan.in/ig-uploads/images/image02633.png
                                    [hostPageUrl] => https://www.iasgyan.in/daily-current-affairs/cryptology
                                    [contentSize] => 12217 B
                                    [width] => 1265
                                    [height] => 454
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.db762c8bf236f59ffd1cb33f7d27f846?rik=veSxEgNpS841mg&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => FB4A873CD02DCC57D5EE9A35CE4B690312B1E4BD
                                    [accentColor] => 009E4F
                                )

                            [03DB45CEDD752128D937FC3F1203931AB42306F6] => Array
                                (
                                    [name] => What is Cryptography?
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.aSErGP5dFfwJdg2eUAWpigHaE7?pid=Api
                                    [datePublished] => 2020-06-15T20:54:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://content.kaspersky-labs.com/fm/press-releases/d9/d9de508916a1aa74fef26ded2c93a839/processed/what-is-cryptography-1-q75.jpg
                                    [hostPageUrl] => https://www.kaspersky.co.in/resource-center/definitions/what-is-cryptography
                                    [contentSize] => 38129 B
                                    [width] => 670
                                    [height] => 446
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.69212b18fe5d15fc09760d9e5005a98a?rik=ML1U7N1XEoKdcw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6F60324BA1393021F3CF739D821257DDEC54BD30
                                    [accentColor] => 337298
                                )

                            [612B1C184A635A53D4D19DF74DA77CEED5DA84B0] => Array
                                (
                                    [name] => Top 8 Strongest Data Encryption Algorithms in Cryptography
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.bX-gzxfQ0qaudrPs5zwymQHaEj?pid=Api
                                    [datePublished] => 2020-01-21T10:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://acodez.in/wp-content/uploads/2020/01/how-encryption-works-symmetric-encryption.png
                                    [hostPageUrl] => https://acodez.in/data-encryption-algorithms/
                                    [contentSize] => 67377 B
                                    [width] => 664
                                    [height] => 408
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6d7fa0cf17d0d2a6ae76b3ece73c3299?rik=FrLBgaQ2pTVNHQ&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 0B48AD5DEEC77AD47FD91D4D35A536A481C1B216
                                    [accentColor] => BE550D
                                )

                            [2970BD9FAD1EEE581FDF24D692FFA06B39776E7F] => Array
                                (
                                    [name] => Research Areas
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.r_Ap5NiKvwiJVWcNpjyLnwAAAA?pid=Api
                                    [datePublished] => 2022-08-22T11:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://crraoaimscs.in/images/2_Cryptography_and_cryptanalysis.png
                                    [hostPageUrl] => https://crraoaimscs.in/research-areas.php
                                    [contentSize] => 341413 B
                                    [width] => 474
                                    [height] => 355
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.aff029e4d88abf088955670da63c8b9f?rik=kgfb%2bdrh7oXx%2fQ&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => F7E67793B60AFF296D42FDF185EEE1DAF9DB0792
                                    [accentColor] => 0BB5C0
                                )

                            [65F895BB9A495CE487B04DE2FA79B15986A584AA] => Array
                                (
                                    [name] => Century-Old Cryptography Technique With 'Perfect Secrecy' Inspires The ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.sQ48hOvuhUoUq30RXAtrUgHaEe?pid=Api
                                    [datePublished] => 2019-12-23T09:27:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://sm.mashable.com/mashable_in/seo/default/century-old-cryptography-technique-with-perfect-secrecy-insp_dmd8.jpg
                                    [hostPageUrl] => https://in.mashable.com/tech/9733/century-old-cryptography-technique-with-perfect-secrecy-inspires-the-most-secure-chip
                                    [contentSize] => 717687 B
                                    [width] => 2100
                                    [height] => 1268
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b10e3c84ebee854a14ab7d115c0b6b52?rik=Vo9Zu6mUxU54Cw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AA485A68951B97AF2ED40B784EC594A9BB598F56
                                    [accentColor] => 0583C6
                                )

                            [DED2F32CA13F921F995D42E874BC3610869A32AE] => Array
                                (
                                    [name] => A Novel Secure End-to-End IoT Communication Scheme Using Lightweight ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Ctxz9LR23pIGm_2CdbtY4QHaEI?pid=Api
                                    [datePublished] => 2022-09-01T15:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/applsci/applsci-12-08817/article_deploy/html/images/applsci-12-08817-g002.png?1662348680
                                    [hostPageUrl] => https://www.mdpi.com/2076-3417/12/17/8817
                                    [contentSize] => 438575 B
                                    [width] => 3230
                                    [height] => 1805
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0adc73f4b476de92069bfd8275bb58e1?rik=7S0%2fwhrzKfGZ1Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EA23A9680163CB478E24D599F129F31AC23F2DED
                                    [accentColor] => 01B04E
                                )

                            [5BC80EB8ECF4090210E5F20370B7FF341BE4617A] => Array
                                (
                                    [name] => Beginner Guide to Classic Cryptography
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.d1x-bYAvpEqfqv6xjWTL7AHaDH?pid=Api
                                    [datePublished] => 2017-11-03T16:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://1.bp.blogspot.com/--a4AsaCmxwk/WfyheTdApJI/AAAAAAAASO4/aTMlohWjsDsokNpRn6qD63WNFRSF8AsZgCEwYBhgL/s1600/0.png
                                    [hostPageUrl] => https://www.hackingarticles.in/beginner-guide-classic-cryptography/
                                    [contentSize] => 32136 B
                                    [width] => 651
                                    [height] => 274
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.775c7e6d802fa44a9faafeb18d64cbec?rik=tYzgi85PkCABXg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A7164EB143FF7B07302F5E0120904FCE8BE08CB5
                                    [accentColor] => BFAC0C
                                )

                            [CD3282C252656364B7E7ACFC1F90F8AA6B71A058] => Array
                                (
                                    [name] => National Workshop on Cryptology 2025
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.SBOqGjoNg75E-imteNunBQHaG9?pid=Api
                                    [datePublished] => 2025-11-16T09:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://events.iitbhilai.ac.in/nwc/assets/gm-Kk_ePBbu.jpeg
                                    [hostPageUrl] => https://events.iitbhilai.ac.in/nwc/
                                    [contentSize] => 338787 B
                                    [width] => 1600
                                    [height] => 1503
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4813aa1a3a0d83be44fa29ad78dba705?rik=3CMoLCVWNkZ7fg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 850A17B6AA8F09F1CFCA7E7B463656252C2823DC
                                    [accentColor] => 852E2D
                                )

                            [F83504E20E8090B34B8B21CF1CF96821A5DC14E7] => Array
                                (
                                    [name] => Cryptography Services at Zettawise | Zettawise Consulting Services
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.8t15MDQoSz5gTV_JfISOSwHaJC?pid=Api
                                    [datePublished] => 2025-08-12T16:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://zettawise.in/upload/cryptology-service-zettawise.jpg
                                    [hostPageUrl] => https://zettawise.in/cryptography.php
                                    [contentSize] => 631303 B
                                    [width] => 2633
                                    [height] => 3212
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f2dd793034284b3e604d5fc97c848e4b?rik=j1NALuAICTu0uA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7E41CD5A12869FC1FC12B8B43B0908E02E40538F
                                    [accentColor] => 4F4F4F
                                )

                            [13FB2929F51F15A542557414B578C547FB2C4E44] => Array
                                (
                                    [name] => Cryptology Research Society of India
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.R59WnbXkrjnruCW-mtGzxwHaKe?pid=Api
                                    [datePublished] => 2018-01-08T20:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://crsind.in/crsind-content/uploads/2024/07/ISCISC2024.jpg
                                    [hostPageUrl] => https://crsind.in/
                                    [contentSize] => 1941583 B
                                    [width] => 1578
                                    [height] => 2231
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.479f569db5e4ae39ebb825be9ad1b3c7?rik=Mb%2bSkl%2fxUVokVQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 44E4C2BF745C875B414755245A51F15F9292BF31
                                    [accentColor] => 1485B7
                                )

                            [7A8AF763C0E360773F1AD7BFC11EC373AE7C8797] => Array
                                (
                                    [name] => Cryptography Cheat Sheet for 2025
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.RUJjMM073oUXe4OrS-2chAHaD4?pid=Api
                                    [datePublished] => 2023-08-19T09:01:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.insecure.in/images/cover/cryptography-cheat-sheet.webp
                                    [hostPageUrl] => https://www.insecure.in/cryptography-cheat-sheet
                                    [contentSize] => 28968 B
                                    [width] => 1200
                                    [height] => 628
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.45426330cd3bde85177b83ab4bed9c84?rik=p6h%2fNgw%2bBnfzoQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7978C7EA373CE11CFB7DA1F377063E0C367FA8A7
                                    [accentColor] => CB4500
                                )

                            [25177186C2D19F46188A581751C4B90D1880A943] => Array
                                (
                                    [name] => Buy Cryptology and Network Security with Machine Learning: Proceedings ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.0pcpIC_DGdqy9jxkIdN5kwAAAA?pid=Api
                                    [datePublished] => 2023-04-28T00:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/4128lbVHe-L._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Cryptology-Network-Security-Machine-Learning/dp/9819922283
                                    [contentSize] => 21953 B
                                    [width] => 295
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d29729202fc319dab2f63c6421d37993?rik=UnEXaCwd%2bWSBqA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 349A0881D09B4C157185A88164F91D2C68177152
                                    [accentColor] => B93112
                                )

                            [871ED834FA2E343C4E1E245FB066C58AEA8A0363] => Array
                                (
                                    [name] => Mastering Blockchain: Inner workings of blockchain, from cryptography ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.uJFGfZBtza8ASzm-xuiVywHaJI?pid=Api
                                    [datePublished] => 2022-09-05T21:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/81RkhtwQcPL._SL1500_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Mastering-Blockchain-technical-blockchain-cryptography-ebook/dp/B0B4P2VC76
                                    [contentSize] => 147022 B
                                    [width] => 1216
                                    [height] => 1500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b891467d906dcdaf004b39bec6e895cb?rik=eOGNQ6%2fiQ8Pk4Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3630A8AEA85C660BF542E1E4C343E2AF438DE178
                                    [accentColor] => BA4011
                                )

                            [15616739B9082363FDE2E1BF7D99E71520E6B124] => Array
                                (
                                    [name] => International Conference on Cryptology and Cybersecurity - 2020 ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.yjz8Gqt_e_30gzs5dBmH7wHaEM?pid=Api
                                    [datePublished] => 2025-03-25T09:36:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.n-coe.in/sites/default/files/2025-03/international-conference-on-cryptology-and-cybersecurity-2020.png
                                    [hostPageUrl] => https://www.n-coe.in/events/international-conference-cryptology-and-cybersecurity-2020
                                    [contentSize] => 85964 B
                                    [width] => 960
                                    [height] => 544
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ca3cfc1aab7f7bfdf4833b39741987ef?rik=URZ2k5uAMjbfLg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 421B6E02517E99D7FB1E2EDF3632809B93761651
                                    [accentColor] => 931AB1
                                )

                            [B9A75B58540A6440FC43CB9C3E44A61A1AB52392] => Array
                                (
                                    [name] => What is Cryptography - What is Cryptography Definition: Cryptography is ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.gwCBAyUS5i1xHkhL8tseMQHaJl?pid=Api
                                    [datePublished] => 2022-09-18T12:27:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/3545159973a45af60704f4f5f80c7938/thumb_1200_1553.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/university-of-calicut/mathematics/what-is-cryptography/30785795
                                    [contentSize] => 159501 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.830081032512e62d711e484bf2db1e31?rik=m3q1hUWgRgTPNA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 29325BA1A16A44E3C9BC34CF0446A04585B57A9B
                                    [accentColor] => 434343
                                )

                            [BD91253D3B4F7A97CAB3C14D3BCDE4B36BEEEF4D] => Array
                                (
                                    [name] => Buy Advances in Cryptology – ASIACRYPT 2020 Book Online at Low Prices ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.F_xSReTL_pwmjPotdHt4_gAAAA?pid=Api
                                    [datePublished] => 2024-10-04T07:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41mJjKS7ypL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Advances-Cryptology-Huaxiong-Shiho-Moriai/dp/3030648370
                                    [contentSize] => 13843 B
                                    [width] => 294
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.17fc5245e4cbfe9c268cfa2d747b78fe?rik=2xlS07P0p3msOw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D4FEEEB63B4EDCB3D41C3BAC79A7F4B3D35219DB
                                    [accentColor] => 690309
                                )

                            [1D8E139AAF995D6D4CE8ACFC1F90F8AA6B71A058] => Array
                                (
                                    [name] => National Workshop on Cryptology 2025
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.m3iSBAxA5kYWLlHeuuWTzQHaHa?pid=Api
                                    [datePublished] => 2025-11-16T09:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://events.iitbhilai.ac.in/nwc/assets/nc-DBba_zbK.jpeg
                                    [hostPageUrl] => https://events.iitbhilai.ac.in/nwc/
                                    [contentSize] => 64558 B
                                    [width] => 592
                                    [height] => 592
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.9b7892040c40e646162e51debae593cd?rik=0egxqfqZ1dbEjg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 850A17B6AA8F09F1CFCA8EC4D6D599FAA931E8D1
                                    [accentColor] => B6152C
                                )

                            [B86DDC175584D2E437A4B3DDA040D4598DFD3121] => Array
                                (
                                    [name] => Cryptography - Free security icons
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Klyi4Va_5oF7qwUK6Bdr2AHaHa?pid=Api
                                    [datePublished] => 2022-11-17T11:17:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn-icons-png.flaticon.com/512/8948/8948693.png
                                    [hostPageUrl] => https://www.flaticon.com/free-icon/cryptography_8948693
                                    [contentSize] => 37375 B
                                    [width] => 512
                                    [height] => 512
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2a5ca2e156bfe6817bab050ae8176bd8?rik=i9bNcVVILU5zSg&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 1213DFD8954D040ADD3B4A734E2D485571CDD68B
                                    [accentColor] => 0C6DBF
                                )

                            [13A7D2474C4164CF50F3C476AA0162B95F8B938E] => Array
                                (
                                    [name] => Buy Codes, Cryptology and Information Security Book Online at Low ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.vubNZxaEFvc619TtTodIfwAAAA?pid=Api
                                    [datePublished] => 2025-03-11T01:31:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/21JxKId51CL.jpg
                                    [hostPageUrl] => https://www.amazon.in/Cryptology-Information-Security-Abderrahmane-Mamoun/dp/3319555898
                                    [contentSize] => 5675 B
                                    [width] => 182
                                    [height] => 277
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.bee6cd67168416f73ad7d4ed4e87487f?rik=MXotdMQURvwFPw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E839B8F59B2610AA674C3F05FC4614C4742D7A31
                                    [accentColor] => AE102F
                                )

                            [98A906B14DEEE18029421BAA8AEA7DBCF8889C9F] => Array
                                (
                                    [name] => Индикаторы и полезные материалы Cryptology — Teletype
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.ES0zuUiBxZclPYV22_fzKQHaCs?pid=Api
                                    [datePublished] => 2022-08-27T08:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img1.teletype.in/files/4e/2e/4e2ecb34-74a5-4172-9775-94377cc58a83.png
                                    [hostPageUrl] => https://teletype.in/@cryptologykey/cryptology-indicators
                                    [contentSize] => 670436 B
                                    [width] => 1918
                                    [height] => 696
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.112d33b94881c597253d8576dbf7f329?rik=iZpgG9TuHgiSJA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F9C9888FCBD7AEA8AAB12492081EEED41B609A89
                                    [accentColor] => B75B14
                                )

                            [D4E67A1FE983AA7DA9C2CA3077C395EA367D6D06] => Array
                                (
                                    [name] => Cybersecurity Trends: Emerging Threats and Technologies in the ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.Blr_tWM0JCEWIdvYnTOjgAHaE7?pid=Api
                                    [datePublished] => 2023-12-09T17:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://prod.ifacet.in/images/uploads/Introduction-to-Cryptography-for-Beginners.jpg
                                    [hostPageUrl] => https://www.eicta.iitk.ac.in/knowledge-hub/cyber-security/cybersecurity-trends-emerging-threats-and-technologies-in-the-cybersecurity-landscape
                                    [contentSize] => 48430 B
                                    [width] => 640
                                    [height] => 426
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.065affb5633424211621dbd89d33a380?rik=TW6n8Z44qteaLA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 60D6D763AE593C7703AC2C9AD7AA389EF1A76E4D
                                    [accentColor] => 1D92AE
                                )

                            [F0A3451B8ECE907A216FB0C80EF2CF0FC9783A73] => Array
                                (
                                    [name] => Groups, Complexity, Cryptology Walter de Gruyter Journal Impact Factor ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.UeXUMtTeCHtfUmwVJa8KbQHaDI?pid=Api
                                    [datePublished] => 2022-04-22T18:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/journals/groups-complexity-cryptology.jpg
                                    [hostPageUrl] => https://slogix.in/research/journals/groups-complexity-cryptology/
                                    [contentSize] => 17160 B
                                    [width] => 850
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.51e5d432d4de087b5f526c1525af0a6d?rik=DzpUsejsCacS9g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 37A3879CF0FC2FE08C0BF612A709ECE8B1543A0F
                                    [accentColor] => 161847
                                )

                            [F34E5A237199113DE4431122686470808BFF824E] => Array
                                (
                                    [name] => Journal of Mathematical Cryptology Walter de Gruyter Impact Factor | S ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.eO7PAeOs2siqTPMkYimRHgHaDI?pid=Api
                                    [datePublished] => 2022-04-22T18:46:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/journals/journal-of-mathematical-cryptology.jpg
                                    [hostPageUrl] => https://slogix.in/research/journals/journal-of-mathematical-cryptology/
                                    [contentSize] => 32816 B
                                    [width] => 850
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.78eecf01e3acdac8aa4cf3246229911e?rik=P%2bSlMheZEdNONA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E428FFB8080746862211344ED311991732A5E43F
                                    [accentColor] => 0B2777
                                )

                            [7B25DE65CDFED97758E7D452AEA388D681384A2E] => Array
                                (
                                    [name] => Buy Information Theory, Coding and Cryptography Book Online at Low ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.hkQzTIED1OKVO-0UlWKblQAAAA?pid=Api
                                    [datePublished] => 2008-04-25T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/51moK3xsktL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Information-Theory-Coding-Cryptography-Ranjan/dp/0070669015
                                    [contentSize] => 17438 B
                                    [width] => 339
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8644334c8103d4e2953bed1495629b95?rik=t1LtVtzvnXeFfg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E2A483186D883AEA254D7E85779DEFDC56ED52B7
                                    [accentColor] => BA5411
                                )

                            [9E9C62D1D463FF9F6378FDC9B206E1E1B9B15C20] => Array
                                (
                                    [name] => CB3491 CCS unit 1,2,4 - Cryptography and Cyber Security two mark ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.q3hvC7eKbnVJsEfIWojpQAHaFO?pid=Api
                                    [datePublished] => 2023-11-06T02:51:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/5e9c2cf93290550524e05b508cb5ece7/thumb_1200_848.webp
                                    [hostPageUrl] => https://www.studocu.com/in/document/anna-university/cryptography-and-cybersecurity/cb3491-ccs-unit-124-cryptography-and-cyber-security-two-mark-question-and-answers/75058985
                                    [contentSize] => 170642 B
                                    [width] => 1200
                                    [height] => 848
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ab786f0bb78a6e7549b047c85a88e940?rik=6ckmHU02%2f%2fk2hw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 02C51B9B1E1E602B9CDF8736F9FF364D1D26C9E9
                                    [accentColor] => 5D423F
                                )

                            [A3F11B95E887E348732171439F9BA3E8D96C0854] => Array
                                (
                                    [name] => Indocrypt 2024
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.rktX2TCt07K0-eML6CBK6wAAAA?pid=Api
                                    [datePublished] => 2024-03-07T16:02:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://setsindia.in/indocrypt2024/indocrypt2024/crsi_small.png
                                    [hostPageUrl] => https://setsindia.in/indocrypt2024/indocrypt
                                    [contentSize] => 233645 B
                                    [width] => 400
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ae4b57d930add3b2b4f9e30be8204aeb?rik=Oh%2bxWY54PoQ3Eg&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 4580C69D8E3AB9F934171237843E788E59B11F3A
                                    [accentColor] => AD241E
                                )

                            [0926449C620D6D64A9FD1BAA8AEA7DBCF8889C9F] => Array
                                (
                                    [name] => Индикаторы и полезные материалы Cryptology — Teletype
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.qEZY2wwWG5rI5TyoNCR3WgHaD4?pid=Api
                                    [datePublished] => 2022-08-27T08:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img2.teletype.in/files/17/9d/179d7499-2077-4ab5-ac91-a1eec04b8fb5.png
                                    [hostPageUrl] => https://teletype.in/@cryptologykey/cryptology-indicators
                                    [contentSize] => 114139 B
                                    [width] => 1200
                                    [height] => 630
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a84658db0c161b9ac8e53ca83424775a?rik=kGJEySbQ1kaa3w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F9C9888FCBD7AEA8AAB1DF9A46D6D026C9446290
                                    [accentColor] => CC0000
                                )

                            [05D8C6BE9FE064EDD8239DF74DA77CEED5DA84B0] => Array
                                (
                                    [name] => Top 8 Strongest Data Encryption Algorithms in Cryptography
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP._AmD9FmXegNtZ92-ASX9kAHaED?pid=Api
                                    [datePublished] => 2020-01-21T10:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://acodez.in/wp-content/uploads/2020/01/Asymmetric-Encryption.png
                                    [hostPageUrl] => https://acodez.in/data-encryption-algorithms/
                                    [contentSize] => 42146 B
                                    [width] => 796
                                    [height] => 435
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.fc0983f459977a036d67ddbe0125fd90?rik=UI1s6%2fkORt6NMg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0B48AD5DEEC77AD47FD9328DDE460EF9EB6C8D50
                                    [accentColor] => 264D7F
                                )

                            [BF93AFA5123DF8C8FC0CCFF25D662F8C367741F2] => Array
                                (
                                    [name] => @cryptology_01 — Teletype
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.oEZwB-6CYddlJfhPI1oEsgHaD4?pid=Api
                                    [datePublished] => 2022-10-18T08:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img1.teletype.in/files/42/31/423133c0-ad69-45fd-846b-90727169d766.png
                                    [hostPageUrl] => https://teletype.in/@cryptology_01
                                    [contentSize] => 25103 B
                                    [width] => 1200
                                    [height] => 630
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a0467007ee8261d76525f84f235a04b2?rik=%2bzn6WiHTj4zPwA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2F147763C8F266D52FFCC0CF8C8FD3215AFA39FB
                                    [accentColor] => 272724
                                )

                            [D174F4BEFEDFAC5BBCA6A2ABFBCEAAC9FE092868] => Array
                                (
                                    [name] => Buy Identity-based Cryptography: v. 2 (Cryptology and Information ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.uWJELQdJih-JhlfUyFWxMQAAAA?pid=Api
                                    [datePublished] => 2020-10-06T00:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41aQwdRZCeL.jpg
                                    [hostPageUrl] => https://www.amazon.in/Identity-based-Cryptography-Cryptology-Information-Security/dp/1586039474
                                    [contentSize] => 26940 B
                                    [width] => 345
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b962442d07498a1f898657d4c855b131?rik=HUdP6%2b%2f9yrXLag&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 868290EF9CAAECBFBA2A6ACBB5CAFDEFEB4F471D
                                    [accentColor] => 00A2B8
                                )

                            [F747A62828B9CB41470323F31190A646A2E28445] => Array
                                (
                                    [name] => Cryptology — Teletype
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.G2RC7tPiOSbElGdq9HG0PQHaEK?pid=Api
                                    [datePublished] => 2021-12-15T02:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://telegra.ph/file/b26d0d6385457a20bef07.png
                                    [hostPageUrl] => https://teletype.in/@cryptologykey
                                    [contentSize] => 1072931 B
                                    [width] => 1920
                                    [height] => 1080
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1b6442eed3e23926c494676af471b43d?rik=f3RqgoKbvBR0MA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 54482E2A646A09113F32307414BC9B82826A747F
                                    [accentColor] => 09C24E
                                )

                            [0CD62573FA7E2CE7C40DACFC1F90F8AA6B71A058] => Array
                                (
                                    [name] => National Workshop on Cryptology 2025
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.aPmuxwJxAvdpvYOvWwXsNwHaHa?pid=Api
                                    [datePublished] => 2025-11-16T09:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://events.iitbhilai.ac.in/nwc/assets/paul-oToXYMQt.png
                                    [hostPageUrl] => https://events.iitbhilai.ac.in/nwc/
                                    [contentSize] => 317709 B
                                    [width] => 512
                                    [height] => 512
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.68f9aec7027102f769bd83af5b05ec37?rik=wG1SN6%2fnwn5M0A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 850A17B6AA8F09F1CFCAD04C7EC2E7AF37526DC0
                                    [accentColor] => 376194
                                )

                            [BEEE814F2745A5F5AE1D433AB72D619233FC01F4] => Array
                                (
                                    [name] => NATIONAL CRYPTOLOGIC MUSEUM (2024) All You Need to Know BEFORE You Go ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.51_D35vugI8ow5DjNK-nOgHaEH?pid=Api
                                    [datePublished] => 2022-12-08T17:48:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://dynamic-media-cdn.tripadvisor.com/media/photo-o/07/be/b8/73/national-cryptologic.jpg?w=1800&h=1000&s=1
                                    [hostPageUrl] => https://www.tripadvisor.in/Attraction_Review-g29495-d117071-Reviews-National_Cryptologic_Museum-Annapolis_Junction_Maryland.html
                                    [contentSize] => 396377 B
                                    [width] => 1800
                                    [height] => 1000
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e75fc3df9bee808f28c390e334afa73a?rik=6%2b4Y9HJUWl%2fq0Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4F10CF332916D27BA334D1EA5F5A5472F418EEEB
                                    [accentColor] => 43651D
                                )

                            [C9143A573C4A5393FC41433AB72D619233FC01F4] => Array
                                (
                                    [name] => NATIONAL CRYPTOLOGIC MUSEUM (2026) All You Need to Know BEFORE You Go ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.6bsUyTqDZKBZPuD8_R6KFwHaEO?pid=Api
                                    [datePublished] => 2022-12-08T17:48:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://dynamic-media-cdn.tripadvisor.com/media/photo-o/0c/6a/a7/a1/photo0jpg.jpg?w=1400&h=800&s=1
                                    [hostPageUrl] => https://www.tripadvisor.in/Attraction_Review-g29495-d117071-Reviews-National_Cryptologic_Museum-Annapolis_Junction_Maryland.html
                                    [contentSize] => 215696 B
                                    [width] => 1400
                                    [height] => 800
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e9bb14c93a8364a0593ee0fcfd1e8a17?rik=nEGjdcOkNTnPFA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4F10CF332916D27BA33414CF3935A4C375A3419C
                                    [accentColor] => 99323E
                                )

                            [EEF540DEC0D47D562DF9ECC16BE2E7FBA7C4B03C] => Array
                                (
                                    [name] => NIWC-2023
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.rwqdL7Vqh3gdTtJTaZZ4_QHaCx?pid=Api
                                    [datePublished] => 2023-05-13T15:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://conferences.iitbhu.ac.in/NIWC2023/Background.jpg
                                    [hostPageUrl] => https://conferences.iitbhu.ac.in/NIWC2023/
                                    [contentSize] => 146448 B
                                    [width] => 800
                                    [height] => 300
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.af0a9d2fb56a87781d4ed253699678fd?rik=7l8E7QxN12XSnw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C30B4C7ABF7E2EB61CCE9FD265D74D0CED045FEE
                                    [accentColor] => AC5C1F
                                )

                            [E7DB0AB84EA8BF2872FDCFC7FDF1CA4D349757BA] => Array
                                (
                                    [name] => National Workshop on Cryptology 2025
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.RODBF2-WZolVPQGtxkl-pQHaJ4?pid=Api
                                    [datePublished] => 2025-11-20T10:09:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://events.iitbhilai.ac.in/nwc/assets/sahiba-SH3dATOH.jpeg
                                    [hostPageUrl] => https://events.iitbhilai.ac.in/nwc/submission-of-poster
                                    [contentSize] => 385230 B
                                    [width] => 1200
                                    [height] => 1600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.44e0c1176f966689553d01adc6497ea5?rik=fr2gi%2bSK%2b4In3w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AB757943D4AC1FDF7CFCDF2782FB8AE48BA0BD7E
                                    [accentColor] => AE1D3B
                                )

                            [EFEE4FEBF8CB6DED547B85CB5D4B779F5BB8A37C] => Array
                                (
                                    [name] => Cryptographyandnetworksecurity - CRYPTOGRAPHY AND NETWORK SECURITY BCS ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.eYsJm_KFG9kC89QCKaM20wHaKe?pid=Api
                                    [datePublished] => 2022-06-19T19:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/e4df71c2679c72e87126782fbbef7c73/thumb_1200_1698.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/mahatma-gandhi-university/computer-science/cryptographyandnetworksecurity/24203273
                                    [contentSize] => 210849 B
                                    [width] => 1200
                                    [height] => 1698
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.798b099bf2851bd902f3d40229a336d3?rik=%2fu70vo%2b81t5Ftw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C73A8BB5F977B4D5BC58B745DED6BC8FBEF4EEFE
                                    [accentColor] => 474747
                                )

                            [22A4FBC305975805F1DF5740CCD0A76D90E631FD] => Array
                                (
                                    [name] => Leading Research Books for Introduction to Modern Cryptography | S-Logix
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.knN6W3QEtu9yOEOpj_rmPQHaDN?pid=Api
                                    [datePublished] => 2022-08-10T22:03:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/network-security/introduction-to-modern-cryptography-second-edition.jpg
                                    [hostPageUrl] => https://slogix.in/network-security/introduction-to-modern-cryptography-second-edition/
                                    [contentSize] => 54935 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.92737a5b7404b6ef723843a98ffae63d?rik=Ikq%2fPFB5hVAf%2fQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DF136E09D67A0DCC0475FD1F508579503CBF4A22
                                    [accentColor] => 004B95
                                )

                            [8242249A2F598EB78B1866E823048BEBB39DEA4E] => Array
                                (
                                    [name] => Applied Cryptography LAB - APPLIED CRYPTOGRAPHY LAB B. III Year I Sem L ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.muVc-QreCWfj3VOo4tNchwHaKe?pid=Api
                                    [datePublished] => 2022-08-24T14:31:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/f4ac81507778edc9f12989b2b3a7ad3d/thumb_1200_1698.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/jawaharlal-nehru-technological-university-hyderabad/computer-science-and-engineering/applied-cryptography-lab/31336481
                                    [contentSize] => 279906 B
                                    [width] => 1200
                                    [height] => 1698
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.9ae55cf90ade0967e3dd53a8e2d35c87?rik=KCRCqfKV6Hu4gQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E4AED93BBEB840328E6681B87BE895F2A9422428
                                    [accentColor] => 3C3C3C
                                )

                            [48332C95F64621EB4121ACFC1F90F8AA6B71A058] => Array
                                (
                                    [name] => National Workshop on Cryptology 2025
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.H1kUNxvViPQezqyrrXHmKQAAAA?pid=Api
                                    [datePublished] => 2025-11-16T09:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://events.iitbhilai.ac.in/nwc/assets/avijit-Btj2t7lj.jpg
                                    [hostPageUrl] => https://events.iitbhilai.ac.in/nwc/
                                    [contentSize] => 57629 B
                                    [width] => 400
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1f5914371bd588f41eceacabad71e629?rik=hDPCWW9kEr4UEg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 850A17B6AA8F09F1CFCA1214BE12646F59C23384
                                    [accentColor] => 436D1C
                                )

                            [8B23C0E53746945DCB2A8B5A3B36A87D7D1FC071] => Array
                                (
                                    [name] => Quantum Time Bomb: When Encryption Stops Working
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.WO-3aYZCYPMEsVbpnLKEywHaDe?pid=Api
                                    [datePublished] => 2025-06-08T23:31:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.securew2.com/wp-content/uploads/2024/01/RSA-Encryption-Works.png
                                    [hostPageUrl] => https://blog.acmvit.in/quantum-timebomb
                                    [contentSize] => 25372 B
                                    [width] => 812
                                    [height] => 381
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.58efb769864260f304b156e99cb284cb?rik=uDIMXnNkSdW8og&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 170CF1D7D78A63B3A5B8A2BCD54964735E0C32B8
                                    [accentColor] => BE850D
                                )

                            [2A54DF5B73C0C732448E1D9A6133A2FF91AC6A4A] => Array
                                (
                                    [name] => What is a cryptologic Token - Blockchain technology has immense ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.qJJzglAKRn4suut93Qrx9gHaJl?pid=Api
                                    [datePublished] => 2022-09-10T22:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/a1afff865372ed920b8e84c9d6865c15/thumb_1200_1553.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/indian-institute-of-technology-kharagpur/computer-networks/what-is-a-cryptologic-token/27702351
                                    [contentSize] => 156315 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a8927382500a467e2cbaeb7ddd0af1f6?rik=okX9tTcMfCNE6A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A4A6CA19FF2A3316A9D1E844237C0C37B5FD45A2
                                    [accentColor] => 393939
                                )

                            [405E6291E252B3C53814CE3DD4E8AD7D446F5803] => Array
                                (
                                    [name] => Information Security and Cryptology - ICISC 2021: Buy Information ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.dnwx2lf7NcXp75mgs76AIAAAAA?pid=Api
                                    [datePublished] => 2023-07-01T07:44:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://rukmini1.flixcart.com/image/300/300/l5ld8y80/book/g/g/j/information-security-and-cryptology-icisc-2021-original-imagg84ugh5yfcgm.jpeg
                                    [hostPageUrl] => https://www.flipkart.com/information-security-cryptology-icisc-2021/p/itmc53e87adad0e1
                                    [contentSize] => 9673 B
                                    [width] => 198
                                    [height] => 300
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.767c31da57fb35c5e9ef99a0b3be8020?rik=BOUmGS4lO1yDQQ&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fl5ld8y80%2fbook%2fg%2fg%2fj%2finformation-security-and-cryptology-icisc-2021-original-imagg84ugh5yfcgm.jpeg&ehk=CzekqTjYMlzN4l26v9aqkvmGoRNH2aZ6jq%2fcO0rO5kU%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3085F644D7DA8E4DD3EC41835C3B252E1926E504
                                    [accentColor] => AC1130
                                )

                            [B2B9A53C87C497F944C612AD5894FCFC3E0E5E1C] => Array
                                (
                                    [name] => Layers 0, 1, 2, 3 — Teletype
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.LCOYiOVus-sO7shOws0_lgHaHE?pid=Api
                                    [datePublished] => 2022-05-27T01:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img4.teletype.in/files/fc/65/fc6551e5-fb6a-4a16-9d78-3139c332cdd3.png
                                    [hostPageUrl] => https://teletype.in/@cryptologykey/layers
                                    [contentSize] => 97855 B
                                    [width] => 700
                                    [height] => 668
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2c239888e56eb3eb0eeec84ec2cd3f96?rik=K5taw3hMeZ9EbA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C1E5E0E3CFCF4985DA216C449F794C78C35A9B2B
                                    [accentColor] => C60516
                                )

                            [AC86C63F33878DEA3732F68B1C8C703C25730376] => Array
                                (
                                    [name] => Cryptography
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.C8CmP9OA8yW2npgGOSeFpAAAAA?pid=Api
                                    [datePublished] => 2024-12-18T04:45:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://isea.gov.in/assets/img/thematic-areas/62.png
                                    [hostPageUrl] => https://isea.gov.in/crypto/
                                    [contentSize] => 7497 B
                                    [width] => 144
                                    [height] => 144
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0bc0a63fd380f325b69e9806392785a4?rik=ymhs8zN42K5zIw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 67303752C307C8C1B86F2373AED87833F36C68CA
                                    [accentColor] => 663299
                                )

                            [72812F13A311B457B92B72F636CA6F910A4E96A5] => Array
                                (
                                    [name] => Cryptography - Study thoroughly - Cryptography Plaintext: An original ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.xSBgRZ_y_tl1EDFx2QOEfQHaJl?pid=Api
                                    [datePublished] => 2022-11-19T05:59:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/54770bae8b40cb3a73eebbe446d18685/thumb_1200_1553.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/manipur-university/computer-network-security/cryptography-study-thoroughly/35863327
                                    [contentSize] => 453327 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c52060459ff2fed975103171d903847d?rik=JxjyMToRS3Wbsg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5A69E4A019F6AC636F27B29B754B113A31F21827
                                    [accentColor] => CC0000
                                )

                            [74F8F4B66F0BB56F92706710BB0AE0DAD654BE1C] => Array
                                (
                                    [name] => Buy Introduction to Cryptography Book Online at Low Prices in India ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.V0iFk0_-yJsonPsfpGPo_QHaLL?pid=Api
                                    [datePublished] => 2021-04-19T00:23:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/71PlcOrjjlL._SL1248_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Introduction-Cryptography-Sahadeo-Padhye/dp/0367781018
                                    [contentSize] => 238106 B
                                    [width] => 827
                                    [height] => 1248
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.574885934ffec89b289cfb1fa463e8fd?rik=R49Pa%2fawW%2fYpBw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C1EB456DAD0EA0BB01760729F65BB0F66B4F8F47
                                    [accentColor] => ABA620
                                )

                            [5155B4A981B7A433573BDCACD06CC9ED0877C11D] => Array
                                (
                                    [name] => C-DoT organises 3-day National Workshop on Cryptology, Government News ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.SC6gYeS_6bthOt4kg4DYHQHaEu?pid=Api
                                    [datePublished] => 2022-11-25T03:05:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://etimg.etb2bimg.com/thumb/msid-95753005,imgsize-9086,width-1200,height=765,overlay-etgovernment/news/technology/c-dot-organises-3-day-national-workshop-on-cryptology.jpg
                                    [hostPageUrl] => https://government.economictimes.indiatimes.com/news/technology/c-dot-organises-3-day-national-workshop-on-cryptology/95753005
                                    [contentSize] => 62865 B
                                    [width] => 1200
                                    [height] => 765
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.482ea061e4bfe9bb613ade248380d81d?rik=FVVLmhh7SjN1sw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D11C7780DE9CC60DCACDB375334A7B189A4B5515
                                    [accentColor] => 505A3B
                                )

                            [6BB5CA246A89CE1EF1EACFC7FDF1CA4D349757BA] => Array
                                (
                                    [name] => National Workshop on Cryptology 2025
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.OboLAn6UzPhW7DwqvrTTeAAAAA?pid=Api
                                    [datePublished] => 2025-11-20T10:09:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://events.iitbhilai.ac.in/nwc/assets/shiman-BL_hqhGf.png
                                    [hostPageUrl] => https://events.iitbhilai.ac.in/nwc/submission-of-poster
                                    [contentSize] => 168363 B
                                    [width] => 473
                                    [height] => 423
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.39ba0b027e94ccf856ec3c2abeb4d378?rik=tlusQqaY7OEfrg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AB757943D4AC1FDF7CFCAE1FE1EC98A642AC5BB6
                                    [accentColor] => 102014
                                )

                            [160CB514763B4C1DAD4BB51DB240A40B2D308C65] => Array
                                (
                                    [name] => Cryptology School. Cryptology 8.0 base+advanced+pro. 2023. Слив курса ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.CEm5H7RigUlusburLOmO8gHaD4?pid=Api
                                    [datePublished] => 2023-09-13T08:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img3.teletype.in/files/e0/18/e018914a-d0ac-4f3b-8d37-4f9ce0a1cc0e.png
                                    [hostPageUrl] => https://teletype.in/@kursisliv/3dlPXmvTkJy
                                    [contentSize] => 52198 B
                                    [width] => 1200
                                    [height] => 630
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0849b91fb46281496eb1bbab2ce98ef2?rik=YcBbQWezxNHatA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 56C803D2B04A042BD15BB4DAD1C4B367415BC061
                                    [accentColor] => 252523
                                )

                            [93A84BF0DF103AF699C361D657F85EC8C101EA0C] => Array
                                (
                                    [name] => Buy Codes Over Rings: 6 (Series On Coding Theory And Cryptology) Book ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.KUxHCvXoqF5OJ2Ipjk9Z1QAAAA?pid=Api
                                    [datePublished] => 2009-07-17T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41PZjbodLLL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Codes-Rings-Coding-Theory-Cryptology/dp/981283768X
                                    [contentSize] => 16252 B
                                    [width] => 305
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.294c470af5e8a85e4e2762298e4f59d5?rik=OYq0D%2f0Bo2%2bZPA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C0AE101C8CE58F756D163C996FA301FD0FB48A39
                                    [accentColor] => AA6921
                                )

                            [2FD2CE27F7C9902DA68FC5A1BB4677D76912FF71] => Array
                                (
                                    [name] => Отчёт a16z о состоянии и перспективах криптовалютного рынка на 2022 год ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.HjqXkkSA6pAWbCD4cp5sQQHaEM?pid=Api
                                    [datePublished] => 2024-04-16T01:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img4.teletype.in/files/79/af/79af0173-2377-4cbb-bee7-9a10d4d7f35d.png
                                    [hostPageUrl] => https://teletype.in/@cryptologykey/a16z-report-22
                                    [contentSize] => 221714 B
                                    [width] => 1024
                                    [height] => 581
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1e3a97924480ea90166c20f8729e6c41?rik=8i3scn%2bcCdJq%2bA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 17FF21967D7764BB1A5CF86AD2099C7F72EC2DF2
                                    [accentColor] => 079AC4
                                )

                            [898CD2F1C012B98EE3F1813CD941181FED1584D5] => Array
                                (
                                    [name] => VTU 18EC744 Cryptography Exam QP & Solutions March 2022 - Studocu
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.eHlYVmc4y2V4gqEwl-rmLQHaKN?pid=Api
                                    [datePublished] => 2023-11-11T07:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/6e16e1ccc3a729d40b65a38e2a727b0e/thumb_1200_1655.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/jss-academy-of-technical-education-bengaluru/cryptography/vtu-exam-question-paper-with-solution-of-18ec744-cryptography-march-2022-anindita-sahoo-copy/75396838
                                    [contentSize] => 904151 B
                                    [width] => 1200
                                    [height] => 1655
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.787958566738cb657882a13097eae62d?rik=mMgtHwwhm%2bg%2bHw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5D4851DEF181149DC3181F3EE89B210C1F2DC898
                                    [accentColor] => 5F5F6C
                                )

                            [C87D79F8AAE7CCDEA57F7C9CEB561673D868666E] => Array
                                (
                                    [name] => - NWC 2021
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.efd83UdfjWQfFzXBmniUiAHaHa?pid=Api
                                    [datePublished] => 2021-10-07T20:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://jnnce.ac.in/nwc2021/logo.png
                                    [hostPageUrl] => http://jnnce.ac.in/nwc2021/index.html
                                    [contentSize] => 158803 B
                                    [width] => 500
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.79f77cdd475f8d641f1735c19a789488?rik=jNeXj6p%2bzO1a9w&riu=http%3a%2f%2fjnnce.ac.in%2fnwc2021%2flogo.png&ehk=jioixXrm5YSLwtTF621q2t%2fitGV%2fBUJg139UPWTVfJE%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => E666868D376165BEC9C7F75AEDCC7EAA8F97D78C
                                    [accentColor] => C8AA03
                                )

                            [D6D38CC66F501B71104222048B910BE749E5FA6E] => Array
                                (
                                    [name] => Foundations of Security Analysis and Design VIII: FOSAD 2014/2015/2016 ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.9w-OlBCQLFZgLTPCkN2_RAAAAA?pid=Api
                                    [datePublished] => 2025-07-27T21:03:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41Fx1PulXqL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Foundations-Security-Analysis-Design-VIII/dp/3319430041
                                    [contentSize] => 19430 B
                                    [width] => 294
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f70f8e9410902c56602d33c290ddbf44?rik=bT3IbPYFsRcBJA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E6AF5E947EB019B84022240117B105F66CC83D6D
                                    [accentColor] => 09A76B
                                )

                            [8907C07A47862BD439BBDA1B995EF489B634B589] => Array
                                (
                                    [name] => Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.u-IiKzs9Sdsgy1Zj8gq6xgHaEQ?pid=Api
                                    [datePublished] => 2022-09-27T10:55:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/sensors/sensors-22-07332/article_deploy/html/images/sensors-22-07332-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/1424-8220/22/19/7332
                                    [contentSize] => 318186 B
                                    [width] => 3169
                                    [height] => 1823
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.bbe2222b3b3d49db20cb5663f20abac6?rik=mHAMp3Rosk2Tuw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 985B436B984FE599B1ADBB934DB26874A70C7098
                                    [accentColor] => BF0CBF
                                )

                            [F7723C2267AAA9E37E2B1354234613ADF26024E2] => Array
                                (
                                    [name] => Advances in Cryptology: Proceedings of CRYPTO '85: 218 (Lecture Notes ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.G4qOMy9rXZI2NtTgwNmbWwAAAA?pid=Api
                                    [datePublished] => 2020-08-24T07:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41aJjXw6vqL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Advances-Cryptology-Proceedings-Lecture-Computer/dp/3540164634
                                    [contentSize] => 11249 B
                                    [width] => 295
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1b8a8e332f6b5d923636d4e0c0d99b5b?rik=fyfDInaqmj7nsg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2E42062FDA3164324531B2E73E9AAA7622C3277F
                                    [accentColor] => C71904
                                )

                            [9035031C87D6AA324856DCF22EC7D266435A032D] => Array
                                (
                                    [name] => 21IS71 Cryptography & Network Security VTU Exam Paper Analysis - Studocu
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.q5QOYKzKMZrElSumRYl_GAHaKe?pid=Api
                                    [datePublished] => 2025-01-11T07:13:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/498e489353d8748e4be55d58928e74e2/thumb_1200_1698.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/cmr-institute-of-technology/cryptography-and-network-security/21is71-cryptography-and-network-security-vtu-paper/115007256
                                    [contentSize] => 1197730 B
                                    [width] => 1200
                                    [height] => 1698
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ab940e60acca319ac4952ba645897f18?rik=CVMwwXhtqiOEZQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D230A534662D7CE22FCD658423AA6D78C1305309
                                    [accentColor] => 5A5A49
                                )

                            [1E67835E043EDC328B001593A0A64DF0BE2CDAFA] => Array
                                (
                                    [name] => Process Authentication through Blockchain: Three Case Studies
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.xlteZLX7Lkp3xKOuwdvZ3gHaDz?pid=Api
                                    [datePublished] => 2022-11-11T08:45:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/cryptography/cryptography-06-00058/article_deploy/html/images/cryptography-06-00058-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2410-387X/6/4/58
                                    [contentSize] => 596221 B
                                    [width] => 2870
                                    [height] => 1476
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c65b5e64b5fb2e4a77c4a3aec1dbd9de?rik=4XY45UDjzSO4AA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AFADC2EB0FD46A0A395100B823CDE340E53876E1
                                    [accentColor] => C8B703
                                )

                            [E2ADAF2DA8D773627C55199888F8BD6AE13158A1] => Array
                                (
                                    [name] => 17 Best Cryptography Books – Free Download (PDF) – Tech Hyme
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.xc-U26BIDff7rGIcQ-805gHaEc?pid=Api
                                    [datePublished] => 2024-07-13T11:27:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://techhyme.com/wp-content/uploads/2024/07/Cryptography-Books-Free-Download-Techhyme-1024x614.jpg
                                    [hostPageUrl] => https://techhyme.com/17-best-cryptography-books-free-download-pdf/
                                    [contentSize] => 100147 B
                                    [width] => 1024
                                    [height] => 614
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c5cf94dba0480df7fbac621c43ef34e6?rik=Ltr60op9NybHVQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1A85131EA6DB8F88899155C726377D8AD2FADA2E
                                    [accentColor] => 31649A
                                )

                            [177B49161647584D509CAD28450C59BE57CB59D2] => Array
                                (
                                    [name] => BOS/CONF — Teletype
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.VyR9I_9yU2JfsOuAm6nswAHaDi?pid=Api
                                    [datePublished] => 2023-01-31T22:58:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img4.teletype.in/files/f4/f1/f4f1b513-ad4c-4acc-8946-49e19fa3a550.png
                                    [hostPageUrl] => https://teletype.in/@cryptologykey/Struktura-rynka-06-27
                                    [contentSize] => 91588 B
                                    [width] => 1918
                                    [height] => 918
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.57247d23ff7253625fb0eb809ba9ecc0?rik=cbeUYWF0hdQFyQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2D95BC75EB95C05482DAC905D48574616194B771
                                    [accentColor] => B0201B
                                )

                            [433D56DCD20753747D559F944DF6D3C71442795B] => Array
                                (
                                    [name] => Editorial Board | Stechnolock Journal of Cryptology | Open Access
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.2eOhnvtgKhkkyXiCx2oAagAAAA?pid=Api
                                    [datePublished] => 2023-07-15T13:41:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://www.stechnolock.com/STL/oamsecure/up_images/390editor_image.jpg
                                    [hostPageUrl] => https://www.stechnolock.com/journals/stechnolock-journal-of-cryptology/editorial-board.php
                                    [contentSize] => 11313 B
                                    [width] => 90
                                    [height] => 118
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d9e3a19efb602a1924c97882c76a006a?rik=NNNlzS1wNUfXVQ&riu=http%3a%2f%2fwww.stechnolock.com%2fSTL%2foamsecure%2fup_images%2f390editor_image.jpg&ehk=72xh5RukDAwUASx7J%2bYPaHx5yIfxKi4npAnYBx%2fH%2fq0%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B59724417C3D6FD449F955D74735702DCD65D334
                                    [accentColor] => 435188
                                )

                            [130D906B90D3E05ADD96E65F7099DAED9AF8AC27] => Array
                                (
                                    [name] => 暗号化アルゴリズムRSA (Rivest-Shamir-Adleman)の基本 | Splunk
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.EyhgPyqMc1Ni01B3ta6TZAHaGx?pid=Api
                                    [datePublished] => 2024-12-23T15:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.splunk.com/content/dam/splunk-blogs/images/en_us/2023/02/key-mgmt1.png
                                    [hostPageUrl] => https://www.splunk.com/ja_jp/blog/security/rsa-algorithm-cryptography.html
                                    [contentSize] => 20249 B
                                    [width] => 500
                                    [height] => 457
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1328603f2a8c735362d35077b5ae9364?rik=MdAJtgk9DqXdaQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 72CA8FA9DEAD9907F56E69DDA50E3D09B609D031
                                    [accentColor] => C60579
                                )

                            [0021C36953F20F0F60F75187C50A0E1B6AA252F8] => Array
                                (
                                    [name] => Gift Voucher Worth ₹ 2500 – The Indian Trunk
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.uJFevzrtiSSPbuRWVNOStQHaFd?pid=Api
                                    [datePublished] => 2023-05-21T15:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://theindiantrunk.com/cdn/shop/products/2500.jpg?v=1676275308
                                    [hostPageUrl] => https://theindiantrunk.com/products/gift-voucher-worth-2500
                                    [contentSize] => 170331 B
                                    [width] => 1202
                                    [height] => 886
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b8915ebf3aed89248f6ee45654d392b5?rik=ABI8ljUv8PAGfw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8F252AA6B1E0A05C78157F06F0F02F35963C1200
                                    [accentColor] => C7040D
                                )

                            [806467B380DCD6161FEDFC3F1203931AB42306F6] => Array
                                (
                                    [name] => What is Cryptography?
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.BIb4B4j0XiyGcdr9kWgYaAAAAA?pid=Api
                                    [datePublished] => 2020-06-15T20:54:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn.kaspersky.com/se/media/rc/side-banner-coin.gif
                                    [hostPageUrl] => https://www.kaspersky.co.in/resource-center/definitions/what-is-cryptography
                                    [contentSize] => 111703 B
                                    [width] => 300
                                    [height] => 600
                                    [proxyContentUrl] => https://tse2.mm.bing.net/th/id/OGC.0486f80788f45e2c8671dafd91681868?pid=Api&rurl=https%3a%2f%2fcdn.kaspersky.com%2fse%2fmedia%2frc%2fside-banner-coin.gif&ehk=%2ftneSr3fAXRJzvuDDEAl88kjYE9%2f1rZraW%2beAmabL%2bY%3d
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0486f80788f45e2c8671dafd91681868?rik=CEZ2OwjNbWHx3g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6F60324BA1393021F3CFDEF1616DCD083B764608
                                    [accentColor] => 118DBA
                                )

                            [B30A943D4A0467AC97D6999B157A0B5D8E494179] => Array
                                (
                                    [name] => 'Cryptography will break': SEBI Chief urges proactive password security ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.jUgT1270PgNbpOMGl7kIoQHaEA?pid=Api
                                    [datePublished] => 2025-10-08T12:45:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.etimg.com/thumb/msid-124387226,width-1070,height-580,overlay-economictimes/videoshow.jpg
                                    [hostPageUrl] => https://economictimes.indiatimes.com/news/india/cryptography-will-break-sebi-chief-urges-proactive-password-security-in-quantum-age/videoshow/124387226.cms
                                    [contentSize] => 41644 B
                                    [width] => 1070
                                    [height] => 580
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8d4813d76ef43e035ba4e30697b908a1?rik=O6BJ06RAdsp5bQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 971494E8D5B0A751B9996D79CA7640A4D349A03B
                                    [accentColor] => 791B20
                                )

                            [96514FE876FE877543059AFCB101FA804E0124B1] => Array
                                (
                                    [name] => Know More on Types of Cryptography - Tech Hyme
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.gF773DhvxfwXsNhxC3-9ZwHaE7?pid=Api
                                    [datePublished] => 2022-09-21T05:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://techhyme.com/wp-content/uploads/2022/09/Cryptography-Types-Techhyme.jpg
                                    [hostPageUrl] => https://techhyme.com/know-more-on-types-of-cryptography/
                                    [contentSize] => 211292 B
                                    [width] => 1373
                                    [height] => 915
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.805efbdc386fc5fc17b0d8710b7fbd67?rik=aRX0jmfveFc0UA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1B4210E408AF101BCFA950345778EF678EF41569
                                    [accentColor] => 9B6C30
                                )

                            [8E6CB744E1FB9CC1D1894B9C8CFABA7EDC7D5F8D] => Array
                                (
                                    [name] => Реферальные ссылки Cryptology — Teletype
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.SXvAwfFeFTLzojrM9Uo7HwHaD4?pid=Api
                                    [datePublished] => 2022-07-27T14:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img3.teletype.in/files/e2/04/e204ee2c-9714-416f-9887-158e954666a7.png
                                    [hostPageUrl] => https://teletype.in/@cryptologykey/ref
                                    [contentSize] => 29966 B
                                    [width] => 1200
                                    [height] => 630
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.497bc0c1f15e1532f3a23accf54a3b1f?rik=6MZ7RB6%2fyRwdmA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D8F5D7CDE7ABAFC8C9B4981D1CC9BF1E447BC6E8
                                    [accentColor] => 242421
                                )

                            [93CEA91C488667338E68BD0FD67EB18039ECD658] => Array
                                (
                                    [name] => Buy Cryptography And Network Security | 3rd Edition Book Online at Low ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.9lOF-u05h-JYhP7gGj3DrwAAAA?pid=Api
                                    [datePublished] => 2015-11-13T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images-eu.ssl-images-amazon.com/images/I/91U3brATbmL._AC_UL160_SR160,160_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Crypt-Network-Security-Forouzan/dp/9339220943
                                    [contentSize] => 8448 B
                                    [width] => 160
                                    [height] => 160
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f65385faed3987e25884fee01a3dc3af?rik=OeyawYRodjPohg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 856DCE93081BE76DF0DB86E833766884C19AEC39
                                    [accentColor] => A44C27
                                )

                            [5F280830E75D284200003C136BC856970A394DC5] => Array
                                (
                                    [name] => Buy Radio Frequency Identification System Security: Rfidsec'13 Asia ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.FezNw8T8tfVrbrShyI0QMwAAAA?pid=Api
                                    [datePublished] => 2013-11-01T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/51OyqkKrK5L._SY385_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Radio-Frequency-Identification-System-Security/dp/1614993270
                                    [contentSize] => 14412 B
                                    [width] => 256
                                    [height] => 385
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.15eccdc3c4fcb5f56b6eb4a1c88d1033?rik=9YKAA37VgiQAAA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5CD493A079658CB631C300002482D57E038082F5
                                    [accentColor] => 0499B8
                                )

                            [9B62C39D138F8CF30D49115E922512996CF02F8A] => Array
                                (
                                    [name] => Buy Beginning Cryptography with Java Book Online at Low Prices in India ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.yrMAUvnX9xYQyXIej3R5qwAAAA?pid=Api
                                    [datePublished] => 2005-09-01T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/411kr9nNlqL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Beginning-Cryptography-Java-David-Hook/dp/8126506261
                                    [contentSize] => 16457 B
                                    [width] => 341
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.cab30052f9d7f71610c9721e8f7479ab?rik=uSY82TH4yD%2fQlA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A8F20FC699215229E51194D03FC8F831D93C26B9
                                    [accentColor] => C7B904
                                )

                            [ECCA75015D1F709A090975A321D4B9D67C8358A4] => Array
                                (
                                    [name] => Buy Introduction to Cryptography Book Online at Low Prices in India ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.ugcpVRlpM_MmRABCkhFBugAAAA?pid=Api
                                    [datePublished] => 2017-09-14T07:41:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/415YAIy605L._SY445_SX342_ML2_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Introduction-Cryptography-Information-Security/dp/3662479737
                                    [contentSize] => 14551 B
                                    [width] => 295
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ba072955196933f326440042921141ba?rik=zqxXENXxB6mQkA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4A8538C76D9B4D123A579090A907F1D51057ACCE
                                    [accentColor] => B4A417
                                )

                            [11DE8C664232E8CAE18198681943101EC65CC8AE] => Array
                                (
                                    [name] => What is Quantum Key Distribution? All you need to know about QKD technology
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.ZxMwFTfcnqU3dMoe8_xGrgHaEK?pid=Api
                                    [datePublished] => 2020-12-11T14:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://newsd.in/wp-content/uploads/2020/12/QKD-1.jpg
                                    [hostPageUrl] => https://newsd.in/what-is-quantum-key-distribution-all-you-need-to-know-about-qkd-technology/
                                    [contentSize] => 67633 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6713301537dc9ea53774ca1ef3fc46ae?rik=Ee3IZiQjjqweGA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EA8CC56CE10134918689181EAC8E232466C8ED11
                                    [accentColor] => 0295C9
                                )

                            [AF66D9EBC6C5952C3AA2BD06101748A3BA1EB43E] => Array
                                (
                                    [name] => Teaching Faculty
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.HkUrRsFl1OvofQ9twPNKPgAAAA?pid=Api
                                    [datePublished] => 2023-05-29T15:46:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://crraoaimscs.ac.in/images/teachars/10.jpg
                                    [hostPageUrl] => https://crraoaimscs.ac.in/teaching-faculty.php
                                    [contentSize] => 102869 B
                                    [width] => 300
                                    [height] => 300
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1e452b46c165d4ebe87d0f6dc0f34a3e?rik=%2bmadvmxcWcKjKg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E34BE1AB3A84710160DB2AA3C2595C6CBE9D66FA
                                    [accentColor] => 814A5C
                                )

                            [D2C77E43E7671344028F4133D1567DD7CB830C16] => Array
                                (
                                    [name] => Рыночная капитализация — Teletype
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.WlfSZMbeOmcMKlXWz2v6nQHaEW?pid=Api
                                    [datePublished] => 2022-05-10T08:29:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img2.teletype.in/files/91/71/917160de-3d91-4681-8cf5-08bd583f21fc.png
                                    [hostPageUrl] => https://teletype.in/@cryptologykey/M5lKkIyCgW2
                                    [contentSize] => 51846 B
                                    [width] => 1548
                                    [height] => 909
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5a57d264c6de3a670c2a55d6cf6bfa9d?rik=LXznNH52MUQg%2bA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 61C038BC7DD7651D3314F8204431767E34E77C2D
                                    [accentColor] => 222631
                                )

                            [64FC3ACF1086EAD19FDA7D1C691A4E15E4338BA2] => Array
                                (
                                    [name] => NIC LMS
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.kk1KjvXukbxmN2zWDd1MmwHaEL?pid=Api
                                    [datePublished] => 2024-04-03T13:46:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://vidyakosh-v2.nic.in/public/storage/uploads/1651216521-cryptography.PNG
                                    [hostPageUrl] => https://www.vidyakosh-v2.nic.in/public/course/cryptography-2022
                                    [contentSize] => 1416569 B
                                    [width] => 1182
                                    [height] => 667
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.924d4a8ef5ee91bc66376cd60ddd4c9b?rik=Rs%2bj%2fAForh35rQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2AB8334E51E4A196C1D7ADF91DAE6801FCA3CF46
                                    [accentColor] => 07C1C4
                                )

                            [2679F9A35056DF35CCD34B9C8CFABA7EDC7D5F8D] => Array
                                (
                                    [name] => Реферальные ссылки Cryptology — Teletype
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.IHEn35HRbl_LlQRPGjjxcQHaCN?pid=Api
                                    [datePublished] => 2022-07-27T14:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img1.teletype.in/files/0a/5e/0a5e2e37-8e3a-4806-a365-5e1eb63178cf.jpeg
                                    [hostPageUrl] => https://teletype.in/@cryptologykey/ref
                                    [contentSize] => 44429 B
                                    [width] => 875
                                    [height] => 262
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.207127df91d16e5fcb95044f1a38f171?rik=YpefOgVl%2fVPMPQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D8F5D7CDE7ABAFC8C9B43DCC53FD65053A9F9762
                                    [accentColor] => B49218
                                )

                            [20D6B4777E7A228DC006A4C49E51B29ADAECFF45] => Array
                                (
                                    [name] => IISc-IACR School on Cryptology
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.SYztX7RxmuhG8UQsuv38jAHaHa?pid=Api
                                    [datePublished] => 2017-11-17T14:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.csa.iisc.ac.in/~crysp/IACRSchool/img/speakers/divesh_aggarwal.jpg
                                    [hostPageUrl] => https://www.csa.iisc.ac.in/~crysp/IACRSchool/
                                    [contentSize] => 650746 B
                                    [width] => 2268
                                    [height] => 2268
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.498ced5fb4719ae846f1442cbafdfc8c?rik=Am1Ld%2benItgMYA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 54FFCEADA92B15E94C4A600CD822A7E7774B6D02
                                    [accentColor] => 51525A
                                )

                            [88D29673C9736C6467CA7B326771CF4ED0313D84] => Array
                                (
                                    [name] => Object Oriented Programming - CS3391 3rd Semester CSE Dept | 2021 ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.SgtGSGnw5QNtII6XugHoywHaEK?pid=Api
                                    [datePublished] => 2023-03-31T21:20:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.poriyaan.in/media/cata/size/193-Crypt-Yr.jpg
                                    [hostPageUrl] => https://www.poriyaan.in/paper/object-oriented-programming-76/
                                    [contentSize] => 323937 B
                                    [width] => 800
                                    [height] => 450
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4a0b464869f0e5036d208e97ba01e8cb?rik=iC1pN5w3xkZ2rA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 48D3130DE4FC177623B7AC7646C6379C37692D88
                                    [accentColor] => 1A9BB1
                                )

                            [2D50C4A14E23628ECAB99F944DF6D3C71442795B] => Array
                                (
                                    [name] => Editorial Board | Stechnolock Journal of Cryptology | Open Access
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.iUIdbldz6J_UepIa8n03rgAAAA?pid=Api
                                    [datePublished] => 2023-07-15T13:41:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://www.stechnolock.com/STL/oamsecure/up_images/226editor_image.jpg
                                    [hostPageUrl] => https://www.stechnolock.com/journals/stechnolock-journal-of-cryptology/editorial-board.php
                                    [contentSize] => 8712 B
                                    [width] => 90
                                    [height] => 118
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.89421d6e5773e89fd47a921af27d37ae?rik=0gVMGuQyJuismw&riu=http%3a%2f%2fwww.stechnolock.com%2fSTL%2foamsecure%2fup_images%2f226editor_image.jpg&ehk=eMm%2bL%2bp135hCzIu9w9shlkMtYSYs4Nn0QVR5SfRy0cU%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B59724417C3D6FD449F99BACE82632E41A4C05D2
                                    [accentColor] => 943737
                                )

                            [6D584B4042705BF9FD00278ED39DE51ED91FB194] => Array
                                (
                                    [name] => Indian 5 rupees coin Images - Free Download on Freepik
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.uxhXHW8coT5JF8603sx93QHaHa?pid=Api
                                    [datePublished] => 2025-01-17T07:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.freepik.com/free-vector/digital-currency-indian-rupee-symbol-golden-coin_1017-42459.jpg
                                    [hostPageUrl] => https://www.freepik.com/free-photos-vectors/indian-5-rupees-coin
                                    [contentSize] => 32589 B
                                    [width] => 626
                                    [height] => 626
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.bb18571d6f1ca13e4917ceb4decc7ddd?rik=1oW0BCQHtZ%2ffAA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 491BF19DE15ED93DE87200DF9FB5072404B485D6
                                    [accentColor] => AF5402
                                )

                            [1026666C37630EBE5EDF0A608648139349AF295A] => Array
                                (
                                    [name] => CS3591-Networks Lab Manual-converted - 1 Lab Manual CS3591- Computer ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.pGqL5H3Dx6hEFklhIdA_lQHaKd?pid=Api
                                    [datePublished] => 2023-08-28T23:59:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/035e0f474b7ba25d6dd378ffb521be01/thumb_1200_1696.webp
                                    [hostPageUrl] => https://www.studocu.com/in/document/university-of-rajasthan/cognitive-neuroscience/cs3591-networks-lab-manual-converted/67472723
                                    [contentSize] => 57726 B
                                    [width] => 1200
                                    [height] => 1696
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a46a8be47dc3c7a84416496121d03f95?rik=AWJmxnM24Ovl%2fQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A592FA943931846806A0FDE5EBE03673C6666201
                                    [accentColor] => 323232
                                )

                            [FC8142856C563BF0EAE9508BFC619BE936914D7F] => Array
                                (
                                    [name] => Birthday attack in Cryptography - Birthday attack in Cryptography ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.giPPlvjTaUF2XsxekMQQDAHaJl?pid=Api
                                    [datePublished] => 2023-02-04T14:02:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/7d2cd959bf823bbc096303eb5813bc7c/thumb_1200_1553.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/indian-institute-of-technology-kharagpur/computer-networks/birthday-attack-in-cryptography/27581334
                                    [contentSize] => 140905 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8223cf96f8d36941765ecc5e90c4100c?rik=zxgkWMZlsw%2bung&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F7D419639EB916CFB8059EAE0FB365C6582418CF
                                    [accentColor] => 2D2D2D
                                )

                            [2493DD8B745A3A2810A5A3237B38D64E3EF9DD9A] => Array
                                (
                                    [name] => Fake notes worth over Rs 14 lakh in Rs 500 denominations seized in Odisha
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.pp3MDCn5_nOIf0lMZ3QgzgHaEK?pid=Api
                                    [datePublished] => 2022-07-07T11:38:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.odishatv.in/uploadimage/library/16_9/16_9_5/IMAGE_1657193786.webp
                                    [hostPageUrl] => https://odishatv.in/news/crime/fake-notes-worth-over-rs-14-lakh-in-rs-500-denominations-seized-in-odisha-180288
                                    [contentSize] => 76340 B
                                    [width] => 1200
                                    [height] => 675
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a69dcc0c29f9fe73887f494c677420ce?rik=QjnduEelo4IBWg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A9DD9FE3E46D83B7323A5A0182A3A547B8DD3942
                                    [accentColor] => 7A6251
                                )

                            [21E0B5C56AE94756BF6DCC31D37088A8E67E35DC] => Array
                                (
                                    [name] => Mahatma Gandhi picture on indian currency on note where it was taken ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.lbFJOgfrY3rQfGj9RYJh1AHaEK?pid=Api
                                    [datePublished] => 2023-08-01T12:46:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://resize.indiatv.in/resize/newbucket/1200_-/2023/08/untitled-design-2023-08-01t180958-1690893665.jpg
                                    [hostPageUrl] => https://www.indiatv.in/viral/news/mahatma-gandhi-picture-on-indian-currency-on-note-where-it-was-taken-and-when-2023-08-01-978364
                                    [contentSize] => 144723 B
                                    [width] => 1200
                                    [height] => 675
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.95b1493a07eb637ad07c68fd458261d4?rik=Eg5bXKaedGX71g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => CD53E76E8A88073D13CCD6FB65749EA65C5B0E12
                                    [accentColor] => 446A87
                                )

                            [EACC21F4D0EEE618BCD487F68DABB843D406ADED] => Array
                                (
                                    [name] => Substitution techniques in Cryptography in hindi
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.tFRcutIhREbuFVnrJUyg2wHaE_?pid=Api
                                    [datePublished] => 2022-10-24T03:13:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGGSFFc2I60rzg-_Pjm8nA11XCr795V0y0ZFmMhv58T3o2_f8jOgpm9Jck5XabAei7PSVHdxqYG3S0qQLlnLBMp6MMHm6xT4OuuzzVJJHoiuvGmmo5wSj4E72zuYdfRqz3Hj43Yoct4vqw9PsY-eMqrtukY8f4xiTkRsU0lP4w8QrfiKGQqMpRvXEo_A/w698-h471/Types%20of%20Substitution%20Techniques.png
                                    [hostPageUrl] => https://www.computernetworksite.in/2022/10/substitution-techniques-in-cryptography.html
                                    [contentSize] => 41007 B
                                    [width] => 698
                                    [height] => 471
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b4545cbad2214446ee1559eb254ca0db?rik=rswSTw3uboHLTQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DEDA604D348BBAD86F784DCB816EEE0D4F12CCAE
                                    [accentColor] => BE1F0D
                                )

                            [205216C64E8EDA66599DBD3F41D5635554210157] => Array
                                (
                                    [name] => Professionelle Cybersicherheitslösungen
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.63UnQbvxUwdSlQzkD3E-7gHaEK?pid=Api
                                    [datePublished] => 2012-06-05T09:31:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://utimaco.com/sites/default/files/2023-01/solution-post-quantum-cryptography.png
                                    [hostPageUrl] => https://utimaco.com/de
                                    [contentSize] => 43641 B
                                    [width] => 960
                                    [height] => 540
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.eb752741bbf1530752950ce40f713eee?rik=AiVhbOTorWaV2Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7510124555365D14F3DBD99566ADE8E46C612502
                                    [accentColor] => 00539C
                                )

                            [5F33181DD8B3018CA4A39F944DF6D3C71442795B] => Array
                                (
                                    [name] => Editorial Board | Stechnolock Journal of Cryptology | Open Access
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.LvTamZwNtqgKmgEsVU0nPAAAAA?pid=Api
                                    [datePublished] => 2023-07-15T13:41:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://www.stechnolock.com/STL/oamsecure/up_images/198editor_image.jpg
                                    [hostPageUrl] => https://www.stechnolock.com/journals/stechnolock-journal-of-cryptology/editorial-board.php
                                    [contentSize] => 9791 B
                                    [width] => 90
                                    [height] => 118
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2ef4da999c0db6a80a9a012c554d273c?rik=9TOB0Y07EMhKOg&riu=http%3a%2f%2fwww.stechnolock.com%2fSTL%2foamsecure%2fup_images%2f198editor_image.jpg&ehk=qQhyVXbHIlOwetYF%2buX0RcrguaFgeDyjWeH3fhqBQmQ%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B59724417C3D6FD449F93A4AC8103B8DD18133F5
                                    [accentColor] => 124A9A
                                )

                            [CD1ED4D2909F013D7BEEC88AE4AD2731BBBD0D66] => Array
                                (
                                    [name] => Buy Cryptography and Network Security - Principles and Practice ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.sFuBdQeUymk-lYnAoXFjTwAAAA?pid=Api
                                    [datePublished] => 2021-09-07T18:36:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/G/31/personalization/ybh/loading-4x-gray._CB485916689_.gif
                                    [hostPageUrl] => https://www.amazon.in/Cryptography-Network-Security-Principles-Practice/dp/9332585229
                                    [contentSize] => 8865 B
                                    [width] => 64
                                    [height] => 64
                                    [proxyContentUrl] => https://tse2.mm.bing.net/th/id/OGC.b05b81750794ca693e9589c0a171634f?pid=Api&rurl=https%3a%2f%2fm.media-amazon.com%2fimages%2fG%2f31%2fpersonalization%2fybh%2floading-4x-gray._CB485916689_.gif&ehk=2eeT8cBhv2ypBrMv%2fmKeEhubbHylh3mewk%2bzIbIVtYk%3d
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b05b81750794ca693e9589c0a171634f?rik=3OFNLQn5ENO37g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 66D0DBBB1372DA4EA88CEEB7D310F9092D4DE1DC
                                    [accentColor] => 666666
                                )

                            [BBA9FB0F37717ADC19D4E20CE207DC4E46AD1028] => Array
                                (
                                    [name] => Что такое криптовалюта? — Teletype
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.X356FBottGFVo3WuyiRiNwHaE8?pid=Api
                                    [datePublished] => 2022-11-21T20:45:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn.pixabay.com/photo/2018/02/05/16/21/bitcoin-3132574_960_720.jpg
                                    [hostPageUrl] => https://teletype.in/@trandinvestclub/kriptovaluta
                                    [contentSize] => 281343 B
                                    [width] => 960
                                    [height] => 640
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5f7e7a141a2db46155a375aeca246237?rik=u5q%2f8HMXp82RTQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8201DA64E4CD702EC02E4D91CDA71773F0BF9ABB
                                    [accentColor] => B8B313
                                )

                            [4CA6D3DFBF804DEA78C5D5144DEA83C8C29B6811] => Array
                                (
                                    [name] => Indian 500 rupee Images - Free Download on Freepik
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.a8csLDoHpr4pvCESLcmKhwHaF7?pid=Api
                                    [datePublished] => 2023-08-29T05:23:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.freepik.com/free-vector/glowing-indian-inr-rupee-symbol-background-retail-market_1017-53777.jpg?semt=ais_hybrid&w=740&q=80
                                    [hostPageUrl] => https://www.freepik.com/free-photos-vectors/indian-500-rupee
                                    [contentSize] => 21275 B
                                    [width] => 740
                                    [height] => 592
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6bc72c2c3a07a6be29bc21122dc98a87?rik=xGo9%2ffsI1K6HXA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1186B92C8C38AED4415D5C87AED408FBFD3D6AC4
                                    [accentColor] => 02C9A5
                                )

                            [9F0A13C9D0F50F4A1035FB8A9A3A02E70C9E028D] => Array
                                (
                                    [name] => Зачем нужны криптовалютные кошельки? — Teletype
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.5UFYfuDZHwjd2gHavEtORwHaD9?pid=Api
                                    [datePublished] => 2023-04-07T15:48:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cheapsslsecurity.com/p/wp-content/uploads/2019/08/private-key-encryption.png
                                    [hostPageUrl] => https://teletype.in/@cryptoscamm/wallet_basic
                                    [contentSize] => 22502 B
                                    [width] => 624
                                    [height] => 334
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e541587ee0d91f08ddda01dabc4b4e47?rik=%2baAxnA1f8KQBUw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D820E9C07E20A3A9A8BF5301A4F05F0D9C31A0F9
                                    [accentColor] => BB3810
                                )

                            [9A5430A663B773C49559C07B433FA489AA480D07] => Array
                                (
                                    [name] => 2.2 / Блокчейн Bitcoin и его эволюция — Teletype
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.fnYw5Ae_YTCJUFsgc--ZrwHaFj?pid=Api
                                    [datePublished] => 2022-03-04T11:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img1.teletype.in/files/4a/a5/4aa5abb2-75aa-42e6-88e5-02c7bcaa47af.png
                                    [hostPageUrl] => https://teletype.in/@cryptologykey/SFvkJn3Ya6t
                                    [contentSize] => 2993974 B
                                    [width] => 480
                                    [height] => 360
                                    [proxyContentUrl] => https://tse3.mm.bing.net/th/id/OGC.7e7630e407bf613089505b2073ef99af?pid=Api&rurl=https%3a%2f%2fimg1.teletype.in%2ffiles%2f4a%2fa5%2f4aa5abb2-75aa-42e6-88e5-02c7bcaa47af.png&ehk=rG%2b%2bDT0DEG3WoSh4aR0m75dv2SWkXVYUFz%2fVxNKvxTw%3d
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7e7630e407bf613089505b2073ef99af?rik=qUUDajZ7N0xZlQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 70D084AA984AF334B70C95594C377B366A0345A9
                                    [accentColor] => 417028
                                )

                            [9A5E8053C6D241B404AE62628F666BB15BCF4519] => Array
                                (
                                    [name] => About Us
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.fAkb3y1XkLlvX8DPsu1VhAHaHa?pid=Api
                                    [datePublished] => 2024-06-25T12:27:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://setsindia.in/wp-content/uploads/2024/06/pngwing.com_.png
                                    [hostPageUrl] => https://setsindia.in/about-us/
                                    [contentSize] => 4633 B
                                    [width] => 512
                                    [height] => 512
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7c091bdf2d5790b96f5fc0cfb2ed5584?rik=qeUINWwtFEtA6g&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 9154FCB51BB666F82626EA404B142D6C3508E5A9
                                    [accentColor] => 0070AA
                                )

                            [2317EC62FE7E21CB03BF1593A0A64DF0BE2CDAFA] => Array
                                (
                                    [name] => Process Authentication through Blockchain: Three Case Studies
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.rrcxD8CO4zLh6UrskNajcwHaEA?pid=Api
                                    [datePublished] => 2022-11-11T08:45:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/cryptography/cryptography-06-00058/article_deploy/html/images/cryptography-06-00058-g005.png
                                    [hostPageUrl] => https://www.mdpi.com/2410-387X/6/4/58
                                    [contentSize] => 258879 B
                                    [width] => 3184
                                    [height] => 1722
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.aeb7310fc08ee332e1e94aec90d6a373?rik=MnHOJu%2fnErww%2bw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AFADC2EB0FD46A0A3951FB30BC12E7EF26CE7132
                                    [accentColor] => 1491B7
                                )

                            [5140CA27F46E73B55F2ACD0A3AD8B117F9F58EFF] => Array
                                (
                                    [name] => Teaching Faculty
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.1lNc6ZrTwlSlVRagKilxOQAAAA?pid=Api
                                    [datePublished] => 2023-04-26T08:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://crraoaimscs.res.in/btech/images/teachars/9.jpg
                                    [hostPageUrl] => https://crraoaimscs.res.in/btech/teaching-faculty.php
                                    [contentSize] => 88414 B
                                    [width] => 300
                                    [height] => 300
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d6535ce99ad3c254a55516a02a297139?rik=FQSsck%2fmN1v1og&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FFE85F9F711B8DA3A0DCA2F55B37E64F72AC0415
                                    [accentColor] => AB2320
                                )

                            [09B2CABE086E33F6ABD0A4C49E51B29ADAECFF45] => Array
                                (
                                    [name] => IISc-IACR School on Cryptology
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.GCyhP9z3SHOsWGJLGN3hXgHaE1?pid=Api
                                    [datePublished] => 2017-11-17T14:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.csa.iisc.ac.in/~crysp/IACRSchool/img/slider/1.jpeg
                                    [hostPageUrl] => https://www.csa.iisc.ac.in/~crysp/IACRSchool/
                                    [contentSize] => 213437 B
                                    [width] => 1080
                                    [height] => 705
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.182ca13fdcf74873ac58624b18dde15e?rik=kCus64DmM2%2b6DQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 54FFCEADA92B15E94C4A0DBA6F33E680EBAC2B90
                                    [accentColor] => 0791C4
                                )

                            [E0148B1D8E7274ACE8AAAA5BDDEDEA0CCEFE1B46] => Array
                                (
                                    [name] => Personalized Photo Calendars 2023 | Optimalprint | Optimalprint
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.jCiR53Ocfv7K885xBZqkPAAAAA?pid=Api
                                    [datePublished] => 2019-11-19T06:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn-adl.live.gelato.tech/do/HpTfqQ1b4As/small_3d-p1-en-IN?v=1690403204
                                    [hostPageUrl] => https://www.optimalprint.in/wall-calendars/designs
                                    [contentSize] => 27872 B
                                    [width] => 241
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8c2891e7739c7efecaf3ce71059aa43c?rik=DkG40egnR8qOqg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 64B1EFECC0AEDEDDB5AAAA8ECA4727E8D1B8410E
                                    [accentColor] => 9E652D
                                )

                            [2E6B0322BBBED2BF5AD9B4A0407BFE730C7334FE] => Array
                                (
                                    [name] => Ликвидность — Teletype
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.PdM-OmFZMa80EG7lrc3wZAHaFb?pid=Api
                                    [datePublished] => 2022-04-14T06:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img3.teletype.in/files/e3/34/e33447f7-fbb8-4e5d-a71b-1fee6e65e61c.jpeg
                                    [hostPageUrl] => https://teletype.in/@cryptologykey/Likvidnost-07-16
                                    [contentSize] => 34722 B
                                    [width] => 1230
                                    [height] => 902
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.3dd33e3a615931af34106ee5adcdf064?rik=4rYwIrvrLfulnQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EF4337C037EFB7040A4B9DA5FB2DEBBB2230B6E2
                                    [accentColor] => AC1F24
                                )

                            [FA0CBE2D2B50303EBE77839345B40D9DBB2C6778] => Array
                                (
                                    [name] => Topps FC Barcelona Forever 25/26 – Barça Official Store
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th?id=OIF.Sw5hXpkwDKZO0%2fMBB82wGA&pid=Api
                                    [datePublished] => 2026-03-07T17:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://store.fcbarcelona.com/cdn/shop/files/Disenosintitulo_1_b9b07baa-d3bd-4747-8c33-09a96bb5c94e.jpg?v=1770204072&width=1200
                                    [hostPageUrl] => https://store.fcbarcelona.com/en-in/collections/gifts-and-accessories/products/fc-barcelona-forever-25-26
                                    [contentSize] => 112563 B
                                    [width] => 1200
                                    [height] => 1601
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2804701bad4f4423e4afd0d5b1cd9dc1?rik=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8776C2BBD9D04B54393877EBE30305B2D2EBC0AF
                                    [accentColor] => B31825
                                    [isFresh] => 1
                                )

                            [7709B3F529180DFE37D58E5A402F9BF70DADD8D1] => Array
                                (
                                    [name] => Ronaldinho FC Barcelona 2005/06 Reissue Long Sleeve Shirt | FC ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th?id=OIF.RpxRq0Uec7Al%2fV0QQ%2feNig&pid=Api
                                    [datePublished] => 2026-03-22T15:28:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://store.fcbarcelona.com/cdn/shop/files/Reissue_Ronnie_BLM_FCB_Ecom_012.jpg?v=1774184770&width=1200
                                    [hostPageUrl] => https://store.fcbarcelona.com/en-in/collections/on-pitch/products/ronaldinho-fc-barcelona-2005-06-reissue-long-sleeve-jersey
                                    [contentSize] => 239833 B
                                    [width] => 1200
                                    [height] => 1600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f3a92c8e67ea22ee4bb0338ee7239049?rik=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1D8DDAD07FB9F204A5E85D73EFD081925F3B9077
                                    [accentColor] => 0066BA
                                    [isFresh] => 1
                                )

                            [485CEB7D67870078E4265D63B61FBAF15D51E03A] => Array
                                (
                                    [name] => Рыночная структура — Teletype
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Iu0_f4Vbc4s41YpbjFuoqgHaEe?pid=Api
                                    [datePublished] => 2022-04-22T14:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://telegra.ph/file/22df86b269cfe95e506db.png
                                    [hostPageUrl] => https://teletype.in/@cryptologykey/STRUKTURA-RYNKA-06-23
                                    [contentSize] => 100174 B
                                    [width] => 1778
                                    [height] => 1076
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.22ed3f7f855b738b38d58a5b8c5ba8aa?rik=hMW%2b13Z4AIdOYg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A30E15D51FABF16B36D5624E87007876D7BEC584
                                    [accentColor] => BA1F11
                                )

                            [F9A39B9EDF3B2BFF1A53D5144DEA83C8C29B6811] => Array
                                (
                                    [name] => Indian 500 rupee Images - Free Download on Freepik
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.SsYgSNXhJFo9sDQA6eCxnwHaF8?pid=Api
                                    [datePublished] => 2023-08-29T05:23:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.freepik.com/free-vector/indian-inr-rupee-sign-background-exchange-security_1017-44465.jpg?semt=ais_hybrid&w=740&q=80
                                    [hostPageUrl] => https://www.freepik.com/free-photos-vectors/indian-500-rupee
                                    [contentSize] => 33466 B
                                    [width] => 740
                                    [height] => 594
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4ac62048d5e1245a3db03400e9e0b19f?rik=nzq56f2zsv%2bhNQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1186B92C8C38AED4415D35A1FFB2B3FDE9B93A9F
                                    [accentColor] => 1A8AB1
                                )

                            [3844D431102605FE076FC5EBF6A05747C4C0466A] => Array
                                (
                                    [name] => Can A Face Towel Trigger Acne Mechanica? – Doctor Towels
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th?id=OIF.QgB%2b1di3eniNcROZ0qp9oA&pid=Api
                                    [datePublished] => 2026-04-16T04:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.doctortowels.com/cdn/shop/files/Box_Packing_converted.avif?v=1763360582&width=3840
                                    [hostPageUrl] => https://www.doctortowels.com/blogs/tips-and-diy-on-skincare-wellness-personal-hygiene-1/can-a-face-towel-trigger-acne-mechanica
                                    [contentSize] => 75505 B
                                    [width] => 1001
                                    [height] => 1192
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.47a529b4060c986b2be1ff519f930fab?rik=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A6640C4C74750A6FBE5CF670EF506201134D4483
                                    [accentColor] => 585450
                                    [isFresh] => 1
                                )

                            [A190C0AA449E9694754D581C9356DD8B977347C6] => Array
                                (
                                    [name] => Shop Electronics Products Online in India – Top Gadgets & Accessories ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.B8985WGAUuKDCwxkpU5epwHaFC?pid=Api
                                    [datePublished] => 2019-01-06T19:33:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images-cdn.ubuy.co.in/635ed26b75c9654bbb4e1593-aofoto-10x7ft-nebula-starry-sky-backdrop.jpg
                                    [hostPageUrl] => https://www.ubuy.co.in/category/electronics-10171
                                    [contentSize] => 148093 B
                                    [width] => 1089
                                    [height] => 741
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.07cf7ce5618052e2830b0c64a54e5ea7?rik=GgkMqkTpaUlX1A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6C743779B8DD6539C185D4574969E944AA0C091A
                                    [accentColor] => 210E37
                                )

                            [C1B7D34FBB1AB7055B5211B26A43D94F35302496] => Array
                                (
                                    [name] => FC Barcelona 2005/06 Reissue Long Sleeve Shirt | FC Barcelona – Barça ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th?id=OIF.IAe1WGt%2fBecdE4pz%2fcbvFw&pid=Api
                                    [datePublished] => 2026-04-14T15:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://store.fcbarcelona.com/cdn/shop/files/Reissue_Ronnie_BLM_FCB_Ecom_011.jpg?v=1774184752&width=1200
                                    [hostPageUrl] => https://store.fcbarcelona.com/en-in/collections/clothing/products/fc-barcelona-2005-06-reissue-long-sleeve-jersey
                                    [contentSize] => 246152 B
                                    [width] => 1200
                                    [height] => 1600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7c469a09649a6e10ad6d8e2f7e5e5fed?rik=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 69420353F49D34A62B1125B5507BA1BBF43D7B1C
                                    [accentColor] => 0068BE
                                    [isFresh] => 1
                                )

                            [7894547D0E4F6AA4BBC011B26A43D94F35302496] => Array
                                (
                                    [name] => FC Barcelona 2005/06 Reissue Long Sleeve Shirt | FC Barcelona – Barça ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIF.T8bhM4GZEffTtVolbWPB1A?pid=Api
                                    [datePublished] => 2026-04-14T15:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://store.fcbarcelona.com/cdn/shop/files/Reissue_Ronnie_BLM_FCB_Ecom_009.jpg?v=1774184752&width=1200
                                    [hostPageUrl] => https://store.fcbarcelona.com/en-in/collections/clothing/products/fc-barcelona-2005-06-reissue-long-sleeve-jersey
                                    [contentSize] => 326587 B
                                    [width] => 1200
                                    [height] => 1600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.abd5323f6403827727531a66d18542ca?rik=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 69420353F49D34A62B110CBB4AA6F4E0D7454987
                                    [accentColor] => 0062BA
                                    [isFresh] => 1
                                )

                            [2CDBC1CA9917E5DBE36A7421DAFDCD2403385DFA] => Array
                                (
                                    [name] => Cryptocurrencies aren’t really a solution to our problems
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.lvQpbJ7s2C4aU3F58gFJ3wHaFN?pid=Api
                                    [datePublished] => 2020-08-06T09:05:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://iit-techambit.in/content/images/2020/05/image-34-1.png
                                    [hostPageUrl] => https://iit-techambit.in/cryptocurrenciesarent-really-a-solutionto-our-problems/
                                    [contentSize] => 1115151 B
                                    [width] => 1022
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.96f4296c9eecd82e1a537179f20149df?rik=wr0crJlxXr0%2bpg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AFD5833042DCDFAD1247A63EBD5E7199AC1CBDC2
                                    [accentColor] => 2988A2
                                )

                            [2D4AAB691B0F2E98AC29CD0A3AD8B117F9F58EFF] => Array
                                (
                                    [name] => Teaching Faculty
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.TjXMSjj9pEF95HY9V3mobgAAAA?pid=Api
                                    [datePublished] => 2023-04-26T08:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://crraoaimscs.res.in/btech/images/teachars/7.jpg
                                    [hostPageUrl] => https://crraoaimscs.res.in/btech/teaching-faculty.php
                                    [contentSize] => 111705 B
                                    [width] => 300
                                    [height] => 300
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4e35cc4a38fda4417de4763d5779a86e?rik=0qS6lrHw4onKkg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FFE85F9F711B8DA3A0DC92CA89E2F0B196BAA4D2
                                    [accentColor] => 394A92
                                )

                            [0BF226DDAAA382AC8D4B8E5A402F9BF70DADD8D1] => Array
                                (
                                    [name] => Ronaldinho FC Barcelona 2005/06 Reissue Long Sleeve Shirt | FC ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th?id=OIF.RCT%2bKTp%2fdFIaSgTHlv7YgQ&pid=Api
                                    [datePublished] => 2026-03-22T15:28:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://store.fcbarcelona.com/cdn/shop/files/Reissue_Ronnie_BLM_FCB_Ecom_002.jpg?v=1774184770&width=1200
                                    [hostPageUrl] => https://store.fcbarcelona.com/en-in/collections/on-pitch/products/ronaldinho-fc-barcelona-2005-06-reissue-long-sleeve-jersey
                                    [contentSize] => 277505 B
                                    [width] => 1200
                                    [height] => 1600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2a29ef4298029b0f3411035ce99b5b34?rik=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1D8DDAD07FB9F204A5E8B4D8CA283AAADD622FB0
                                    [accentColor] => 006AB8
                                    [isFresh] => 1
                                )

                            [3A23B9EEBE1530BF0F4BBD06101748A3BA1EB43E] => Array
                                (
                                    [name] => Teaching Faculty
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.rWYA0-hZbBf4i1HIxNchNwAAAA?pid=Api
                                    [datePublished] => 2023-05-29T15:46:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.crraoaimscs.ac.in/images/teachars/11.jpg
                                    [hostPageUrl] => https://crraoaimscs.ac.in/teaching-faculty.php
                                    [contentSize] => 84903 B
                                    [width] => 300
                                    [height] => 300
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ad6600d3e8596c17f88b51c8c4d72137?rik=ozKb7utRA%2fvwtA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E34BE1AB3A84710160DBB4F0FB0351EBEE9B32A3
                                    [accentColor] => 44486B
                                )

                            [AC2AA088375D5317E08F2F610809A880A7B4B4B2] => Array
                                (
                                    [name] => Nike Academy Tee – Alexia Putellas Junior – Barça Official Store
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIF.RnBBNIhRchw1esGAsm0pjw?pid=Api
                                    [datePublished] => 2026-03-24T14:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://store.fcbarcelona.com/cdn/shop/files/Mesadetrabajo1-07.png?v=1769776572&width=1200
                                    [hostPageUrl] => https://store.fcbarcelona.com/en-in/collections/match-day-women/products/tee-nike-academy-alexia-putellas-junior
                                    [contentSize] => 2095201 B
                                    [width] => 1200
                                    [height] => 1601
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.94cd5c978dd5a2dc5f6ed4df03d07313?rik=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2B4B4B7A088A908016F2F80E7135D573880AA2CA
                                    [accentColor] => 734F5A
                                    [isFresh] => 1
                                )

                            [BBE238080D8E7AA3F873B4A0407BFE730C7334FE] => Array
                                (
                                    [name] => Ликвидность — Teletype
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.8l_QE1Y3L9ZiL1jtFrC9XAHaF1?pid=Api
                                    [datePublished] => 2022-04-14T06:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img2.teletype.in/files/d8/c0/d8c05cb2-7efd-4fed-b541-b7a361b05dce.jpeg
                                    [hostPageUrl] => https://teletype.in/@cryptologykey/Likvidnost-07-16
                                    [contentSize] => 42199 B
                                    [width] => 1232
                                    [height] => 972
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f25fd01356372fd6622f58ed16b0bd5c?rik=uy6DgNDopzqPNw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EF4337C037EFB7040A4B378F3AA7E8D080832EBB
                                    [accentColor] => 626469
                                )

                        )

                    [relatedSearches] => Array
                        (
                            [0] => Array
                                (
                                    [text] => Cryptography Background
                                    [displayText] => Cryptography Background
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Cryptography+Background&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6072.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Cryptography+Background
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Cryptography+Background&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [1] => Array
                                (
                                    [text] => Cryptology Symbols
                                    [displayText] => Cryptology Symbols
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Cryptology+Symbols&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6074.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Cryptology+Symbols
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Cryptology+Symbols&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [2] => Array
                                (
                                    [text] => Quantum Cryptography
                                    [displayText] => Quantum Cryptography
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Quantum+Cryptography&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6076.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Quantum+Cryptography
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Quantum+Cryptography&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [3] => Array
                                (
                                    [text] => Cryptic Background
                                    [displayText] => Cryptic Background
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Cryptic+Background&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6078.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Cryptic+Background
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Cryptic+Background&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [4] => Array
                                (
                                    [text] => Cryptography Wallpaper
                                    [displayText] => Cryptography Wallpaper
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Cryptography+Wallpaper&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6080.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Cryptography+Wallpaper
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Cryptography+Wallpaper&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [5] => Array
                                (
                                    [text] => Computer Cryptography
                                    [displayText] => Computer Cryptography
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Computer+Cryptography&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6082.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Computer+Cryptography
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Computer+Cryptography&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [6] => Array
                                (
                                    [text] => Cryptology David Ware
                                    [displayText] => Cryptology David Ware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Cryptology+David+Ware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6084.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Cryptology+David+Ware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Cryptology+David+Ware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [7] => Array
                                (
                                    [text] => Cryptology Photos
                                    [displayText] => Cryptology Photos
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Cryptology+Photos&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6086.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Cryptology+Photos
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Cryptology+Photos&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [8] => Array
                                (
                                    [text] => Cryptography Images
                                    [displayText] => Cryptography Images
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Cryptography+Images&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6088.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Cryptography+Images
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Cryptography+Images&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [9] => Array
                                (
                                    [text] => Post Quantum Cryptography
                                    [displayText] => Post Quantum Cryptography
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Post+Quantum+Cryptography&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6090.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Post+Quantum+Cryptography
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Post+Quantum+Cryptography&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [10] => Array
                                (
                                    [text] => Cryptographic
                                    [displayText] => Cryptographic
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Cryptographic&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6092.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Cryptographic
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Cryptographic&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [11] => Array
                                (
                                    [text] => Cryptography Poster
                                    [displayText] => Cryptography Poster
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Cryptography+Poster&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6094.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Cryptography+Poster
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Cryptography+Poster&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [12] => Array
                                (
                                    [text] => Symmetric-Key Cryptography
                                    [displayText] => Symmetric-Key Cryptography
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Symmetric-Key+Cryptography&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6096.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Symmetric-Key+Cryptography
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Symmetric-Key+Cryptography&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [13] => Array
                                (
                                    [text] => Cryptologic Designs
                                    [displayText] => Cryptologic Designs
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Cryptologic+Designs&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6098.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Cryptologic+Designs
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Cryptologic+Designs&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [14] => Array
                                (
                                    [text] => Mathematical Background for Cryptography
                                    [displayText] => Mathematical Background for Cryptography
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Mathematical+Background+for+Cryptography&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6100.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Mathematical+Background+for+Cryptography
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Mathematical+Background+for+Cryptography&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [15] => Array
                                (
                                    [text] => Crytography Images
                                    [displayText] => Crytography Images
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Crytography+Images&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6102.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Crytography+Images
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Crytography+Images&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [16] => Array
                                (
                                    [text] => Kriptography
                                    [displayText] => Kriptography
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Kriptography&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6104.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Kriptography
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Kriptography&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [17] => Array
                                (
                                    [text] => Modern Cryptology
                                    [displayText] => Modern Cryptology
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Modern+Cryptology&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6106.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Modern+Cryptology
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Modern+Cryptology&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [18] => Array
                                (
                                    [text] => Cryptology School
                                    [displayText] => Cryptology School
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Cryptology+School&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6108.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Cryptology+School
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Cryptology+School&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [19] => Array
                                (
                                    [text] => Cryptology Images
                                    [displayText] => Cryptology Images
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Cryptology+Images&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,6110.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Cryptology+Images
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Cryptology+Images&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                        )

                    [createdate] => 1776326682095
                )

            [json_error] => No error
            [products_count] => 120
            [related_searches_count] => 20
            [first_product_sample] => Array
                (
                    [name] => Himachal Family Tour Packages starting at 25000 INR per person
                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.XdEa69vvXfQUDVlScS1blAHaEK?pid=Api
                    [datePublished] => 2023-10-29T00:17:00.0000000Z
                    [isFamilyFriendly] => 1
                    [contentUrl] => https://www.indiatourismpackage.com/assets/images/backgrounds/inner-image/himachal-family-tour-package.webp
                    [hostPageUrl] => https://www.indiatourismpackage.com/family-tour-package-in-himachal
                    [contentSize] => 99264 B
                    [width] => 1200
                    [height] => 675
                    [cDNContentUrl] => https://th.bing.com/th/id/R.5dd11aebdbef5df4140d5952712d5b94?rik=RqizqCD0VfH68w&pid=ImgRaw&r=0
                    [isTransparent] => 
                    [imageId] => 3453561386AB3B238515F3FAF155F420A8B3A846
                    [accentColor] => CA4F01
                )

        )

    [skipped_products] => Array
        (
        )

)

Related Searches

Search