{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups\" title=\"Security &amp; Cryptography I: Some additional remarks regarding DH-Key Agreement\" src=\"https://dud-video.inf.tu-dresden.de/videos/embed/2717cec5-3add-40e3-9694-c561198c8c85\" frameborder=\"0\" allowfullscreen></iframe>","width":560,"height":315,"title":"Security & Cryptography I: Some additional remarks regarding DH-Key Agreement","author_name":"Security & Cryptography I","author_url":"https://dud-video.inf.tu-dresden.de/video-channels/saci","provider_name":"PeerTube","provider_url":"https://dud-video.inf.tu-dresden.de","thumbnail_url":"https://dud-video.inf.tu-dresden.de/lazy-static/previews/2717cec5-3add-40e3-9694-c561198c8c85.jpg","thumbnail_width":850,"thumbnail_height":480}