{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups\" title=\"Security &amp; Cryptography I: Key Generation &amp; Some final Remarks on Key Exchange\" src=\"https://dud-video.inf.tu-dresden.de/videos/embed/af2fc58f-b735-454d-9ff6-82e799164b00\" frameborder=\"0\" allowfullscreen></iframe>","width":560,"height":315,"title":"Security & Cryptography I: Key Generation & Some final Remarks on Key Exchange","author_name":"Security & Cryptography I","author_url":"https://dud-video.inf.tu-dresden.de/video-channels/saci","provider_name":"PeerTube","provider_url":"https://dud-video.inf.tu-dresden.de","thumbnail_url":"https://dud-video.inf.tu-dresden.de/lazy-static/previews/af2fc58f-b735-454d-9ff6-82e799164b00.jpg","thumbnail_width":850,"thumbnail_height":480}