{"version":"1.0","provider_name":"Mathemalchemy","provider_url":"https:\/\/mathemalchemy.org\/fr\/","author_name":"mathemalchemy team","author_url":"https:\/\/mathemalchemy.org\/fr\/author\/mathemalchemy-team\/","title":"Courtepointe cryptographique - Connexions math\u00e9matiques - Mathemalchemy","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"zfFXWIodGH\"><a href=\"https:\/\/mathemalchemy.org\/fr\/2022\/01\/23\/cryptographie-quilt-connexions-mathematiques\/\">Courtepointe cryptographique &#8211; Connexions math\u00e9matiques<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/mathemalchemy.org\/fr\/2022\/01\/23\/cryptographie-quilt-connexions-mathematiques\/embed\/#?secret=zfFXWIodGH\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Courtepointe cryptographique &#8211; Connexions math\u00e9matiques\u00a0\u00bb &#8212; Mathemalchemy\" data-secret=\"zfFXWIodGH\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/mathemalchemy.org\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/mathemalchemy.org\/wp-content\/uploads\/2022\/01\/central-padlock-cryptography-quilt-mathemalchemy-art-installation.jpg","thumbnail_width":1256,"thumbnail_height":1229,"description":"La cryptographie ou \u00ab \u00e9criture secr\u00e8te \u00bb est un concept ancien. Depuis plusieurs mill\u00e9naires au moins, les gens ont voulu communiquer des messages \u00e0 des personnes \u00e9loign\u00e9es de telle sorte que, m\u00eame si le message \u00e9tait intercept\u00e9, il ne serait pas lisible par les intercepteurs. Pour y arriver, ils ont utilis\u00e9 diff\u00e9rentes formes de \u00abLire la suite"}