{"id":7473,"date":"2019-01-07T15:27:24","date_gmt":"2019-01-07T14:27:24","guid":{"rendered":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/"},"modified":"2019-01-07T15:27:24","modified_gmt":"2019-01-07T14:27:24","slug":"phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography","status":"publish","type":"events","link":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/","title":{"rendered":"PhD Defense: From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography"},"content":{"rendered":"<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\"><p><strong>Members of the defense committee<\/strong>:<\/p><ul class=\"ulux-list\"><li class=\"ulux-list-item\">Prof. Dr. Sjouke Mauw, Universit\u00e9 du Luxembourg, chairman<\/li><li class=\"ulux-list-item\">Dr. Peter Roenne, Universit\u00e9 du Luxembourg, vice-chairman<\/li><li class=\"ulux-list-item\">Prof. Dr. Peter Y.A. Ryan, Universit\u00e9 du Luxembourg, supervisor<\/li><li class=\"ulux-list-item\">Dr. Cas Cremers, CISPA \u2013Helmholtz Center for Information Security, member<\/li><li class=\"ulux-list-item\">Prof. Dr. Jintai Ding, University of Cincinnati, member<\/li><\/ul><p><strong>Abstract<\/strong>:<\/p><p>Research questions, originally rooted in quantum key exchange (QKE), have branched off into independent lines of inquiry ranging from information theory to fundamental physics. In a similar vein, the first part of this thesis is dedicated to information theory problems in deletion channels that arose in the context of QKE. From the output produced by a memoryless deletion channel with a uniformly random input of known length n, one obtains a posterior distribution on the channel input. The difference between the Shannon entropy of this distribution and that of the uniform prior measures the amount of information about the channel input which is conveyed by the output of length m. We first conjecture on the basis of experimental data that the entropy of the posterior is minimized by the constant strings 000&#8230;, 111&#8230; and maximized by the alternating strings 0101&#8230;, 1010&#8230;. Among other things, we derive analytic expressions for minimal entropy and propose alternative approaches for tackling the entropy extremization problem. We address a series of closely related combinatorial problems involving binary (sub\/super)-sequences and prove the original minimal entropy conjecture for the special cases of single and double deletions using clustering techniques and a run-length encoding of strings. The entropy analysis culminates in a fundamental characterization of the extremal entropic cases in terms of the distribution of embeddings. We confirm the minimization conjecture in the asymptotic limit using results from hidden word statistics by showing how the analytic-combinatorial methods of Flajolet, Szpankowski and Vall\u00e9e, relying on generating functions, can be applied to resolve the case of fixed output length and n \u2192 \u221e.<\/p><p>\u00a0<\/p><p>In the second part, we revisit the notion of deniability in QKE, a topic that remains largely unexplored. In a work by Donald Beaver it is argued that QKE protocols are not necessarily deniable due to an eavesdropping attack that limits key equivocation. We provide more insight into the nature of this attack and discuss how it extends to other prepare-and-measure QKE schemes such as QKE obtained from uncloneable encryption. We adopt the framework for quantum authenticated key exchange developed by Mosca et al. and extend it to introduce the notion of coercer-deniable QKE, formalized in terms of the indistinguishability of real and fake coercer views. We also elaborate on the differences between our model and the standard simulation-based definition of deniable key exchange in the classical setting. We establish a connection between the concept of covert communication and deniability by applying results from a work by Arrazola and Scarani on obtaining covert quantum communication and covert QKE to propose a simple construction for coercer-deniable QKE. We prove the deniability of this scheme via a reduction to the security of covert QKE. We relate deniability to fundamental concepts in quantum information theory and suggest a generic approach based on entanglement distillation for achieving information-theoretic deniability, followed by an analysis of other closely related results such as the relation between the impossibility of unconditionally secure quantum bit commitment and deniability. Finally, we present an efficient coercion-resistant and quantum-secure voting scheme, based on fully homomorphic encryption (FHE) and recent advances in various FHE primitives such as hashing, zero-knowledge proofs of correct decryption, verifiable shuffles and threshold FHE.<\/p><\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>Members of the defense committee:Prof. Dr. Sjouke Mauw, Universit\u00e9 du Luxembourg, chairmanDr. Peter Roenne, Universit\u00e9 du Luxembourg, vice-chairmanProf. Dr. Peter Y.A. Ryan, Universit\u00e9 du Luxembourg, supervisorDr. Cas Cremers, CISPA \u2013Helmholtz Center for Information Security, memberProf. Dr. Jintai Ding, University of Cincinnati, member<\/p>\n","protected":false},"author":0,"featured_media":7474,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"featured_image_focal_point":[],"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"event_start_date":"2019-01-23 14:00:00","event_end_date":"2019-01-23 17:00:00","event_speaker_name":"Arash Atashpendar","event_speaker_link":"","event_is_online":false,"event_location":"Room 1.020 \r\nMaison du Nombre (MNO), Campus Belval\r\n6, avenue de la Fonte\r\nL-4364 Esch-sur-Alzette","event_street":"","event_location_link":"","event_zip_code":"","event_city":"","event_country":"LU"},"events-topic":[],"events-type":[],"organisation":[184,226],"authorship":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PhD Defense: From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography - Universit\u00e9 du Luxembourg<\/title>\n<meta name=\"description\" content=\"Members of the defense committee:Prof. Dr. Sjouke Mauw, Universit\u00e9 du Luxembourg, chairmanDr. Peter Roenne, Universit\u00e9 du Luxembourg, vice-chairmanProf. Dr. Peter Y.A. Ryan, Universit\u00e9 du Luxembourg, supervisorDr. Cas Cremers, CISPA \u2013Helmholtz Center for Information Security, memberProf. Dr. Jintai Ding, University of Cincinnati, member\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PhD Defense: From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography\" \/>\n<meta property=\"og:description\" content=\"Members of the defense committee:Prof. Dr. Sjouke Mauw, Universit\u00e9 du Luxembourg, chairmanDr. Peter Roenne, Universit\u00e9 du Luxembourg, vice-chairmanProf. Dr. Peter Y.A. Ryan, Universit\u00e9 du Luxembourg, supervisorDr. Cas Cremers, CISPA \u2013Helmholtz Center for Information Security, memberProf. Dr. Jintai Ding, University of Cincinnati, member\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"UNI FR\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uni.lu\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/\",\"url\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/\",\"name\":\"PhD Defense: From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography - Universit\u00e9 du Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/01\/default-3.jpg\",\"datePublished\":\"2019-01-07T14:27:24+00:00\",\"dateModified\":\"2019-01-07T14:27:24+00:00\",\"description\":\"Members of the defense committee:Prof. Dr. Sjouke Mauw, Universit\u00e9 du Luxembourg, chairmanDr. Peter Roenne, Universit\u00e9 du Luxembourg, vice-chairmanProf. Dr. Peter Y.A. Ryan, Universit\u00e9 du Luxembourg, supervisorDr. Cas Cremers, CISPA \u2013Helmholtz Center for Information Security, memberProf. Dr. Jintai Ding, University of Cincinnati, member\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/#primaryimage\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/01\/default-3.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/01\/default-3.jpg\",\"width\":1500,\"height\":1125},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Events\",\"item\":\"https:\/\/www.uni.lu\/fr\/events\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"PhD Defense: From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/fr\/#website\",\"url\":\"https:\/\/www.uni.lu\/fr\/\",\"name\":\"Uni.lu\",\"description\":\"Universit\u00e9 du Luxembourg\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/#organization\"},\"alternateName\":\"Universit\u00e9 du Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/fr\/#organization\",\"name\":\"Universit\u00e9 du Luxembourg\",\"alternateName\":\"Uni.lu\",\"url\":\"https:\/\/www.uni.lu\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"Universit\u00e9 du Luxembourg\"},\"image\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/04\/24120552\/20200609-Belval-Campus_Henri-Goergen-23.jpg\",\"sameAs\":[\"https:\/\/www.facebook.com\/uni.lu\",\"https:\/\/www.linkedin.com\/school\/university-of-luxembourg\/\",\"https:\/\/www.instagram.com\/uni.lu\",\"https:\/\/www.youtube.com\/@uni_lu\",\"https:\/\/en.wikipedia.org\/wiki\/University_of_Luxembourg\"],\"email\":\"communication@uni.lu\",\"telephone\":\"+352 46 66 44 1\",\"address\":{\"@type\":\"PostalAddress\",\"streetAddress\":\"2, place de l\u2019Universit\u00e9\",\"addressLocality\":\"Esch-sur-Alzette\",\"postalCode\":\"4365\",\"addressCountry\":\"LU\"},\"description\":\"Universit\u00e9 du Luxembourg\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PhD Defense: From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography - Universit\u00e9 du Luxembourg","description":"Members of the defense committee:Prof. Dr. Sjouke Mauw, Universit\u00e9 du Luxembourg, chairmanDr. Peter Roenne, Universit\u00e9 du Luxembourg, vice-chairmanProf. Dr. Peter Y.A. Ryan, Universit\u00e9 du Luxembourg, supervisorDr. Cas Cremers, CISPA \u2013Helmholtz Center for Information Security, memberProf. Dr. Jintai Ding, University of Cincinnati, member","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/","og_locale":"fr_FR","og_type":"article","og_title":"PhD Defense: From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography","og_description":"Members of the defense committee:Prof. Dr. Sjouke Mauw, Universit\u00e9 du Luxembourg, chairmanDr. Peter Roenne, Universit\u00e9 du Luxembourg, vice-chairmanProf. Dr. Peter Y.A. Ryan, Universit\u00e9 du Luxembourg, supervisorDr. Cas Cremers, CISPA \u2013Helmholtz Center for Information Security, memberProf. Dr. Jintai Ding, University of Cincinnati, member","og_url":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/","og_site_name":"UNI FR","article_publisher":"https:\/\/www.facebook.com\/uni.lu","og_image":[{"width":2560,"height":2560,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/","url":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/","name":"PhD Defense: From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography - Universit\u00e9 du Luxembourg","isPartOf":{"@id":"https:\/\/www.uni.lu\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/#primaryimage"},"image":{"@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/01\/default-3.jpg","datePublished":"2019-01-07T14:27:24+00:00","dateModified":"2019-01-07T14:27:24+00:00","description":"Members of the defense committee:Prof. Dr. Sjouke Mauw, Universit\u00e9 du Luxembourg, chairmanDr. Peter Roenne, Universit\u00e9 du Luxembourg, vice-chairmanProf. Dr. Peter Y.A. Ryan, Universit\u00e9 du Luxembourg, supervisorDr. Cas Cremers, CISPA \u2013Helmholtz Center for Information Security, memberProf. Dr. Jintai Ding, University of Cincinnati, member","breadcrumb":{"@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/#primaryimage","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/01\/default-3.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/01\/default-3.jpg","width":1500,"height":1125},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-from-information-theory-puzzles-in-deletion-channels-to-deniability-in-quantum-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/fr\/"},{"@type":"ListItem","position":2,"name":"Events","item":"https:\/\/www.uni.lu\/fr\/events\/"},{"@type":"ListItem","position":3,"name":"PhD Defense: From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/fr\/#website","url":"https:\/\/www.uni.lu\/fr\/","name":"Uni.lu","description":"Universit\u00e9 du Luxembourg","publisher":{"@id":"https:\/\/www.uni.lu\/fr\/#organization"},"alternateName":"Universit\u00e9 du Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/fr\/#organization","name":"Universit\u00e9 du Luxembourg","alternateName":"Uni.lu","url":"https:\/\/www.uni.lu\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"Universit\u00e9 du Luxembourg"},"image":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/04\/24120552\/20200609-Belval-Campus_Henri-Goergen-23.jpg","sameAs":["https:\/\/www.facebook.com\/uni.lu","https:\/\/www.linkedin.com\/school\/university-of-luxembourg\/","https:\/\/www.instagram.com\/uni.lu","https:\/\/www.youtube.com\/@uni_lu","https:\/\/en.wikipedia.org\/wiki\/University_of_Luxembourg"],"email":"communication@uni.lu","telephone":"+352 46 66 44 1","address":{"@type":"PostalAddress","streetAddress":"2, place de l\u2019Universit\u00e9","addressLocality":"Esch-sur-Alzette","postalCode":"4365","addressCountry":"LU"},"description":"Universit\u00e9 du Luxembourg"}]}},"_links":{"self":[{"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events\/7473"}],"collection":[{"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events"}],"about":[{"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/types\/events"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/comments?post=7473"}],"version-history":[{"count":0,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events\/7473\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/media\/7474"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/media?parent=7473"}],"wp:term":[{"taxonomy":"events-topic","embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events-topic?post=7473"},{"taxonomy":"events-type","embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events-type?post=7473"},{"taxonomy":"organisation","embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/organisation?post=7473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}