{"id":7643,"date":"2019-03-20T09:21:25","date_gmt":"2019-03-20T08:21:25","guid":{"rendered":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/"},"modified":"2019-03-20T09:21:25","modified_gmt":"2019-03-20T08:21:25","slug":"phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models","status":"publish","type":"events","link":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/","title":{"rendered":"PhD Defense: Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models"},"content":{"rendered":"<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\"><p><strong>Members of the defence committee<\/strong>:<\/p><p><\/p><ul class=\"ulux-list\"><li class=\"ulux-list-item\">Chairman: Prof. Dr Jean-S\u00e9bastien Coron, University of Luxembourg<\/li><li class=\"ulux-list-item\">Vice-chairman: Prof. Dr Volker M\u00fcller, University of Luxembourg<\/li><li class=\"ulux-list-item\">Supervisor: Prof. Dr Alex Biryukov, University of Luxembourg<\/li><li class=\"ulux-list-item\">Member: Prof. Dr Gregor Leander, Ruhr-Universit\u00e4t Bochum, Germany<\/li><li class=\"ulux-list-item\">Member: Dr Matthieu Rivain, CryptoExperts, Paris, France<\/li><\/ul><p><strong>Abstract:<\/strong><\/p><p>Cryptography studies secure communications. In symmetric-key cryptography, the communicating parties have a shared secret key which allows both to encrypt and decrypt messages. The encryption schemes used are very efficient but have no rigorous security proof. In order to design a symmetric-key primitive, one has to ensure that the primitive is secure at least against known attacks. During 4 years of my doctoral studies at the University of Luxembourg under the supervision of Prof. Alex Biryukov, I studied symmetric-key cryptography and contributed to several of its topics.<\/p><p>Part 1 is about the structural and decomposition cryptanalysis. This type of cryptanalysis aims to exploit properties of the algorithmic structure of a cryptographic function. The first goal is to distinguish a function with a particular structure from random, structure-less functions. The second goal is to recover components of the structure in order to obtain a decomposition of the function. Decomposition attacks are also used to uncover secret structures of S-Boxes, cryptographic functions over small domains. In this part, I describe structural and decomposition cryptanalysis of the Feistel Network structure, decompositions of the S-Box used in the recent Russian cryptographic standard, and a decomposition of the only known APN permutation in even dimension.<\/p><p>Part 2 is about the invariant-based cryptanalysis. This method became recently an active research topic. It happened mainly due to recent \u201cextreme\u201d cryptographic designs, which turned out to be vulnerable to this cryptanalysis method. In this part, I describe an invariant-based analysis of NORX, an authenticated cypher. Further, I show a theoretical study of linear layers that preserve low-degree invariants of a particular form used in the recent attacks on block cyphers.<\/p><p>Part 3 is about the white-box cryptography. In the white-box model, an adversary has full access to the cryptographic implementation, which in particular may contain a secret key. The possibility of creating implementations of symmetric-key primitives secure in this model is a long-standing open question. Such implementations have many applications in industry; in particular, in mobile payment systems. In this part, I study the possibility of applying masking, a side-channel countermeasure, to protect white-box implementations. I describe several attacks on direct application of masking and provide a provably-secure countermeasure against a strong class of the attacks.<\/p><p>Part 4 is about the design of symmetric-key primitives. I contributed to design of the block cypher family SPARX and to the design of a suite of cryptographic algorithms, which includes the cryptographic permutation family SPARKLE, the cryptographic hash function family ESCH, and the authenticated encryption family SCHWAEMM. In this part, I describe the security analysis that I made for these designs.<\/p><\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>Members of the defence committee:Chairman: Prof. Dr Jean-S\u00e9bastien Coron, University of LuxembourgVice-chairman: Prof. Dr Volker M\u00fcller, University of LuxembourgSupervisor: Prof. Dr Alex Biryukov, University of LuxembourgMember: Prof. Dr Gregor Leander, Ruhr-Universit\u00e4t Bochum, GermanyMember: Dr Matthieu Rivain, CryptoExperts, Paris, France<\/p>\n","protected":false},"author":0,"featured_media":7644,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"featured_image_focal_point":[],"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"event_start_date":"2019-04-09 14:00:00","event_end_date":"2019-04-09 17:00:00","event_speaker_name":"Aleksei Udovenko","event_speaker_link":"","event_is_online":false,"event_location":"Room MSA 2.170, \r\nMaison du Savoir, Campus Belval \r\n2, avenue de l'Universit\u00e9\r\nL-4365 Esch-sur-Alzette","event_street":"","event_location_link":"","event_zip_code":"","event_city":"","event_country":"LU"},"events-topic":[],"events-type":[],"organisation":[184,226],"authorship":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PhD Defense: Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models - Universit\u00e9 du Luxembourg<\/title>\n<meta name=\"description\" content=\"Members of the defence committee:Chairman: Prof. Dr Jean-S\u00e9bastien Coron, University of LuxembourgVice-chairman: Prof. Dr Volker M\u00fcller, University of LuxembourgSupervisor: Prof. Dr Alex Biryukov, University of LuxembourgMember: Prof. Dr Gregor Leander, Ruhr-Universit\u00e4t Bochum, GermanyMember: Dr Matthieu Rivain, CryptoExperts, Paris, France\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PhD Defense: Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models\" \/>\n<meta property=\"og:description\" content=\"Members of the defence committee:Chairman: Prof. Dr Jean-S\u00e9bastien Coron, University of LuxembourgVice-chairman: Prof. Dr Volker M\u00fcller, University of LuxembourgSupervisor: Prof. Dr Alex Biryukov, University of LuxembourgMember: Prof. Dr Gregor Leander, Ruhr-Universit\u00e4t Bochum, GermanyMember: Dr Matthieu Rivain, CryptoExperts, Paris, France\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/\" \/>\n<meta property=\"og:site_name\" content=\"UNI FR\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uni.lu\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/\",\"url\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/\",\"name\":\"PhD Defense: Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models - Universit\u00e9 du Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/03\/phd_defense_design_and_cryptanalysis_of_symmetric_key_algorithms_in_black_and_white_box_models-scaled.jpg\",\"datePublished\":\"2019-03-20T08:21:25+00:00\",\"dateModified\":\"2019-03-20T08:21:25+00:00\",\"description\":\"Members of the defence committee:Chairman: Prof. Dr Jean-S\u00e9bastien Coron, University of LuxembourgVice-chairman: Prof. Dr Volker M\u00fcller, University of LuxembourgSupervisor: Prof. Dr Alex Biryukov, University of LuxembourgMember: Prof. Dr Gregor Leander, Ruhr-Universit\u00e4t Bochum, GermanyMember: Dr Matthieu Rivain, CryptoExperts, Paris, France\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/#primaryimage\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/03\/phd_defense_design_and_cryptanalysis_of_symmetric_key_algorithms_in_black_and_white_box_models-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/03\/phd_defense_design_and_cryptanalysis_of_symmetric_key_algorithms_in_black_and_white_box_models-scaled.jpg\",\"width\":2560,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Events\",\"item\":\"https:\/\/www.uni.lu\/fr\/events\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"PhD Defense: Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/fr\/#website\",\"url\":\"https:\/\/www.uni.lu\/fr\/\",\"name\":\"Uni.lu\",\"description\":\"Universit\u00e9 du Luxembourg\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/#organization\"},\"alternateName\":\"Universit\u00e9 du Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/fr\/#organization\",\"name\":\"Universit\u00e9 du Luxembourg\",\"alternateName\":\"Uni.lu\",\"url\":\"https:\/\/www.uni.lu\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"Universit\u00e9 du Luxembourg\"},\"image\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/04\/24120552\/20200609-Belval-Campus_Henri-Goergen-23.jpg\",\"sameAs\":[\"https:\/\/www.facebook.com\/uni.lu\",\"https:\/\/www.linkedin.com\/school\/university-of-luxembourg\/\",\"https:\/\/www.instagram.com\/uni.lu\",\"https:\/\/www.youtube.com\/@uni_lu\",\"https:\/\/en.wikipedia.org\/wiki\/University_of_Luxembourg\"],\"email\":\"communication@uni.lu\",\"telephone\":\"+352 46 66 44 1\",\"address\":{\"@type\":\"PostalAddress\",\"streetAddress\":\"2, place de l\u2019Universit\u00e9\",\"addressLocality\":\"Esch-sur-Alzette\",\"postalCode\":\"4365\",\"addressCountry\":\"LU\"},\"description\":\"Universit\u00e9 du Luxembourg\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PhD Defense: Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models - Universit\u00e9 du Luxembourg","description":"Members of the defence committee:Chairman: Prof. Dr Jean-S\u00e9bastien Coron, University of LuxembourgVice-chairman: Prof. Dr Volker M\u00fcller, University of LuxembourgSupervisor: Prof. Dr Alex Biryukov, University of LuxembourgMember: Prof. Dr Gregor Leander, Ruhr-Universit\u00e4t Bochum, GermanyMember: Dr Matthieu Rivain, CryptoExperts, Paris, France","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/","og_locale":"fr_FR","og_type":"article","og_title":"PhD Defense: Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models","og_description":"Members of the defence committee:Chairman: Prof. Dr Jean-S\u00e9bastien Coron, University of LuxembourgVice-chairman: Prof. Dr Volker M\u00fcller, University of LuxembourgSupervisor: Prof. Dr Alex Biryukov, University of LuxembourgMember: Prof. Dr Gregor Leander, Ruhr-Universit\u00e4t Bochum, GermanyMember: Dr Matthieu Rivain, CryptoExperts, Paris, France","og_url":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/","og_site_name":"UNI FR","article_publisher":"https:\/\/www.facebook.com\/uni.lu","og_image":[{"width":2560,"height":2560,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/","url":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/","name":"PhD Defense: Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models - Universit\u00e9 du Luxembourg","isPartOf":{"@id":"https:\/\/www.uni.lu\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/#primaryimage"},"image":{"@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/03\/phd_defense_design_and_cryptanalysis_of_symmetric_key_algorithms_in_black_and_white_box_models-scaled.jpg","datePublished":"2019-03-20T08:21:25+00:00","dateModified":"2019-03-20T08:21:25+00:00","description":"Members of the defence committee:Chairman: Prof. Dr Jean-S\u00e9bastien Coron, University of LuxembourgVice-chairman: Prof. Dr Volker M\u00fcller, University of LuxembourgSupervisor: Prof. Dr Alex Biryukov, University of LuxembourgMember: Prof. Dr Gregor Leander, Ruhr-Universit\u00e4t Bochum, GermanyMember: Dr Matthieu Rivain, CryptoExperts, Paris, France","breadcrumb":{"@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/#primaryimage","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/03\/phd_defense_design_and_cryptanalysis_of_symmetric_key_algorithms_in_black_and_white_box_models-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/03\/phd_defense_design_and_cryptanalysis_of_symmetric_key_algorithms_in_black_and_white_box_models-scaled.jpg","width":2560,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/fr\/events\/phd-defense-design-and-cryptanalysis-of-symmetric-key-algorithms-in-black-and-white-box-models\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/fr\/"},{"@type":"ListItem","position":2,"name":"Events","item":"https:\/\/www.uni.lu\/fr\/events\/"},{"@type":"ListItem","position":3,"name":"PhD Defense: Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/fr\/#website","url":"https:\/\/www.uni.lu\/fr\/","name":"Uni.lu","description":"Universit\u00e9 du Luxembourg","publisher":{"@id":"https:\/\/www.uni.lu\/fr\/#organization"},"alternateName":"Universit\u00e9 du Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/fr\/#organization","name":"Universit\u00e9 du Luxembourg","alternateName":"Uni.lu","url":"https:\/\/www.uni.lu\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"Universit\u00e9 du Luxembourg"},"image":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/04\/24120552\/20200609-Belval-Campus_Henri-Goergen-23.jpg","sameAs":["https:\/\/www.facebook.com\/uni.lu","https:\/\/www.linkedin.com\/school\/university-of-luxembourg\/","https:\/\/www.instagram.com\/uni.lu","https:\/\/www.youtube.com\/@uni_lu","https:\/\/en.wikipedia.org\/wiki\/University_of_Luxembourg"],"email":"communication@uni.lu","telephone":"+352 46 66 44 1","address":{"@type":"PostalAddress","streetAddress":"2, place de l\u2019Universit\u00e9","addressLocality":"Esch-sur-Alzette","postalCode":"4365","addressCountry":"LU"},"description":"Universit\u00e9 du Luxembourg"}]}},"_links":{"self":[{"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events\/7643"}],"collection":[{"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events"}],"about":[{"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/types\/events"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/comments?post=7643"}],"version-history":[{"count":0,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events\/7643\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/media\/7644"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/media?parent=7643"}],"wp:term":[{"taxonomy":"events-topic","embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events-topic?post=7643"},{"taxonomy":"events-type","embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events-type?post=7643"},{"taxonomy":"organisation","embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/organisation?post=7643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}