{
  "version": "1.2.0",
  "chapters": [
    {
      "startTime": 0,
      "title": "Magic Internet Math: Episode Six"
    },
    {
      "startTime": 34,
      "title": "Slogging Through the Study Guide"
    },
    {
      "startTime": 233,
      "title": "The Discrete Log Problem"
    },
    {
      "startTime": 362,
      "title": "Cryptography as Digital Physics"
    },
    {
      "startTime": 471,
      "title": "Computational Cost and Big O Notation"
    },
    {
      "startTime": 499,
      "title": "Neil Koblitz's Number Theory and Cryptography"
    },
    {
      "startTime": 774,
      "title": "Generator Example with Mod Sets"
    },
    {
      "startTime": 1041,
      "title": "Explaining What a Logarithm Is"
    },
    {
      "startTime": 1340,
      "title": "PEMDAS and the Order of Operations"
    },
    {
      "startTime": 1813,
      "title": "Discrete Log Problem and Asymmetry"
    },
    {
      "startTime": 1955,
      "title": "Continuous vs. Discrete in Math"
    },
    {
      "startTime": 2508,
      "title": "The Quantum Threat and Shor's Algorithm"
    },
    {
      "startTime": 3234,
      "title": "Modular Arithmetic and Square Roots"
    },
    {
      "startTime": 4614,
      "title": "River's Proof of Reserves"
    }
  ]
}