default search action
Maria Eichlseder
Person information
- affiliation: Graz University of Technology, Austria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Hosein Hadipour, Simon Gerhalter, Sadegh Sadeghi, Maria Eichlseder:
Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2. IACR Trans. Symmetric Cryptol. 2024(1): 234-325 (2024) - [j17]Debasmita Chakraborty, Hosein Hadipour, Phuong Hoa Nguyen, Maria Eichlseder:
Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs. IACR Trans. Symmetric Cryptol. 2024(3): 84-176 (2024) - [c32]Hosein Hadipour, Patrick Derbez, Maria Eichlseder:
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT. CRYPTO (4) 2024: 38-72 - [c31]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom Functions. CT-RSA 2024: 381-403 - [i46]Hosein Hadipour, Patrick Derbez, Maria Eichlseder:
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT. IACR Cryptol. ePrint Arch. 2024: 255 (2024) - [i45]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Preliminary Analysis of Ascon-Xof and Ascon-Hash. IACR Cryptol. ePrint Arch. 2024: 908 (2024) - [i44]Debasmita Chakraborty, Hosein Hadipour, Phuong Hoa Nguyen, Maria Eichlseder:
Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs. IACR Cryptol. ePrint Arch. 2024: 1359 (2024) - 2023
- [j16]Marcel Nageler, Felix Pallua, Maria Eichlseder:
Finding Collisions for Round-Reduced Romulus-H. IACR Trans. Symmetric Cryptol. 2023(1): 67-88 (2023) - [j15]Roberto Avanzi, Subhadeep Banik, Orr Dunkelman, Maria Eichlseder, Shibam Ghosh, Marcel Nageler, Francesco Regazzoni:
The QARMAv2 Family of Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2023(3): 25-73 (2023) - [c30]Hosein Hadipour, Sadegh Sadeghi, Maria Eichlseder:
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks. EUROCRYPT (4) 2023: 128-157 - [c29]Jonas Juffinger, Lukas Lamster, Andreas Kogler, Maria Eichlseder, Moritz Lipp, Daniel Gruss:
CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer. SP 2023: 1702-1718 - [c28]Lukas Giner, Stefan Steinegger, Antoon Purnal, Maria Eichlseder, Thomas Unterluggauer, Stefan Mangard, Daniel Gruss:
Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks. SP 2023: 2273-2287 - [i43]Roberto Avanzi, Subhadeep Banik, Orr Dunkelman, Maria Eichlseder, Shibam Ghosh, Marcel Nageler, Francesco Regazzoni:
The tweakable block cipher family QARMAv2. IACR Cryptol. ePrint Arch. 2023: 929 (2023) - [i42]Hosein Hadipour, Simon Gerhalter, Sadegh Sadeghi, Maria Eichlseder:
Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2. IACR Cryptol. ePrint Arch. 2023: 1701 (2023) - 2022
- [j14]Orr Dunkelman, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, Markus Schofnegger:
Practical key recovery attacks on FlexAEAD. Des. Codes Cryptogr. 90(4): 983-1007 (2022) - [j13]Navid Vafaei, Sara Zarei, Nasour Bagheri, Maria Eichlseder, Robert Primas, Hadi Soleimany:
Statistical Effective Fault Attacks: The Other Side of the Coin. IEEE Trans. Inf. Forensics Secur. 17: 1855-1867 (2022) - [j12]Johannes Erlacher, Florian Mendel, Maria Eichlseder:
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis. IACR Trans. Symmetric Cryptol. 2022(1): 64-87 (2022) - [j11]Hosein Hadipour, Maria Eichlseder:
Integral Cryptanalysis of WARP based on Monomial Prediction. IACR Trans. Symmetric Cryptol. 2022(2): 92-112 (2022) - [j10]Hosein Hadipour, Marcel Nageler, Maria Eichlseder:
Throwing Boomerangs into Feistel Structures Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE. IACR Trans. Symmetric Cryptol. 2022(3): 271-302 (2022) - [c27]Hosein Hadipour, Maria Eichlseder:
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges. ACNS 2022: 230-250 - [c26]Marcel Nageler, Christoph Dobraunig, Maria Eichlseder:
Information-Combining Differential Fault Attacks on DEFAULT. EUROCRYPT (3) 2022: 168-191 - [i41]Maria Eichlseder, Ahmet Can Mert, Christian Rechberger, Markus Schofnegger:
Small MACs from Small Permutations. IACR Cryptol. ePrint Arch. 2022: 49 (2022) - [i40]Navid Vafaei, Sara Zarei, Nasour Bagheri, Maria Eichlseder, Robert Primas, Hadi Soleimany:
Statistical Effective Fault Attacks: The other Side of the Coin. IACR Cryptol. ePrint Arch. 2022: 642 (2022) - [i39]Hosein Hadipour, Maria Eichlseder:
Integral Cryptanalysis of WARP based on Monomial Prediction. IACR Cryptol. ePrint Arch. 2022: 729 (2022) - [i38]Hosein Hadipour, Marcel Nageler, Maria Eichlseder:
Throwing Boomerangs into Feistel Structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE. IACR Cryptol. ePrint Arch. 2022: 745 (2022) - [i37]Hosein Hadipour, Sadegh Sadeghi, Maria Eichlseder:
Finding the Impossible: Automated Search for Full Impossible Differential, Zero-Correlation, and Integral Attacks. IACR Cryptol. ePrint Arch. 2022: 1147 (2022) - [i36]Marcel Nageler, Felix Pallua, Maria Eichlseder:
Finding Collisions for Round-Reduced Romulus-H. IACR Cryptol. ePrint Arch. 2022: 1630 (2022) - 2021
- [j9]Martin Tappler, Bernhard K. Aichernig, Giovanni Bacci, Maria Eichlseder, Kim G. Larsen:
L*-based learning of Markov decision processes (extended version). Formal Aspects Comput. 33(4-5): 575-615 (2021) - [j8]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Ascon v1.2: Lightweight Authenticated Encryption and Hashing. J. Cryptol. 34(3): 33 (2021) - [i35]Orr Dunkelman, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, Markus Schofnegger:
Practical Key Recovery Attacks on FlexAEAD. IACR Cryptol. ePrint Arch. 2021: 931 (2021) - [i34]Marcel Nageler, Christoph Dobraunig, Maria Eichlseder:
Information-Combining Differential Fault Attacks on DEFAULT. IACR Cryptol. ePrint Arch. 2021: 1374 (2021) - [i33]Hosein Hadipour, Maria Eichlseder:
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges. IACR Cryptol. ePrint Arch. 2021: 1529 (2021) - [i32]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Ascon PRF, MAC, and Short-Input MAC. IACR Cryptol. ePrint Arch. 2021: 1574 (2021) - 2020
- [j7]Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Florian Mendel, Robert Primas:
Protecting against Statistical Ineffective Fault Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 508-543 (2020) - [j6]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, Thomas Unterluggauer:
Isap v2.0. IACR Trans. Symmetric Cryptol. 2020(S1): 390-416 (2020) - [c25]Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang:
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC. ASIACRYPT (1) 2020: 477-506 - [c24]Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems. CRYPTO (3) 2020: 299-328 - [c23]Maria Eichlseder, Gregor Leander, Shahram Rasoolzadeh:
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers. INDOCRYPT 2020: 345-369 - [c22]Dusan Bozilov, Maria Eichlseder, Miroslav Knezevic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer:
PRINCEv2 - More Security for (Almost) No Overhead. SAC 2020: 483-511 - [i31]Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang:
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC. IACR Cryptol. ePrint Arch. 2020: 182 (2020) - [i30]Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems. IACR Cryptol. ePrint Arch. 2020: 188 (2020) - [i29]Dusan Bozilov, Maria Eichlseder, Miroslav Knezevic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer:
PRINCEv2 - More Security for (Almost) No Overhead. IACR Cryptol. ePrint Arch. 2020: 1269 (2020) - [i28]Maria Eichlseder, Gregor Leander, Shahram Rasoolzadeh:
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 1356 (2020)
2010 – 2019
- 2019
- [j5]Maria Eichlseder, Marcel Nageler, Robert Primas:
Analyzing the Linear Keystream Biases in AEGIS. IACR Trans. Symmetric Cryptol. 2019(4): 348-368 (2019) - [c21]Martin Tappler, Bernhard K. Aichernig, Giovanni Bacci, Maria Eichlseder, Kim G. Larsen:
L*-Based Learning of Markov Decision Processes. FM 2019: 651-669 - [c20]Maria Eichlseder, Daniel Kales, Markus Schofnegger:
Forgery Attacks on FlexAE and FlexAEAD. IMACC 2019: 200-214 - [c19]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Markus Schofnegger:
Algebraic Cryptanalysis of Variants of Frit. SAC 2019: 149-170 - [i27]Martin Tappler, Bernhard K. Aichernig, Giovanni Bacci, Maria Eichlseder, Kim G. Larsen:
L*-Based Learning of Markov Decision Processes (Extended Version). CoRR abs/1906.12239 (2019) - [i26]Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Florian Mendel, Robert Primas:
Protecting against Statistical Ineffective Fault Attacks. IACR Cryptol. ePrint Arch. 2019: 536 (2019) - [i25]Maria Eichlseder, Daniel Kales, Markus Schofnegger:
Forgery Attacks on FlexAE and FlexAEAD. IACR Cryptol. ePrint Arch. 2019: 679 (2019) - [i24]Maria Eichlseder, Marcel Nageler, Robert Primas:
Analyzing the Linear Keystream Biases in AEGIS. IACR Cryptol. ePrint Arch. 2019: 1372 (2019) - 2018
- [j4]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas:
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 547-572 (2018) - [j3]Maria Eichlseder, Daniel Kales:
Clustering Related-Tweak Characteristics: Application to MANTIS-6. IACR Trans. Symmetric Cryptol. 2018(2): 111-132 (2018) - [c18]Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, Benoît Viguier:
Cryptanalysis of MORUS. ASIACRYPT (2) 2018: 35-64 - [c17]Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Stefan Mangard, Florian Mendel, Robert Primas:
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures. ASIACRYPT (2) 2018: 315-342 - [c16]Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit. CRYPTO (1) 2018: 662-692 - [p1]Maria Eichlseder:
Differential Cryptanalysis of Symmetric Primitives. Ausgezeichnete Informatikdissertationen 2018: 91-100 - [i23]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas:
Exploiting Ineffective Fault Inductions on Symmetric Cryptography. IACR Cryptol. ePrint Arch. 2018: 71 (2018) - [i22]Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A cipher with low ANDdepth and few ANDs per bit. IACR Cryptol. ePrint Arch. 2018: 181 (2018) - [i21]Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Stefan Mangard, Florian Mendel, Robert Primas:
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures. IACR Cryptol. ePrint Arch. 2018: 357 (2018) - [i20]Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, Benoît Viguier:
Cryptanalysis of MORUS. IACR Cryptol. ePrint Arch. 2018: 464 (2018) - [i19]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Markus Schofnegger:
Algebraic Cryptanalysis of Frit. IACR Cryptol. ePrint Arch. 2018: 809 (2018) - 2017
- [j2]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer:
ISAP - Towards Side-Channel Secure Authenticated Encryption. IACR Trans. Symmetric Cryptol. 2017(1): 80-105 (2017) - [c15]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel:
Side-Channel Analysis of Keymill. COSADE 2017: 138-152 - [i18]Maria Eichlseder, Daniel Kales:
Clustering Related-Tweak Characteristics: Application to MANTIS-6. IACR Cryptol. ePrint Arch. 2017: 1136 (2017) - [i17]Daniel Kales, Maria Eichlseder, Florian Mendel:
Note on the Robustness of CAESAR Candidates. IACR Cryptol. ePrint Arch. 2017: 1137 (2017) - 2016
- [j1]Christoph Dobraunig, Maria Eichlseder, Daniel Kales, Florian Mendel:
Practical Key-Recovery Attack on MANTIS5. IACR Trans. Symmetric Cryptol. 2016(2): 248-260 (2016) - [c14]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Square Attack on 7-Round Kiasu-BC. ACNS 2016: 500-517 - [c13]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel:
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes. ASIACRYPT (1) 2016: 369-395 - [c12]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of the Kupyna-256 Hash Function. FSE 2016: 575-590 - [c11]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Cryptanalysis of Simpira v1. SAC 2016: 284-298 - [i16]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Cryptanalysis of Simpira. IACR Cryptol. ePrint Arch. 2016: 244 (2016) - [i15]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Square Attack on 7-Round Kiasu-BC. IACR Cryptol. ePrint Arch. 2016: 326 (2016) - [i14]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of SHA-512/224 and SHA-512/256. IACR Cryptol. ePrint Arch. 2016: 374 (2016) - [i13]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel:
Practical Fault Attacks on Authenticated Encryption Modes for AES. IACR Cryptol. ePrint Arch. 2016: 616 (2016) - [i12]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Key Recovery for MANTIS-5. IACR Cryptol. ePrint Arch. 2016: 754 (2016) - [i11]Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel:
Side-Channel Analysis of Keymill. IACR Cryptol. ePrint Arch. 2016: 793 (2016) - [i10]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer:
ISAP - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2016: 952 (2016) - 2015
- [c10]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates. ASIACRYPT (2) 2015: 490-509 - [c9]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of SHA-512/224 and SHA-512/256. ASIACRYPT (2) 2015: 612-630 - [c8]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Cryptanalysis of Ascon. CT-RSA 2015: 371-387 - [c7]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Related-Key Forgeries for Prøst-OTR. FSE 2015: 282-296 - [c6]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Higher-Order Cryptanalysis of LowMC. ICISC 2015: 87-101 - [c5]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Forgery Attacks on Round-Reduced ICEPOLE-128. SAC 2015: 479-492 - [i9]Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Cryptanalysis of Ascon. IACR Cryptol. ePrint Arch. 2015: 30 (2015) - [i8]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel:
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. IACR Cryptol. ePrint Arch. 2015: 33 (2015) - [i7]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Related-Key Forgeries for Prøst-OTR. IACR Cryptol. ePrint Arch. 2015: 91 (2015) - [i6]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Forgery Attacks on round-reduced ICEPOLE-128. IACR Cryptol. ePrint Arch. 2015: 392 (2015) - [i5]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Higher-order cryptanalysis of LowMC. IACR Cryptol. ePrint Arch. 2015: 407 (2015) - [i4]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Analysis of the Kupyna-256 Hash Function. IACR Cryptol. ePrint Arch. 2015: 956 (2015) - [i3]Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates. IACR Cryptol. ePrint Arch. 2015: 1200 (2015) - 2014
- [c4]Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel:
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. CARDIS 2014: 233-244 - [c3]Maria Eichlseder, Florian Mendel, Martin Schläffer:
Branching Heuristics in Differential Collision Search with Applications to SHA-512. FSE 2014: 473-488 - [c2]Andrey Bogdanov, Christoph Dobraunig, Maria Eichlseder, Martin M. Lauridsen, Florian Mendel, Martin Schläffer, Elmar Tischhauser:
Key Recovery Attacks on Recent Authenticated Ciphers. LATINCRYPT 2014: 274-287 - [c1]Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Malicious Hashing: Eve's Variant of SHA-1. Selected Areas in Cryptography 2014: 1-19 - [i2]Maria Eichlseder, Florian Mendel, Martin Schläffer:
Branching Heuristics in Differential Collision Search with Applications to SHA-512. IACR Cryptol. ePrint Arch. 2014: 302 (2014) - [i1]Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Malicious Hashing: Eve's Variant of SHA-1. IACR Cryptol. ePrint Arch. 2014: 694 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 01:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint