


default search action
Georg Fuchsbauer
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i52]Zeta Avarikioti, Georg Fuchsbauer, Pim Keer, Matteo Maffei, Fabian Regen:
A Composable Game-Theoretic Framework for Blockchains. CoRR abs/2504.18214 (2025) - [i51]Joël Alwen, Georg Fuchsbauer, Marta Mularczyk:
Updatable Public-Key Encryption, Revisited. IACR Cryptol. ePrint Arch. 2025: 175 (2025) - [i50]Joël Alwen, Georg Fuchsbauer, Marta Mularczyk, Doreen Riepel:
Lattice-Based Updatable Public-Key Encryption for Group Messaging. IACR Cryptol. ePrint Arch. 2025: 365 (2025) - 2024
- [c56]Balthazar Bauer, Georg Fuchsbauer, Fabian Regen:
On Security Proofs of Existing Equivalence Class Signature Schemes. ASIACRYPT (2) 2024: 3-37 - [c55]Georg Fuchsbauer, Mathias Wolf:
Concurrently Secure Blind Schnorr Signatures. EUROCRYPT (2) 2024: 124-160 - [c54]Joël Alwen, Georg Fuchsbauer, Marta Mularczyk:
Updatable Public-Key Encryption, Revisited. EUROCRYPT (6) 2024: 346-376 - [c53]Balthazar Bauer, Georg Fuchsbauer, Fabian Regen:
On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions. Public Key Cryptography (1) 2024: 3-36 - [i49]Balthazar Bauer, Georg Fuchsbauer:
On Security Proofs of Existing Equivalence Class Signature Schemes. IACR Cryptol. ePrint Arch. 2024: 183 (2024) - [i48]Gavin Cho, Georg Fuchsbauer, Adam O'Neill:
Schnorr Signatures are Tightly Secure in the ROM under a Non-interactive Assumption. IACR Cryptol. ePrint Arch. 2024: 1528 (2024) - 2022
- [j6]Dario Catalano, Georg Fuchsbauer, Azam Soleimanian:
Double-authentication-preventing signatures in the standard model. J. Comput. Secur. 30(1): 3-38 (2022) - [c52]Georg Fuchsbauer, Michele Orrù:
Non-interactive Mimblewimble Transactions, Revisited. ASIACRYPT (1) 2022: 713-744 - [c51]Hamza Abusalah
, Georg Fuchsbauer, Peter Gazi
, Karen Klein
:
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients. ASIACRYPT (1) 2022: 806-836 - [c50]Georg Fuchsbauer, Riddhi Ghosal, Nathan Hauke, Adam O'Neill:
Approximate Distance-Comparison-Preserving Symmetric Encryption. SCN 2022: 117-144 - [c49]Melissa Chase, Georg Fuchsbauer, Esha Ghosh, Antoine Plouviez:
Credential Transparency System. SCN 2022: 313-335 - [i47]Hamza Abusalah, Georg Fuchsbauer, Peter Gazi, Karen Klein:
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients. IACR Cryptol. ePrint Arch. 2022: 240 (2022) - [i46]Georg Fuchsbauer, Michele Orrù:
Non-interactive Mimblewimble transactions, revisited. IACR Cryptol. ePrint Arch. 2022: 265 (2022) - [i45]Georg Fuchsbauer, Mathias Wolf:
(Concurrently Secure) Blind Schnorr from Schnorr. IACR Cryptol. ePrint Arch. 2022: 1676 (2022) - 2021
- [c48]Balthazar Bauer, Georg Fuchsbauer, Antoine Plouviez:
The One-More Discrete Logarithm Assumption in the Generic Group Model. ASIACRYPT (4) 2021: 587-617 - [c47]Balthazar Bauer, Georg Fuchsbauer, Chen Qian
:
Transferable E-Cash: A Cleaner Model and the First Practical Instantiation. Public Key Cryptography (2) 2021: 559-590 - [i44]Balthazar Bauer, Georg Fuchsbauer, Antoine Plouviez:
The One-More Discrete Logarithm Assumption in the Generic Group Model. IACR Cryptol. ePrint Arch. 2021: 866 (2021) - [i43]Georg Fuchsbauer, Riddhi Ghosal, Nathan Hauke, Adam O'Neill:
Approximate Distance-Comparison-Preserving Symmetric Encryption. IACR Cryptol. ePrint Arch. 2021: 1666 (2021) - 2020
- [c46]Balthazar Bauer, Georg Fuchsbauer, Julian Loss:
A Classification of Computational Assumptions in the Algebraic Group Model. CRYPTO (2) 2020: 121-151 - [c45]Georg Fuchsbauer, Antoine Plouviez, Yannick Seurin:
Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model. EUROCRYPT (2) 2020: 63-95 - [c44]Pooya Farshim, Georg Fuchsbauer, Alain Passelègue:
Simpler Constructions of Asymmetric Primitives from Obfuscation. INDOCRYPT 2020: 715-738 - [c43]Dario Catalano, Georg Fuchsbauer, Azam Soleimanian:
Double-Authentication-Preventing Signatures in the Standard Model. SCN 2020: 338-358 - [c42]Balthazar Bauer, Georg Fuchsbauer:
Efficient Signatures on Randomizable Ciphertexts. SCN 2020: 359-381 - [i42]Balthazar Bauer, Georg Fuchsbauer:
Efficient Signatures on Randomizable Ciphertexts. IACR Cryptol. ePrint Arch. 2020: 524 (2020) - [i41]Dario Catalano, Georg Fuchsbauer, Azam Soleimanian:
Double-Authentication-Preventing Signatures in the Standard Model. IACR Cryptol. ePrint Arch. 2020: 789 (2020) - [i40]Balthazar Bauer, Georg Fuchsbauer, Julian Loss:
A Classification of Computational Assumptions in the Algebraic Group Model. IACR Cryptol. ePrint Arch. 2020: 859 (2020) - [i39]Balthazar Bauer, Georg Fuchsbauer, Chen Qian:
Transferable E-cash: A Cleaner Model and the First Practical Instantiation. IACR Cryptol. ePrint Arch. 2020: 1400 (2020)
2010 – 2019
- 2019
- [j5]Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
:
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials. J. Cryptol. 32(2): 498-546 (2019) - [j4]Aisling Connolly, Pooya Farshim, Georg Fuchsbauer:
Security of Symmetric Primitives against Key-Correlated Attacks. IACR Trans. Symmetric Cryptol. 2019(3): 193-230 (2019) - [c41]Georg Fuchsbauer:
WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited. CCS 2019: 49-62 - [c40]Georg Fuchsbauer, Michele Orrù
, Yannick Seurin:
Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble. EUROCRYPT (1) 2019: 657-689 - [c39]Georg Fuchsbauer, Chethan Kamath
, Karen Klein
, Krzysztof Pietrzak:
Adaptively Secure Proxy Re-encryption. Public Key Cryptography (2) 2019: 317-346 - [i38]Georg Fuchsbauer, Antoine Plouviez, Yannick Seurin:
Blind Schnorr Signatures in the Algebraic Group Model. IACR Cryptol. ePrint Arch. 2019: 877 (2019) - [i37]Georg Fuchsbauer:
WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited. IACR Cryptol. ePrint Arch. 2019: 964 (2019) - [i36]Aisling Connolly, Pooya Farshim, Georg Fuchsbauer:
Security of Symmetric Primitives against Key-Correlated Attacks. IACR Cryptol. ePrint Arch. 2019: 1000 (2019) - 2018
- [c38]Georg Fuchsbauer, Michele Orrù
:
Non-interactive Zaps of Knowledge. ACNS 2018: 44-62 - [c37]Georg Fuchsbauer, Eike Kiltz
, Julian Loss:
The Algebraic Group Model and its Applications. CRYPTO (2) 2018: 33-62 - [c36]Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gazi, Joël Alwen, Krzysztof Pietrzak:
SpaceMint: A Cryptocurrency Based on Proofs of Space. Financial Cryptography 2018: 480-499 - [c35]Georg Fuchsbauer, Romain Gay
:
Weakly Secure Equivalence-Class Signatures from Standard Assumptions. Public Key Cryptography (2) 2018: 153-183 - [c34]Georg Fuchsbauer:
Subversion-Zero-Knowledge SNARKs. Public Key Cryptography (1) 2018: 315-347 - [i35]Georg Fuchsbauer, Romain Gay:
Weakly Secure Equivalence-Class Signatures from Standard Assumptions. IACR Cryptol. ePrint Arch. 2018: 37 (2018) - [i34]Georg Fuchsbauer, Michele Orrù:
Non-interactive zaps of knowledge. IACR Cryptol. ePrint Arch. 2018: 228 (2018) - [i33]Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak:
Adaptively Secure Proxy Re-encryption. IACR Cryptol. ePrint Arch. 2018: 426 (2018) - [i32]Pooya Farshim, Georg Fuchsbauer, Alain Passelègue:
Simpler Constructions of Asymmetric Primitives from Obfuscation. IACR Cryptol. ePrint Arch. 2018: 576 (2018) - [i31]Georg Fuchsbauer, Michele Orrù, Yannick Seurin:
Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble. IACR Cryptol. ePrint Arch. 2018: 1039 (2018) - 2017
- [c33]Georg Fuchsbauer, Romain Gay
, Lucas Kowalczyk, Claudio Orlandi
:
Access Control Encryption for Equality, Comparison, and More. Public Key Cryptography (2) 2017: 88-118 - [i30]Georg Fuchsbauer:
SpaceMint: A Cryptocurrency Based on Proofs of Space. ERCIM News 2017(110) (2017) - [i29]Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi:
Access Control Encryption for Equality, Comparison, and More. IACR Cryptol. ePrint Arch. 2017: 9 (2017) - [i28]Georg Fuchsbauer:
Subversion-zero-knowledge SNARKs. IACR Cryptol. ePrint Arch. 2017: 587 (2017) - 2016
- [j3]Masayuki Abe, Georg Fuchsbauer, Jens Groth
, Kristiyan Haralambiev, Miyako Ohkubo:
Structure-Preserving Signatures and Commitments to Group Elements. J. Cryptol. 29(2): 363-421 (2016) - [c32]Hamza Abusalah
, Georg Fuchsbauer, Krzysztof Pietrzak:
Offline Witness Encryption. ACNS 2016: 285-303 - [c31]Hamza Abusalah
, Georg Fuchsbauer:
Constrained PRFs for Unbounded Inputs with Short Keys. ACNS 2016: 445-463 - [c30]Mihir Bellare, Georg Fuchsbauer, Alessandra Scafuro:
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion. ASIACRYPT (2) 2016: 777-804 - [c29]Pyrros Chaidos, Véronique Cortier, Georg Fuchsbauer, David Galindo
:
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme. CCS 2016: 1614-1625 - [c28]Hamza Abusalah
, Georg Fuchsbauer, Krzysztof Pietrzak:
Constrained PRFs for Unbounded Inputs. CT-RSA 2016: 413-428 - [c27]Georg Fuchsbauer, Christian Hanser, Chethan Kamath
, Daniel Slamanig
:
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions. SCN 2016: 391-408 - [c26]Georg Fuchsbauer, Felix Heuer, Eike Kiltz
, Krzysztof Pietrzak:
Standard Security Does Imply Security Against Selective Opening for Markov Distributions. TCC (A1) 2016: 282-305 - [i27]Hamza Abusalah, Georg Fuchsbauer:
Constrained PRFs for Unbounded Inputs with Short Keys. IACR Cryptol. ePrint Arch. 2016: 279 (2016) - [i26]Mihir Bellare, Georg Fuchsbauer, Alessandra Scafuro:
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion. IACR Cryptol. ePrint Arch. 2016: 372 (2016) - [i25]Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak:
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees. IACR Cryptol. ePrint Arch. 2016: 389 (2016) - [i24]Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig:
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions. IACR Cryptol. ePrint Arch. 2016: 662 (2016) - 2015
- [c25]Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
:
Practical Round-Optimal Blind Signatures in the Standard Model. CRYPTO (2) 2015: 233-253 - [c24]Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak:
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees. CRYPTO (1) 2015: 601-620 - [c23]Anna Lisa Ferrara, Georg Fuchsbauer, Bin Liu, Bogdan Warinschi:
Policy Privacy in Cryptographic Access Control. CSF 2015: 46-60 - [c22]Foteini Baldimtsi, Melissa Chase, Georg Fuchsbauer, Markulf Kohlweiss
:
Anonymous Transferable E-Cash. Public Key Cryptography 2015: 101-124 - [c21]Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens:
Key-Homomorphic Constrained Pseudorandom Functions. TCC (2) 2015: 31-60 - [i23]Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens:
Key-Homomorphic Constrained Pseudorandom Functions. IACR Cryptol. ePrint Arch. 2015: 180 (2015) - [i22]Sunoo Park, Krzysztof Pietrzak, Albert Kwon, Joël Alwen, Georg Fuchsbauer, Peter Gazi:
Spacemint: A Cryptocurrency Based on Proofs of Space. IACR Cryptol. ePrint Arch. 2015: 528 (2015) - [i21]Georg Fuchsbauer, Christian Hanser, Daniel Slamanig:
Practical Round-Optimal Blind Signatures in the Standard Model. IACR Cryptol. ePrint Arch. 2015: 626 (2015) - [i20]Véronique Cortier, Georg Fuchsbauer, David Galindo:
BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme. IACR Cryptol. ePrint Arch. 2015: 629 (2015) - [i19]Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak:
Offline Witness Encryption. IACR Cryptol. ePrint Arch. 2015: 838 (2015) - 2014
- [c20]Georg Fuchsbauer, Momchil Konstantinov, Krzysztof Pietrzak, Vanishree Rao:
Adaptive Security of Constrained PRFs. ASIACRYPT (2) 2014: 82-101 - [c19]Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill:
Enhanced Chosen-Ciphertext Security and Applications. Public Key Cryptography 2014: 329-344 - [c18]Mihir Bellare, Georg Fuchsbauer:
Policy-Based Signatures. Public Key Cryptography 2014: 520-537 - [c17]Georg Fuchsbauer:
Constrained Verifiable Random Functions. SCN 2014: 95-114 - [i18]Georg Fuchsbauer, Momchil Konstantinov, Krzysztof Pietrzak, Vanishree Rao:
Adaptive Security of Constrained PRFs. IACR Cryptol. ePrint Arch. 2014: 416 (2014) - [i17]Georg Fuchsbauer:
Constrained Verifiable Random Functions. IACR Cryptol. ePrint Arch. 2014: 537 (2014) - [i16]Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak:
Constrained PRFs for Unbounded Inputs. IACR Cryptol. ePrint Arch. 2014: 840 (2014) - [i15]Georg Fuchsbauer:
Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014. IACR Cryptol. ePrint Arch. 2014: 892 (2014) - [i14]Georg Fuchsbauer, Christian Hanser, Daniel Slamanig:
EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes. IACR Cryptol. ePrint Arch. 2014: 944 (2014) - 2013
- [j2]David Bernhard, Georg Fuchsbauer, Essam Ghadafi
, Nigel P. Smart, Bogdan Warinschi:
Anonymous attestation with user-controlled linkability. Int. J. Inf. Sec. 12(3): 219-249 (2013) - [j1]Olivier Blazy, Georg Fuchsbauer, David Pointcheval
, Damien Vergnaud
:
Short blind signatures. J. Comput. Secur. 21(5): 627-661 (2013) - [c16]David Bernhard, Georg Fuchsbauer, Essam Ghadafi
:
Efficient Signatures of Knowledge and DAA in the Standard Model. ACNS 2013: 518-533 - [c15]Anna Lisa Ferrara, Georg Fuchsbauer, Bogdan Warinschi:
Cryptographically Enforced RBAC. CSF 2013: 115-129 - [i13]Mihir Bellare, Georg Fuchsbauer:
Policy-Based Signatures. IACR Cryptol. ePrint Arch. 2013: 413 (2013) - [i12]Anna Lisa Ferrara, Georg Fuchsbauer, Bogdan Warinschi:
Cryptographically Enforced RBAC. IACR Cryptol. ePrint Arch. 2013: 492 (2013) - 2012
- [c14]Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Fabien Laguillaumie:
Plaintext-Checkable Encryption. CT-RSA 2012: 332-348 - [i11]David Bernhard, Georg Fuchsbauer, Essam Ghadafi:
Efficient Signatures of Knowledge and DAA in the Standard Model. IACR Cryptol. ePrint Arch. 2012: 475 (2012) - [i10]Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill:
Enhanced Chosen-Ciphertext Security and Applications. IACR Cryptol. ePrint Arch. 2012: 543 (2012) - 2011
- [c13]Olivier Blazy
, Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Hervé Sibert, Jacques Traoré:
Achieving Optimal Anonymity in Transferable E-Cash with a Judge. AFRICACRYPT 2011: 206-223 - [c12]Georg Fuchsbauer:
Commuting Signatures and Verifiable Encryption. EUROCRYPT 2011: 224-245 - [c11]Olivier Blazy
, Georg Fuchsbauer, David Pointcheval
, Damien Vergnaud
:
Signatures on Randomizable Ciphertexts. Public Key Cryptography 2011: 403-422 - [i9]David Bernhard, Georg Fuchsbauer, Essam Ghadafi, Nigel P. Smart, Bogdan Warinschi:
Anonymous attestation with user-controlled linkability. IACR Cryptol. ePrint Arch. 2011: 658 (2011) - 2010
- [c10]Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud
:
Batch Groth-Sahai. ACNS 2010: 218-235 - [c9]Georg Fuchsbauer, Damien Vergnaud
:
Fair Blind Signatures without Random Oracles. AFRICACRYPT 2010: 16-33 - [c8]Xavier Boyen, Céline Chevalier, Georg Fuchsbauer, David Pointcheval
:
Strong Cryptography from Weak Secrets. AFRICACRYPT 2010: 297-315 - [c7]David Galindo
, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis
, Dominique Schröder
:
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. AFRICACRYPT 2010: 333-350 - [c6]Masayuki Abe, Georg Fuchsbauer, Jens Groth
, Kristiyan Haralambiev, Miyako Ohkubo:
Structure-Preserving Signatures and Commitments to Group Elements. CRYPTO 2010: 209-236 - [c5]Georg Fuchsbauer, Jonathan Katz, David Naccache:
Efficient Rational Secret Sharing in Standard Communication Networks. TCC 2010: 419-436 - [i8]Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud:
Batch Groth-Sahai. IACR Cryptol. ePrint Arch. 2010: 40 (2010) - [i7]Georg Fuchsbauer, Damien Vergnaud:
Fair Blind Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2010: 101 (2010) - [i6]Georg Fuchsbauer:
Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials. IACR Cryptol. ePrint Arch. 2010: 233 (2010)
2000 – 2009
- 2009
- [c4]Georg Fuchsbauer, David Pointcheval
, Damien Vergnaud
:
Transferable Constant-Size Fair E-Cash. CANS 2009: 226-247 - [c3]Georg Fuchsbauer, David Pointcheval:
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures. Pairing 2009: 132-149 - [c2]Georg Fuchsbauer, David Pointcheval
:
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures. Formal to Practical Security 2009: 95-115 - [i5]Georg Fuchsbauer, David Pointcheval, Damien Vergnaud:
Transferable Constant-Size Fair E-Cash. IACR Cryptol. ePrint Arch. 2009: 146 (2009) - [i4]Georg Fuchsbauer:
Automorphic Signatures in Bilinear Groups and an Application to Round-Optimal Blind Signatures. IACR Cryptol. ePrint Arch. 2009: 320 (2009) - 2008
- [c1]Georg Fuchsbauer, David Pointcheval
:
Anonymous Proxy Signatures. SCN 2008: 201-217 - [i3]Georg Fuchsbauer, David Pointcheval:
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures. IACR Cryptol. ePrint Arch. 2008: 37 (2008) - [i2]Georg Fuchsbauer, Jonathan Katz, David Naccache:
Efficient Rational Secret Sharing in Standard Communication Networks. IACR Cryptol. ePrint Arch. 2008: 488 (2008) - [i1]Georg Fuchsbauer, David Pointcheval:
Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures. IACR Cryptol. ePrint Arch. 2008: 528 (2008)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-25 17:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint