default search action
Donghoon Chang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Donghoon Chang, Munawar Hasan:
Context-Committing Authenticated Encryptions Using Tweakable Stream Cipher. IEEE Access 12: 84149-84168 (2024) - [j22]Munawar Hasan, Donghoon Chang:
Lynx: Family of Lightweight Authenticated Encryption Schemes Based on Tweakable Blockcipher. IEEE Internet Things J. 11(8): 14357-14369 (2024) - 2023
- [j21]Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sönmez Turan:
Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse Setting. IEEE Access 11: 4501-4516 (2023) - [j20]Yongseong Lee, Jinkeon Kang, Donghoon Chang, Seokhie Hong:
A preimage attack on reduced GIMLI-HASH with unbalanced squeezing phase. IET Inf. Secur. 17(1): 66-79 (2023) - [c40]Donghoon Chang, Moti Yung:
Midgame Attacks and Defense Against Them. CSCML 2023: 471-492 - [i35]Munawar Hasan, Donghoon Chang:
Lynx: Family of Lightweight Authenticated Encryption Schemes based on Tweakable Blockcipher. IACR Cryptol. ePrint Arch. 2023: 241 (2023) - 2022
- [j19]Monika Singh, Anviksha Khunteta, Mohona Ghosh, Donghoon Chang, Somitra Kumar Sanadhya:
FbHash-E: A time and memory efficient version of FbHash similarity hashing algorithm. Digit. Investig. 41: 301375 (2022) - [c39]Donghoon Chang, Surabhi Garg, Munawar Hasan, Sweta Mishra:
On Security of Fuzzy Commitment Scheme for Biometric Authentication. ACISP 2022: 399-419 - [i34]Donghoon Chang, Deukjo Hong, Jinkeon Kang:
Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse Setting. IACR Cryptol. ePrint Arch. 2022: 544 (2022) - [i33]Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sönmez Turan:
Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse Setting. IACR Cryptol. ePrint Arch. 2022: 1456 (2022) - 2021
- [j18]Donghoon Chang, Surabhi Garg, Mohona Ghosh, Munawar Hasan:
BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level. Inf. Sci. 546: 481-511 (2021) - [c38]Yongseong Lee, Jinkeon Kang, Donghoon Chang, Seokhie Hong:
A Preimage Attack on Reduced Gimli-Hash. ICISC 2021: 217-237 - [i32]Donghoon Chang, Meltem Sönmez Turan:
Recovering the Key from the Internal State of Grain-128AEAD. IACR Cryptol. ePrint Arch. 2021: 439 (2021) - 2020
- [j17]Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya, Donghoon Chang:
Threshold Implementations of GIFT: A Trade-Off Analysis. IEEE Trans. Inf. Forensics Secur. 15: 2110-2120 (2020) - [j16]Donghoon Chang, Surabhi Garg, Munawar Hasan, Sweta Mishra:
Cancelable Multi-Biometric Approach Using Fuzzy Extractor and Novel Bit-Wise Encryption. IEEE Trans. Inf. Forensics Secur. 15: 3152-3167 (2020) - [i31]Donghoon Chang, Vinjohn V. Chirakkal, Shubham Goswami, Munawar Hasan, Taekwon Jung, Jinkeon Kang, Seok-Cheol Kee, Dongkyu Lee, Ajit Pratap Singh:
Multi-lane Detection Using Instance Segmentation and Attentive Voting. CoRR abs/2001.00236 (2020)
2010 – 2019
- 2019
- [j15]Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya, Monika Singh, Douglas R. White:
FbHash: A New Similarity Hashing Scheme for Digital Forensics. Digit. Investig. 29 Supplement: S113-S123 (2019) - [j14]Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Cryptanalytic time-memory trade-off for password hashing schemes. Int. J. Inf. Sec. 18(2): 163-180 (2019) - [j13]Donghoon Chang, Mohona Ghosh, Arpan Jati, Abhishek Kumar, Somitra Kumar Sanadhya:
A Generalized Format Preserving Encryption Framework Using MDS Matrices. J. Hardw. Syst. Secur. 3(1): 3-11 (2019) - [j12]Akshima, Donghoon Chang, Aarushi Goel, Sweta Mishra, Somitra Kumar Sanadhya:
Generation of Secure and Reliable Honeywords, Preventing False Detection. IEEE Trans. Dependable Secur. Comput. 16(5): 757-769 (2019) - [j11]Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras:
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE. IACR Trans. Symmetric Cryptol. 2019(4): 119-146 (2019) - [p1]Megha Agrawal, Jianying Zhou, Donghoon Chang:
A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT. Security and Privacy Trends in the Industrial Internet of Thing 2019: 71-94 - [i30]Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras:
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE. IACR Cryptol. ePrint Arch. 2019: 1326 (2019) - [i29]Donghoon Chang, Munawar Hasan, Pranav Jain:
Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain. IACR Cryptol. ePrint Arch. 2019: 1327 (2019) - 2018
- [j10]Megha Agrawal, Donghoon Chang, Jinkeon Kang:
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices. Cryptogr. 2(4): 37 (2018) - [j9]Megha Agrawal, Tarun Kumar Bansal, Donghoon Chang, Amit Kumar Chauhan, Seokhie Hong, Jinkeon Kang, Somitra Kumar Sanadhya:
RCB: leakage-resilient authenticated encryption via re-keying. J. Supercomput. 74(9): 4173-4198 (2018) - [c37]Donghoon Chang, Amit Kumar Chauhan, Sandeep Kumar, Somitra Kumar Sanadhya:
Revocable Identity-Based Encryption from Codes with Rank Metric. CT-RSA 2018: 435-451 - [c36]Megha Agrawal, Tianxiang Huang, Jianying Zhou, Donghoon Chang:
CAN-FD-Sec: Improving Security of CAN-FD Protocol. ISSA/CSITS@ESORICS 2018: 77-93 - [c35]Pawel Drozdowski, Surabhi Garg, Christian Rathgeb, Marta Gomez-Barrero, Donghoon Chang, Christoph Busch:
Privacy-Preserving Indexing of Iris-Codes with Cancelable Bloom Filter-based Search Structures. EUSIPCO 2018: 2360-2364 - [i28]Donghoon Chang, Amit Kumar Chauhan, Sandeep Kumar, Somitra Kumar Sanadhya:
Revocable Identity-based Encryption from Codes with Rank Metric. IACR Cryptol. ePrint Arch. 2018: 382 (2018) - 2017
- [j8]Donghoon Chang, Abhishek Kumar, Somitra Kumar Sanadhya:
Distinguishers for 4-Branch and 8-Branch Generalized Feistel Network. IEEE Access 5: 27857-27867 (2017) - [j7]Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya:
A new authenticated encryption technique for handling long ciphertexts in memory constrained devices. Int. J. Appl. Cryptogr. 3(3): 236-261 (2017) - [j6]Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya:
Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version). Int. J. Appl. Cryptogr. 3(3): 262-287 (2017) - [j5]Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi:
Two Efficient Fault-Based Attacks on CLOC and SILC. J. Hardw. Syst. Secur. 1(3): 252-268 (2017) - [c34]Donghoon Chang, Mohona Ghosh, Arpan Jati, Abhishek Kumar, Somitra Kumar Sanadhya:
eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices. SPACE 2017: 133-150 - [i27]Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes. IACR Cryptol. ePrint Arch. 2017: 603 (2017) - [i26]Donghoon Chang, Sweta Mishra, Somitra Kumar Sanadhya, Ajit Pratap Singh:
On Making U2F Protocol Leakage-Resilient via Re-keying. IACR Cryptol. ePrint Arch. 2017: 721 (2017) - 2016
- [j4]Monika Singh, Donghoon Chang, Somitra Kumar Sanadhya:
Security Analysis of mvHash-B Similarity Hashing. J. Digit. Forensics Secur. Law 11(2): 21-34 (2016) - [c33]Donghoon Chang, Mohona Ghosh, Kishan Chand Gupta, Arpan Jati, Abhishek Kumar, Dukjae Moon, Indranil Ghosh Ray, Somitra Kumar Sanadhya:
SPF: A New Family of Efficient Format-Preserving Encryption Algorithms. Inscrypt 2016: 64-83 - [c32]Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi:
Fault Based Almost Universal Forgeries on CLOC and SILC. SPACE 2016: 66-86 - [c31]Donghoon Chang, Amit Kumar Chauhan, Naina Gupta, Arpan Jati, Somitra Kumar Sanadhya:
Exploiting the Leakage: Analysis of Some Authenticated Encryption Schemes. SPACE 2016: 383-401 - 2015
- [c30]Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya:
Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message. ACISP 2015: 93-106 - [c29]Megha Agrawal, Donghoon Chang, Somitra Sanadhya:
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices. ACISP 2015: 451-468 - [c28]Donghoon Chang:
Tuesday Keynote: UX Design in the IoT Era. CHI Extended Abstracts 2015: 807-808 - [c27]Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Biclique Cryptanalysis of Full Round AES-128 Based Hashing Modes. Inscrypt 2015: 3-21 - [c26]Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya:
Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512. ICISC 2015: 119-135 - [c25]Donghoon Chang, Amit Kumar Chauhan, Muhammed Noufal K, Jinkeon Kang:
Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks. ICISC 2015: 194-209 - [c24]Donghoon Chang, Somitra Kumar Sanadhya, Nishant Sharma:
New HMAC Message Patches: Secret Patch and CrOw Patch. ICISS 2015: 285-302 - [c23]Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya:
Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256. INDOCRYPT 2015: 198-217 - [c22]Donghoon Chang, Sumesh Manjunath R., Somitra Kumar Sanadhya:
PPAE: Practical Parazoa Authenticated Encryption Family. ProvSec 2015: 198-211 - [i25]Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Rig: A simple, secure and flexible design for Password Hashing. IACR Cryptol. ePrint Arch. 2015: 9 (2015) - [i24]Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Performance Analysis of Some Password Hashing Schemes. IACR Cryptol. ePrint Arch. 2015: 139 (2015) - [i23]Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique. IACR Cryptol. ePrint Arch. 2015: 234 (2015) - [i22]Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya:
Sponge based CCA2 secure asymmetric encryption for arbitrary length message. IACR Cryptol. ePrint Arch. 2015: 330 (2015) - [i21]Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya:
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices. IACR Cryptol. ePrint Arch. 2015: 331 (2015) - [i20]Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya:
Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512. IACR Cryptol. ePrint Arch. 2015: 1227 (2015) - 2014
- [c21]Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique. Inscrypt 2014: 343-360 - [c20]Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Rig: A Simple, Secure and Flexible Design for Password Hashing. Inscrypt 2014: 361-381 - [c19]Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Bicliques with Minimal Data and Time Complexity for AES. ICISC 2014: 160-174 - [c18]Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Cryptographic Module Based Approach for Password Hashing Schemes. PASSWORDS 2014: 39-57 - [i19]Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Bicliques with Minimal Data and Time Complexity for AES (Extended Version). IACR Cryptol. ePrint Arch. 2014: 932 (2014) - 2013
- [c17]Donghoon Chang, Abhishek Kumar, Somitra Kumar Sanadhya:
Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN. INDOCRYPT 2013: 136-148 - 2012
- [c16]Donghoon Chang:
Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-Based Authenticated-Encryption Scheme. INDOCRYPT 2012: 545-563 - [i18]Donghoon Chang, Moti Yung:
Adaptive Preimage Resistance Analysis Revisited: \\ Requirements, Subtleties and Implications. IACR Cryptol. ePrint Arch. 2012: 209 (2012) - 2011
- [c15]Donghoon Chang, Mridul Nandi, Moti Yung:
On the Security of Hash Functions Employing Blockcipher Postprocessing. FSE 2011: 146-166 - [i17]Donghoon Chang, Mridul Nandi, Moti Yung:
Indifferentiability of the Hash Algorithm BLAKE. IACR Cryptol. ePrint Arch. 2011: 623 (2011) - 2010
- [i16]Donghoon Chang, Mridul Nandi, Moti Yung:
On the Security of Hash Functions Employing Blockcipher Postprocessing. IACR Cryptol. ePrint Arch. 2010: 629 (2010)
2000 – 2009
- 2008
- [j3]Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong, Jongin Lim, Haeryong Park, Kilsoo Chun:
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2607-2614 (2008) - [c14]Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong:
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. FSE 2008: 189-206 - [c13]Donghoon Chang, Mridul Nandi:
Improved Indifferentiability Security Analysis of chopMD Hash Function. FSE 2008: 429-443 - [i15]Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths. IACR Cryptol. ePrint Arch. 2008: 48 (2008) - [i14]Donghoon Chang, Mridul Nandi:
A Short Proof of the PRP/PRF Switching Lemma. IACR Cryptol. ePrint Arch. 2008: 78 (2008) - [i13]Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions. IACR Cryptol. ePrint Arch. 2008: 407 (2008) - [i12]Donghoon Chang, Seokhie Hong, Jaechul Sung, Sangjin Lee:
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension. IACR Cryptol. ePrint Arch. 2008: 460 (2008) - 2007
- [c12]Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Preimage Attack on the Parallel FFT-Hashing Function. ACISP 2007: 59-67 - [i11]Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jesang Lee, Dukjae Moon, Sungtaek Chee:
New FORK-256. IACR Cryptol. ePrint Arch. 2007: 185 (2007) - [i10]Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong:
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function. IACR Cryptol. ePrint Arch. 2007: 416 (2007) - 2006
- [c11]Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yung:
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. ASIACRYPT 2006: 283-298 - [c10]Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee:
HIGHT: A New Block Cipher Suitable for Low-Resource Device. CHES 2006: 46-59 - [c9]Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee:
A New Dedicated 256-Bit Hash Function: FORK-256. FSE 2006: 195-209 - [c8]Donghoon Chang, Kishan Chand Gupta, Mridul Nandi:
RC4-Hash: A New Hash Function Based on RC4. INDOCRYPT 2006: 80-94 - [c7]Eunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim:
A Weak Key Class of XTEA for a Related-Key Rectangle Attack. VIETCRYPT 2006: 286-297 - [i9]Donghoon Chang:
Preimage Attack on Hashing with Polynomials proposed at ICISC'06. IACR Cryptol. ePrint Arch. 2006: 411 (2006) - [i8]Donghoon Chang:
Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash. IACR Cryptol. ePrint Arch. 2006: 412 (2006) - [i7]Donghoon Chang:
Preimage Attack on Parallel FFT-Hashing. IACR Cryptol. ePrint Arch. 2006: 413 (2006) - [i6]Donghoon Chang, Mridul Nandi:
General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity. IACR Cryptol. ePrint Arch. 2006: 441 (2006) - [i5]Donghoon Chang:
Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006. IACR Cryptol. ePrint Arch. 2006: 460 (2006) - [i4]Donghoon Chang, Moti Yung:
Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions). IACR Cryptol. ePrint Arch. 2006: 467 (2006) - [i3]Donghoon Chang:
Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA. IACR Cryptol. ePrint Arch. 2006: 478 (2006) - [i2]Donghoon Chang:
A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions. IACR Cryptol. ePrint Arch. 2006: 481 (2006) - 2005
- [j2]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 39-48 (2005) - [j1]Wonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi:
Construction of UOWHF: Two New Parallel Methods. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 49-58 (2005) - [c6]Aaram Yun, Soo Hak Sung, Sangwoo Park, Donghoon Chang, Seokhie Hong, Hong-Su Cho:
Finding Collision on 45-Step HAS-160. ICISC 2005: 146-155 - 2004
- [c5]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
Pseudorandomness of SPN-Type Transformations. ACISP 2004: 212-223 - [c4]Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee, Soo Hak Sung:
Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. INDOCRYPT 2004: 328-342 - [i1]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model. IACR Cryptol. ePrint Arch. 2004: 69 (2004) - 2003
- [c3]Wonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi:
New Parallel Domain Extenders for UOWHF. ASIACRYPT 2003: 208-227 - [c2]Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee:
Differential Cryptanalysis of TEA and XTEA. ICISC 2003: 402-417 - 2002
- [c1]Donghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee, Jongin Lim:
Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. Selected Areas in Cryptography 2002: 160-174
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-21 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint