default search action
Somitra Kumar Sanadhya
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya:
A Configurable CRYSTALS-Kyber Hardware Implementation with Side-Channel Protection. ACM Trans. Embed. Comput. Syst. 23(2): 33:1-33:25 (2024) - [c38]Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya:
EFFLUX-F2: A High Performance Hardware Security Evaluation Board. COSADE 2024: 38-56 - [i30]Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya:
EFFLUX-F2: A High Performance Hardware Security Evaluation Board. IACR Cryptol. ePrint Arch. 2024: 438 (2024) - 2023
- [c37]Amit Kumar Chauhan, Abhishek Kumar, Somitra Kumar Sanadhya:
Square Attacks on Reduced-Round FEA-1 and FEA-2. SSS 2023: 583-597 - 2022
- [j23]Monika Singh, Anviksha Khunteta, Mohona Ghosh, Donghoon Chang, Somitra Kumar Sanadhya:
FbHash-E: A time and memory efficient version of FbHash similarity hashing algorithm. Digit. Investig. 41: 301375 (2022) - [j22]N. Nalla Anandakumar, Mohammad S. Hashmi, Somitra Kumar Sanadhya:
Field Programmable Gate Array based elliptic curve Menezes-Qu-Vanstone key agreement protocol realization using Physical Unclonable Function and true random number generator primitives. IET Circuits Devices Syst. 16(5): 382-398 (2022) - [j21]N. Nalla Anandakumar, Mohammad S. Hashmi, Somitra Kumar Sanadhya:
Design and Analysis of FPGA-based PUFs with Enhanced Performance for Hardware-oriented Security. ACM J. Emerg. Technol. Comput. Syst. 18(4): 72:1-72:26 (2022) - [j20]Tapas Chatterjee, Ayantika Laha, Somitra Kumar Sanadhya:
On the Structure of Format Preserving Sets in the Diffusion Layer of Block Ciphers. IEEE Trans. Inf. Theory 68(12): 8268-8279 (2022) - [c36]Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya:
Implementing Grover Oracle for Lightweight Block Ciphers Under Depth Constraints. ACISP 2022: 85-105 - [c35]Pulkit Garg, Garima Gupta, Ranjan Kumar, Somitra Sanadhya, Gaurav Gupta:
Identifying the Leak Sources of Hard Copy Documents. IFIP Int. Conf. Digital Forensics 2022: 155-167 - [i29]Amit Kumar Chauhan, Somitra Sanadhya:
Quantum Security of FOX Construction based on Lai-Massey Scheme. IACR Cryptol. ePrint Arch. 2022: 1001 (2022) - 2021
- [j19]Amit Kumar Chauhan, Abhishek Kumar, Somitra Kumar Sanadhya:
Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256. IACR Trans. Symmetric Cryptol. 2021(1): 316-336 (2021) - [i28]Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya:
A Configurable Crystals-Kyber Hardware Implementation with Side-Channel Protection. IACR Cryptol. ePrint Arch. 2021: 1189 (2021) - 2020
- [j18]N. Nalla Anandakumar, Mohammad S. Hashmi, Somitra Kumar Sanadhya:
Efficient and Lightweight FPGA-based Hybrid PUFs with Improved Performance. Microprocess. Microsystems 77: 103180 (2020) - [j17]N. Nalla Anandakumar, Somitra Kumar Sanadhya, Mohammad S. Hashmi:
FPGA-Based True Random Number Generation Using Programmable Delays in Oscillator-Rings. IEEE Trans. Circuits Syst. II Express Briefs 67-II(3): 570-574 (2020) - [j16]Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya, Donghoon Chang:
Threshold Implementations of GIFT: A Trade-Off Analysis. IEEE Trans. Inf. Forensics Secur. 15: 2110-2120 (2020) - [c34]Orr Dunkelman, Abhishek Kumar, Eran Lambooij, Somitra Kumar Sanadhya:
Counting Active S-Boxes is not Enough. INDOCRYPT 2020: 332-344 - [c33]Amit Kumar Chauhan, Somitra Kumar Sanadhya:
Quantum Resource Estimates of Grover's Key Search on ARIA. SPACE 2020: 238-258 - [c32]N. Nalla Anandakumar, Somitra Kumar Sanadhya, Mohammad S. Hashmi:
Design, Implementation and Analysis of Efficient Hardware-Based Security Primitives. VLSI-SOC 2020: 198-199 - [i27]Orr Dunkelman, Abhishek Kumar, Eran Lambooij, Somitra Kumar Sanadhya:
Cryptanalysis of Feistel-Based Format-Preserving Encryption. IACR Cryptol. ePrint Arch. 2020: 1311 (2020) - [i26]Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya:
Quantum Search for Lightweight Block Ciphers: GIFT, SKINNY, SATURNIN. IACR Cryptol. ePrint Arch. 2020: 1485 (2020)
2010 – 2019
- 2019
- [j15]Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya, Monika Singh, Douglas R. White:
FbHash: A New Similarity Hashing Scheme for Digital Forensics. Digit. Investig. 29 Supplement: S113-S123 (2019) - [j14]Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Cryptanalytic time-memory trade-off for password hashing schemes. Int. J. Inf. Sec. 18(2): 163-180 (2019) - [j13]Donghoon Chang, Mohona Ghosh, Arpan Jati, Abhishek Kumar, Somitra Kumar Sanadhya:
A Generalized Format Preserving Encryption Framework Using MDS Matrices. J. Hardw. Syst. Secur. 3(1): 3-11 (2019) - [j12]Akshima, Donghoon Chang, Aarushi Goel, Sweta Mishra, Somitra Kumar Sanadhya:
Generation of Secure and Reliable Honeywords, Preventing False Detection. IEEE Trans. Dependable Secur. Comput. 16(5): 757-769 (2019) - [j11]Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras:
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE. IACR Trans. Symmetric Cryptol. 2019(4): 119-146 (2019) - [i25]Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya:
SPQCop: Side-channel protected Post-Quantum Cryptoprocessor. IACR Cryptol. ePrint Arch. 2019: 765 (2019) - [i24]Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras:
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE. IACR Cryptol. ePrint Arch. 2019: 1326 (2019) - 2018
- [j10]Megha Agrawal, Tarun Kumar Bansal, Donghoon Chang, Amit Kumar Chauhan, Seokhie Hong, Jinkeon Kang, Somitra Kumar Sanadhya:
RCB: leakage-resilient authenticated encryption via re-keying. J. Supercomput. 74(9): 4173-4198 (2018) - [j9]N. Nalla Anandakumar, M. Prem Laxman Das, Somitra Kumar Sanadhya, Mohammad S. Hashmi:
Reconfigurable Hardware Architecture for Authenticated Key Agreement Protocol Over Binary Edwards Curve. ACM Trans. Reconfigurable Technol. Syst. 11(2): 12:1-12:19 (2018) - [c31]Donghoon Chang, Amit Kumar Chauhan, Sandeep Kumar, Somitra Kumar Sanadhya:
Revocable Identity-Based Encryption from Codes with Rank Metric. CT-RSA 2018: 435-451 - [i23]Donghoon Chang, Amit Kumar Chauhan, Sandeep Kumar, Somitra Kumar Sanadhya:
Revocable Identity-based Encryption from Codes with Rank Metric. IACR Cryptol. ePrint Arch. 2018: 382 (2018) - 2017
- [j8]Donghoon Chang, Abhishek Kumar, Somitra Kumar Sanadhya:
Distinguishers for 4-Branch and 8-Branch Generalized Feistel Network. IEEE Access 5: 27857-27867 (2017) - [j7]Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya:
A new authenticated encryption technique for handling long ciphertexts in memory constrained devices. Int. J. Appl. Cryptogr. 3(3): 236-261 (2017) - [j6]Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya:
Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version). Int. J. Appl. Cryptogr. 3(3): 262-287 (2017) - [c30]Donghoon Chang, Mohona Ghosh, Arpan Jati, Abhishek Kumar, Somitra Kumar Sanadhya:
eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices. SPACE 2017: 133-150 - [c29]N. Nalla Anandakumar, Mohammad S. Hashmi, Somitra Kumar Sanadhya:
Compact Implementations of FPGA-based PUFs with Enhanced Performance. VLSID 2017: 161-166 - [i22]Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes. IACR Cryptol. ePrint Arch. 2017: 603 (2017) - [i21]Donghoon Chang, Sweta Mishra, Somitra Kumar Sanadhya, Ajit Pratap Singh:
On Making U2F Protocol Leakage-Resilient via Re-keying. IACR Cryptol. ePrint Arch. 2017: 721 (2017) - 2016
- [j5]Monika Singh, Donghoon Chang, Somitra Kumar Sanadhya:
Security Analysis of mvHash-B Similarity Hashing. J. Digit. Forensics Secur. Law 11(2): 21-34 (2016) - [c28]Donghoon Chang, Mohona Ghosh, Kishan Chand Gupta, Arpan Jati, Abhishek Kumar, Dukjae Moon, Indranil Ghosh Ray, Somitra Kumar Sanadhya:
SPF: A New Family of Efficient Format-Preserving Encryption Algorithms. Inscrypt 2016: 64-83 - [c27]Donghoon Chang, Amit Kumar Chauhan, Naina Gupta, Arpan Jati, Somitra Kumar Sanadhya:
Exploiting the Leakage: Analysis of Some Authenticated Encryption Schemes. SPACE 2016: 383-401 - [e2]Orr Dunkelman, Somitra Kumar Sanadhya:
Progress in Cryptology - INDOCRYPT 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings. Lecture Notes in Computer Science 10095, 2016, ISBN 978-3-319-49889-8 [contents] - 2015
- [c26]Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya:
Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message. ACISP 2015: 93-106 - [c25]Megha Agrawal, Donghoon Chang, Somitra Sanadhya:
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices. ACISP 2015: 451-468 - [c24]Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Biclique Cryptanalysis of Full Round AES-128 Based Hashing Modes. Inscrypt 2015: 3-21 - [c23]Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya:
Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512. ICISC 2015: 119-135 - [c22]Donghoon Chang, Somitra Kumar Sanadhya, Nishant Sharma:
New HMAC Message Patches: Secret Patch and CrOw Patch. ICISS 2015: 285-302 - [c21]Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya:
Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256. INDOCRYPT 2015: 198-217 - [c20]Nasour Bagheri, Navid Ghaedi, Somitra Kumar Sanadhya:
Differential Fault Analysis of SHA-3. INDOCRYPT 2015: 253-269 - [c19]Donghoon Chang, Sumesh Manjunath R., Somitra Kumar Sanadhya:
PPAE: Practical Parazoa Authenticated Encryption Family. ProvSec 2015: 198-211 - [i20]Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Rig: A simple, secure and flexible design for Password Hashing. IACR Cryptol. ePrint Arch. 2015: 9 (2015) - [i19]Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Performance Analysis of Some Password Hashing Schemes. IACR Cryptol. ePrint Arch. 2015: 139 (2015) - [i18]Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique. IACR Cryptol. ePrint Arch. 2015: 234 (2015) - [i17]Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya:
Sponge based CCA2 secure asymmetric encryption for arbitrary length message. IACR Cryptol. ePrint Arch. 2015: 330 (2015) - [i16]Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya:
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices. IACR Cryptol. ePrint Arch. 2015: 331 (2015) - [i15]Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya:
Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512. IACR Cryptol. ePrint Arch. 2015: 1227 (2015) - 2014
- [c18]Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique. Inscrypt 2014: 343-360 - [c17]Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Rig: A Simple, Secure and Flexible Design for Password Hashing. Inscrypt 2014: 361-381 - [c16]Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Bicliques with Minimal Data and Time Complexity for AES. ICISC 2014: 160-174 - [c15]Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:
Cryptographic Module Based Approach for Password Hashing Schemes. PASSWORDS 2014: 39-57 - [c14]Javad Alizadeh, Hoda Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, Martin M. Lauridsen, Somitra Kumar Sanadhya:
Cryptanalysis of SIMON Variants with Connections. RFIDSec 2014: 90-107 - [i14]Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:
Bicliques with Minimal Data and Time Complexity for AES (Extended Version). IACR Cryptol. ePrint Arch. 2014: 932 (2014) - 2013
- [c13]Donghoon Chang, Abhishek Kumar, Somitra Kumar Sanadhya:
Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN. INDOCRYPT 2013: 136-148 - [c12]Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, Somitra Kumar Sanadhya:
Desynchronization and Traceability Attacks on RIPTA-DA Protocol. RFIDSec 2013: 57-68 - [c11]Seyed Farhad Aghili, Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, Somitra Kumar Sanadhya:
On the Security of Two RFID Mutual Authentication Protocols. RFIDSec 2013: 86-99 - [c10]Madhuri Siddula, Somitra Sanadhya, A. Venkata Subramanyam:
Cryptanalysis of a Digital Watermarking Scheme Based on Support Vector Regression. SMC 2013: 1554-1559 - [i13]Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, Somitra Kumar Sanadhya:
Linear Cryptanalysis of Round Reduced SIMON. IACR Cryptol. ePrint Arch. 2013: 663 (2013) - 2012
- [e1]Andrey Bogdanov, Somitra Kumar Sanadhya:
Security, Privacy, and Applied Cryptography Engineering - Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings. Lecture Notes in Computer Science 7644, Springer 2012, ISBN 978-3-642-34415-2 [contents] - 2011
- [c9]Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi, Hamid Behnam:
On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol. DPM/SETOP 2011: 90-103 - [c8]Masoumeh Safkhani, Nasour Bagheri, Majid Naderi, Somitra Kumar Sanadhya:
Security analysis of LMAP++, an RFID authentication protocol. ICITST 2011: 689-694 - [i12]Masoumeh Safkhani, Majid Naderi, Nasour Bagheri, Somitra Kumar Sanadhya:
Cryptanalysis of Some Protocols for RFID Systems. IACR Cryptol. ePrint Arch. 2011: 61 (2011) - [i11]Nasour Bagheri, Masoumeh Safkhani, Majid Naderi, Somitra Kumar Sanadhya:
Security Analysis of LMAP++, an RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2011: 193 (2011) - [i10]Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi:
Cryptanalysis of improved Yeh et al.'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol. IACR Cryptol. ePrint Arch. 2011: 426 (2011) - 2010
- [c7]Ashish Kumar, Somitra Kumar Sanadhya, Praveen Gauravaram, Masoumeh Safkhani, Majid Naderi:
Cryptanalysis of Tav-128 Hash Function. INDOCRYPT 2010: 118-130
2000 – 2009
- 2009
- [j4]Somitra Kumar Sanadhya, Palash Sarkar:
A combinatorial analysis of recent attacks on step reduced SHA-2 family. Cryptogr. Commun. 1(2): 135-173 (2009) - [c6]Somitra Kumar Sanadhya, Palash Sarkar:
A new hash family obtained by modifying the SHA-2 family. AsiaCCS 2009: 353-363 - 2008
- [j3]Nikhil R. Pal, Animesh Sharma, Somitra Kumar Sanadhya:
Deriving meaningful rules from gene expression data for classification. J. Intell. Fuzzy Syst. 19(3): 171-180 (2008) - [c5]Somitra Kumar Sanadhya, Palash Sarkar:
Non-linear Reduced Round Attacks against SHA-2 Hash Family. ACISP 2008: 254-266 - [c4]Somitra Kumar Sanadhya, Palash Sarkar:
Attacking Reduced Round SHA-256. ACNS 2008: 130-143 - [c3]Somitra Kumar Sanadhya, Palash Sarkar:
New Collision Attacks against Up to 24-Step SHA-2. INDOCRYPT 2008: 91-103 - [c2]Somitra Kumar Sanadhya, Palash Sarkar:
Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. ISC 2008: 244-259 - [i9]Somitra Kumar Sanadhya, Palash Sarkar:
22-Step Collisions for SHA-2. CoRR abs/0803.1220 (2008) - [i8]Somitra Kumar Sanadhya, Palash Sarkar:
Colliding Message Pairs for 23 and 24-step SHA-512. CoRR abs/0809.0216 (2008) - [i7]Somitra Kumar Sanadhya, Palash Sarkar:
Attacking Reduced Round SHA-256. IACR Cryptol. ePrint Arch. 2008: 142 (2008) - [i6]Somitra Kumar Sanadhya, Palash Sarkar:
Non-Linear Reduced Round Attacks Against SHA-2 Hash family. IACR Cryptol. ePrint Arch. 2008: 174 (2008) - [i5]Somitra Kumar Sanadhya, Palash Sarkar:
Searching for Low Weight Codewords in Linear Binary Codes. IACR Cryptol. ePrint Arch. 2008: 269 (2008) - [i4]Somitra Kumar Sanadhya, Palash Sarkar:
New Collision attacks Against Up To 24-step SHA-2. IACR Cryptol. ePrint Arch. 2008: 270 (2008) - [i3]Somitra Kumar Sanadhya, Palash Sarkar:
A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family. IACR Cryptol. ePrint Arch. 2008: 271 (2008) - [i2]Somitra Kumar Sanadhya, Palash Sarkar:
A New Hash Family Obtained by Modifying the SHA-2 Family. IACR Cryptol. ePrint Arch. 2008: 272 (2008) - 2007
- [j2]Nikhil Ranjan Pal, Somitra Kumar Sanadhya, Animesh Sharma:
Computation of consensus hydrophobicity scales with self-organizing maps and fuzzy clustering along with applications to protein fold prediction. Neural Parallel Sci. Comput. 15(1): 75-90 (2007) - [c1]Somitra Kumar Sanadhya, Palash Sarkar:
New Local Collisions for the SHA-2 Hash Family. ICISC 2007: 193-205 - [i1]Somitra Kumar Sanadhya, Palash Sarkar:
New Local Collisions for the SHA-2 Hash Family. IACR Cryptol. ePrint Arch. 2007: 352 (2007) - 2006
- [j1]Nikhil R. Pal, Animesh Sharma, Somitra Kumar Sanadhya, Karmeshu:
On identifying marker genes from gene expression data in a neural framework through online feature analysis. Int. J. Intell. Syst. 21(4): 453-467 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-21 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint