default search action
Ludovic Perret
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c41]Luk Bettale, Delaram Kahrobaei, Ludovic Perret, Javier A. Verbel:
Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials. ACNS (1) 2024: 457-486 - [c40]River Moreira Ferreira, Ludovic Perret:
Polynomial-Time Key-Recovery Attack on the NIST Specification of PROV. AFRICACRYPT 2024: 222-235 - [c39]Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem. PQCrypto (1) 2024: 202-226 - [i38]River Moreira Ferreira, Ludovic Perret:
Polynomial-Time Key-Recovery Attack on the ${\tt NIST}$ Specification of ${\tt PROV}$. IACR Cryptol. ePrint Arch. 2024: 279 (2024) - 2023
- [c38]Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
SPDH-Sign: Towards Efficient, Post-quantum Group-Based Signatures. PQCrypto 2023: 113-138 - [i37]Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
SPDH-Sign: towards Efficient, Post-quantum Group-based Signatures. CoRR abs/2304.12900 (2023) - [i36]Delaram Kahrobaei, Carmine Monetta, Ludovic Perret, Maria Tota, Martina Vigorito:
Cryptanalysis of protocols using (Simultaneous) Conjugacy Search Problem in certain Metabelian Platform Groups. CoRR abs/2309.13928 (2023) - [i35]Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
SPDH-Sign: towards Efficient, Post-quantum Group-based Signatures. IACR Cryptol. ePrint Arch. 2023: 595 (2023) - [i34]Luk Bettale, Delaram Kahrobaei, Ludovic Perret, Javier A. Verbel:
Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials. IACR Cryptol. ePrint Arch. 2023: 1760 (2023) - 2022
- [i33]Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem. CoRR abs/2209.02814 (2022) - [i32]Jean-Charles Faugère, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret:
A New Perturbation for Multivariate Public Key Schemes such as HFE and UOV. IACR Cryptol. ePrint Arch. 2022: 203 (2022) - [i31]Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti:
A Subexponential Quantum Algorithm for the Semidirect Discrete Logarithm Problem. IACR Cryptol. ePrint Arch. 2022: 1165 (2022) - 2021
- [j21]Olive Chakraborty, Jean-Charles Faugère, Ludovic Perret:
Cryptanalysis of the extension field cancellation cryptosystem. Des. Codes Cryptogr. 89(6): 1335-1364 (2021) - [j20]Matías R. Bender, Jean-Charles Faugère, Ludovic Perret, Elias P. Tsigaridas:
A nearly optimal algorithm to decompose binary forms. J. Symb. Comput. 105: 71-96 (2021)
2010 – 2019
- 2019
- [j19]Marta Conde Pena, Raúl Durán Díaz, Jean-Charles Faugère, Luis Hernández Encinas, Ludovic Perret:
Non-quantum cryptanalysis of the noisy version of Aaronson-Christiano's quantum money scheme. IET Inf. Secur. 13(4): 362-366 (2019) - [j18]Jean-Charles Faugère, Ludovic Perret, Jocelyn Ryckeghem:
Software Toolkit for HFE-based Multivariate Schemes. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3): 257-304 (2019) - [c37]Ward Beullens, Jean-Charles Faugère, Eliane Koussa, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret:
PKP-Based Signature Scheme. INDOCRYPT 2019: 3-22 - 2018
- [c36]Eliane Koussa, Jean-Charles Faugère, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret:
Combinatorial Digital Signature Scheme. BDCSIntell 2018: 48-54 - [i30]Matías R. Bender, Jean-Charles Faugère, Ludovic Perret, Elias P. Tsigaridas:
A nearly optimal algorithm to decompose binary forms. CoRR abs/1810.12588 (2018) - [i29]Jean-Charles Faugère, Eliane Koussa, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret:
PKP-Based Signature Scheme. IACR Cryptol. ePrint Arch. 2018: 714 (2018) - 2017
- [i28]Jean-Charles Faugère, Kelsey Horan, Delaram Kahrobaei, Marc Kaplan, Elham Kashefi, Ludovic Perret:
Fast Quantum Algorithm for Solving Multivariate Quadratic Equations. CoRR abs/1712.07211 (2017) - [i27]Jean-Charles Faugère, Kelsey Horan, Delaram Kahrobaei, Marc Kaplan, Elham Kashefi, Ludovic Perret:
Fast Quantum Algorithm for Solving Multivariate Quadratic Equations. IACR Cryptol. ePrint Arch. 2017: 1236 (2017) - 2016
- [b1]Ludovic Perret:
Bases de Gröbner en Cryptographie Post-Quantique. (Gröbner bases techniques in Quantum-Safe Cryptography). Pierre and Marie Curie University, Paris, France, 2016 - [j17]Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich:
Structural cryptanalysis of McEliece schemes with compact keys. Des. Codes Cryptogr. 79(1): 87-112 (2016) - [j16]Martin R. Albrecht, Jean-Charles Faugère, Pooya Farshim, Gottfried Herold, Ludovic Perret:
Polly Cracker, revisited. Des. Codes Cryptogr. 79(2): 261-302 (2016) - [j15]Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich:
Folding Alternant and Goppa Codes With Non-Trivial Automorphism Groups. IEEE Trans. Inf. Theory 62(1): 184-198 (2016) - [c35]Matías R. Bender, Jean-Charles Faugère, Ludovic Perret, Elias P. Tsigaridas:
A Superfast Randomized Algorithm to Decompose Binary Forms. ISSAC 2016: 79-86 - [c34]Jean-Charles Faugère, Ludovic Perret:
The Quantum-Safe Revolution. WISA 2016: 258-266 - 2015
- [j14]Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret:
Algebraic algorithms for LWE problems. ACM Commun. Comput. Algebra 49(2): 62 (2015) - [j13]Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret:
On the complexity of the BKW algorithm on LWE. Des. Codes Cryptogr. 74(2): 325-354 (2015) - [j12]Nelly Fazio, Kevin Iga, Antonio Nicolosi, Ludovic Perret, William E. Skeith III:
Hardness of learning problems over Burnside groups of exponent 3. Des. Codes Cryptogr. 75(1): 59-70 (2015) - [j11]Jérémy Berthomieu, Jean-Charles Faugère, Ludovic Perret:
Polynomial-time algorithms for quadratic isomorphism of polynomials: The regular case. J. Complex. 31(4): 590-616 (2015) - [c33]Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae:
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems. Public Key Cryptography 2015: 150-174 - [c32]Marta Conde Pena, Jean-Charles Faugère, Ludovic Perret:
Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case. Public Key Cryptography 2015: 194-213 - 2014
- [j10]Jean-Charles Faugère, Domingo Gómez-Pérez, Jaime Gutierrez, Ludovic Perret:
Mathematical and computer algebra techniques in cryptology. J. Symb. Comput. 64: 1-2 (2014) - [c31]Jean-Charles Faugère, Ludovic Perret, Frédéric de Portzamparc:
Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form. ASIACRYPT (1) 2014: 21-41 - [c30]Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich:
Structural weakness of compact variants of the McEliece cryptosystem. ISIT 2014: 1717-1721 - [c29]Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret:
Lazy Modulus Switching for the BKW Algorithm on LWE. Public Key Cryptography 2014: 429-445 - [c28]Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, Keita Xagawa:
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions. Public Key Cryptography 2014: 446-464 - [i26]Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich:
Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups. CoRR abs/1405.5101 (2014) - [i25]Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret:
Lazy Modulus Switching for the BKW Algorithm on LWE. IACR Cryptol. ePrint Arch. 2014: 19 (2014) - [i24]Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich:
Structural Cryptanalysis of McEliece Schemes with Compact Keys. IACR Cryptol. ePrint Arch. 2014: 210 (2014) - [i23]Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Frédéric de Portzamparc, Jean-Pierre Tillich:
Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups. IACR Cryptol. ePrint Arch. 2014: 353 (2014) - [i22]Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae:
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems. IACR Cryptol. ePrint Arch. 2014: 811 (2014) - [i21]Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret:
Algebraic Algorithms for LWE Problems. IACR Cryptol. ePrint Arch. 2014: 1018 (2014) - 2013
- [j9]Luk Bettale, Jean-Charles Faugère, Ludovic Perret:
Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic. Des. Codes Cryptogr. 69(1): 1-52 (2013) - [j8]Jean-Charles Faugère, Valérie Gauthier-Umaña, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich:
A Distinguisher for High-Rate McEliece Cryptosystems. IEEE Trans. Inf. Theory 59(10): 6830-6844 (2013) - [i20]Jérémy Berthomieu, Jean-Charles Faugère, Ludovic Perret:
Polynomial-Time Algorithms for Quadratic Isomorphism of Polynomials. CoRR abs/1307.4974 (2013) - [i19]Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret:
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions. IACR Cryptol. ePrint Arch. 2013: 470 (2013) - 2012
- [j7]Dongdai Lin, Jean-Charles Faugère, Ludovic Perret, Tianze Wang:
On enumeration of polynomial equivalence classes and their application to MPKC. Finite Fields Their Appl. 18(2): 283-302 (2012) - [j6]Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret:
On the relation between the MXL family of algorithms and Gröbner basis algorithms. J. Symb. Comput. 47(8): 926-941 (2012) - [c27]Jean-Charles Faugère, Ludovic Perret, Christophe Petit, Guénaël Renault:
Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields. EUROCRYPT 2012: 27-44 - [c26]Luk Bettale, Jean-Charles Faugère, Ludovic Perret:
Solving polynomial systems over finite fields: improved analysis of the hybrid approach. ISSAC 2012: 67-74 - [i18]Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Gottfried Herold, Ludovic Perret:
Polly Cracker, Revisited. Electron. Colloquium Comput. Complex. TR12 (2012) - [i17]Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret:
On the Complexity of the BKW Algorithm on LWE. IACR Cryptol. ePrint Arch. 2012: 636 (2012) - 2011
- [c25]Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret:
Polly Cracker, Revisited. ASIACRYPT 2011: 179-196 - [c24]Frederik Armknecht, Daniel Augot, Ludovic Perret, Ahmad-Reza Sadeghi:
On Constructing Homomorphic Encryption Schemes from Coding Theory. IMACC 2011: 23-40 - [c23]Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski:
MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme. INTRUST 2011: 184-203 - [c22]Jean-Charles Faugère, Valérie Gauthier-Umaña, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich:
A distinguisher for high rate McEliece cryptosystems. ITW 2011: 282-286 - [c21]Luk Bettale, Jean-Charles Faugère, Ludovic Perret:
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants. Public Key Cryptography 2011: 441-458 - [c20]Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret:
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem. Public Key Cryptography 2011: 473-493 - [i16]Dongdai Lin, Jean-Charles Faugère, Ludovic Perret, Tianze Wang:
On Enumeration of Polynomial Equivalence Classes and Their Application to MPKC. IACR Cryptol. ePrint Arch. 2011: 55 (2011) - [i15]Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret:
On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms. IACR Cryptol. ePrint Arch. 2011: 164 (2011) - [i14]Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret:
Polly Cracker, Revisited. IACR Cryptol. ePrint Arch. 2011: 289 (2011) - [i13]Frederik Armknecht, Daniel Augot, Ludovic Perret, Ahmad-Reza Sadeghi:
On Constructing Homomorphic Encryption Schemes from Coding Theory. IACR Cryptol. ePrint Arch. 2011: 309 (2011) - [i12]Nelly Fazio, Kevin Iga, Antonio Nicolosi, Ludovic Perret, William E. Skeith III:
Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3. IACR Cryptol. ePrint Arch. 2011: 398 (2011) - [i11]Luk Bettale, Jean-Charles Faugère, Ludovic Perret:
Cryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic. IACR Cryptol. ePrint Arch. 2011: 399 (2011) - [i10]Jean-Charles Faugère, Ludovic Perret, Christophe Petit, Guénaël Renault:
New Subexponential Algorithms for Factoring in SL(2, fq). IACR Cryptol. ePrint Arch. 2011: 598 (2011) - 2010
- [j5]Françoise Levy-dit-Vehel, Ludovic Perret:
Security analysis of word problem-based cryptosystems. Des. Codes Cryptogr. 54(1): 29-41 (2010) - [j4]Jean-Charles Faugère, Ludovic Perret:
Foreword. Math. Comput. Sci. 3(2): 127-128 (2010) - [c19]Jean-Charles Faugère, Rune Steinsmo Ødegård, Ludovic Perret, Danilo Gligoroski:
Analysis of the MQQ Public Key Cryptosystem. CANS 2010: 169-183 - [c18]Martin R. Albrecht, Carlos Cid, Thomas Dullien, Jean-Charles Faugère, Ludovic Perret:
Algebraic Precomputations in Differential and Integral Cryptanalysis. Inscrypt 2010: 387-403 - [c17]Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich:
Algebraic Cryptanalysis of McEliece Variants with Compact Keys. EUROCRYPT 2010: 279-298 - [c16]Jean-Charles Faugère, Joachim von zur Gathen, Ludovic Perret:
Decomposition of generic multivariate polynomials. ISSAC 2010: 131-137 - [c15]Jean-Charles Faugère, Antoine Joux, Ludovic Perret, Joana Treger:
Cryptanalysis of the Hidden Matrix Cryptosystem. LATINCRYPT 2010: 241-254 - [i9]Danilo Gligoroski, Svein Johan Knapskog, Smile Markovski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère:
The Digital Signature Scheme MQQ-SIG. CoRR abs/1010.3163 (2010) - [i8]Jean-Charles Faugère, Valérie Gauthier, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich:
A Distinguisher for High Rate McEliece Cryptosystems. IACR Cryptol. ePrint Arch. 2010: 331 (2010) - [i7]Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret:
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem. IACR Cryptol. ePrint Arch. 2010: 504 (2010) - [i6]Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski:
The Digital Signature Scheme MQQ-SIG. IACR Cryptol. ePrint Arch. 2010: 527 (2010)
2000 – 2009
- 2009
- [j3]Luk Bettale, Jean-Charles Faugère, Ludovic Perret:
Hybrid approach for solving multivariate systems over finite fields. J. Math. Cryptol. 3(3): 177-197 (2009) - [j2]Daniel Augot, Jean-Charles Faugère, Ludovic Perret:
Foreword. J. Symb. Comput. 44(12): 1605-1607 (2009) - [j1]Jean-Charles Faugère, Ludovic Perret:
An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography. J. Symb. Comput. 44(12): 1676-1689 (2009) - [c14]Jean-Charles Faugère, Ludovic Perret:
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages. Inscrypt 2009: 266-277 - [c13]Jean-Charles Faugère, Ludovic Perret:
High order derivatives and decomposition of multivariate polynomials. ISSAC 2009: 207-214 - [p1]Françoise Levy-dit-Vehel, Maria Grazia Marinari, Ludovic Perret, Carlo Traverso:
A Survey on Polly Cracker Systems. Gröbner Bases, Coding, and Cryptography 2009: 285-305 - [e1]Massimiliano Sala, Shojiro Sakata, Teo Mora, Carlo Traverso, Ludovic Perret:
Gröbner Bases, Coding, and Cryptography. Springer 2009, ISBN 978-3-540-93805-7 [contents] - [i5]Jean-Charles Faugère, Ludovic Perret:
On the Security of UOV. IACR Cryptol. ePrint Arch. 2009: 483 (2009) - [i4]Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret:
Differential-Algebraic Algorithms for the Isomorphism of Polynomials Problem. IACR Cryptol. ePrint Arch. 2009: 583 (2009) - 2008
- [c12]Luk Bettale, Jean-Charles Faugère, Ludovic Perret:
Cryptanalysis of the TRMS Signature Scheme of PKC'05. AFRICACRYPT 2008: 143-155 - [c11]Luk Bettale, Jean-Charles Faugère, Ludovic Perret:
Security Analysis of Multivariate Polynomials for Hashing. Inscrypt 2008: 115-124 - [c10]Jean-Charles Faugère, Françoise Levy-dit-Vehel, Ludovic Perret:
Cryptanalysis of MinRank. CRYPTO 2008: 280-296 - [c9]Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, Jacques Stern:
Total Break of the l-IC Signature Scheme. Public Key Cryptography 2008: 1-17 - [i3]Jean-Charles Faugère, Ludovic Perret:
Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages. IACR Cryptol. ePrint Arch. 2008: 402 (2008) - 2007
- [c8]Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai:
Algebraic Cryptanalysis of 58-Round SHA-1. FSE 2007: 349-365 - 2006
- [c7]Jean-Charles Faugère, Ludovic Perret:
Cryptanalysis of 2R- Schemes. CRYPTO 2006: 357-372 - [c6]Jean-Charles Faugère, Ludovic Perret:
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. EUROCRYPT 2006: 30-47 - 2005
- [c5]Ludovic Perret:
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem. EUROCRYPT 2005: 354-370 - [c4]Françoise Levy-dit-Vehel, Ludovic Perret:
On the Wagner-Magyarik Cryptosystem. WCC 2005: 316-329 - [i2]Ludovic Perret:
A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words. IACR Cryptol. ePrint Arch. 2005: 14 (2005) - 2004
- [c3]Françoise Levy-dit-Vehel, Ludovic Perret:
Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. INDOCRYPT 2004: 275-289 - [c2]Ludovic Perret, Abdelmejid Bayad:
A differential approach to a polynomial equivalence problem. ISIT 2004: 142 - [i1]Ludovic Perret:
On the computational complexity of some equivalence problems of polynomial systems of equations over finite fields. Electron. Colloquium Comput. Complex. TR04 (2004) - 2003
- [c1]Françoise Levy-dit-Vehel, Ludovic Perret:
Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems. INDOCRYPT 2003: 235-251
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint