default search action
Itai Dinur
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Itai Dinur, Nathan Keller, Ohad Klein:
Fine-grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR. J. ACM 71(3): 23 (2024) - [c46]Itai Dinur:
Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis. EUROCRYPT (1) 2024: 33-62 - [c45]Itai Dinur:
Time-Space Lower Bounds for Bounded-Error Computation in the Random-Query Model. SODA 2024: 2900-2915 - [i53]Itai Dinur:
Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis. IACR Cryptol. ePrint Arch. 2024: 338 (2024) - [i52]Itai Dinur:
Combining Outputs of a Random Permutation: New Constructions and Tight Security Bounds by Fourier Analysis. IACR Cryptol. ePrint Arch. 2024: 929 (2024) - 2023
- [c44]Itai Dinur, Uri Stemmer, David P. Woodruff, Samson Zhou:
On Differential Privacy and Adaptive Data Analysis with Bounded Space. EUROCRYPT (3) 2023: 35-65 - [c43]Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. EUROCRYPT (4) 2023: 98-127 - [i51]Itai Dinur, Uri Stemmer, David P. Woodruff, Samson Zhou:
On Differential Privacy and Adaptive Data Analysis with Bounded Space. CoRR abs/2302.05707 (2023) - [i50]Itai Dinur:
Time-Space Lower Bounds for Bounded-Error Computation in the Random-Query Model. Electron. Colloquium Comput. Complex. TR23 (2023) - [i49]Itai Dinur, Uri Stemmer, David P. Woodruff, Samson Zhou:
On Differential Privacy and Adaptive Data Analysis with Bounded Space. IACR Cryptol. ePrint Arch. 2023: 171 (2023) - [i48]Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. IACR Cryptol. ePrint Arch. 2023: 288 (2023) - 2022
- [j14]Itai Dinur, Bart Mennink:
Preface to Volume 2022, Issue 1. IACR Trans. Symmetric Cryptol. 2022(1): 1-4 (2022) - [c42]Dor Amzaleg, Itai Dinur:
Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2. EUROCRYPT (3) 2022: 57-85 - [c41]Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein:
Locality-Preserving Hashing for Shifts with Connections to Cryptography. ITCS 2022: 27:1-27:24 - [i47]Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein:
Locality-Preserving Hashing for Shifts with Connections to Cryptography. CoRR abs/2201.03041 (2022) - [i46]Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein:
Locality-Preserving Hashing for Shifts with Connections to Cryptography. IACR Cryptol. ePrint Arch. 2022: 28 (2022) - [i45]Dor Amzaleg, Itai Dinur:
Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2. IACR Cryptol. ePrint Arch. 2022: 424 (2022) - 2021
- [c40]Itai Dinur, Steven Goldfeder, Tzipora Halevi, Yuval Ishai, Mahimna Kelkar, Vivek Sharma, Greg Zaverucha:
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications. CRYPTO (4) 2021: 517-547 - [c39]Itai Dinur:
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2). EUROCRYPT (1) 2021: 374-403 - [c38]Itai Dinur, Nathan Keller, Ohad Klein:
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR. FOCS 2021: 80-91 - [c37]Itai Dinur:
Improved Algorithms for Solving Polynomial Systems over GF(2) by Multiple Parity-Counting. SODA 2021: 2550-2564 - [c36]Itai Dinur, Ben Hasson:
Distributed Merkle's Puzzles. TCC (2) 2021: 310-332 - [i44]Itai Dinur, Nathan Keller, Ohad Klein:
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR. CoRR abs/2111.00486 (2021) - [i43]Itai Dinur:
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2). IACR Cryptol. ePrint Arch. 2021: 578 (2021) - [i42]Itai Dinur, Steven Goldfeder, Tzipora Halevi, Yuval Ishai, Mahimna Kelkar, Vivek Sharma, Greg Zaverucha:
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications. IACR Cryptol. ePrint Arch. 2021: 885 (2021) - [i41]Itai Dinur, Nathan Keller, Ohad Klein:
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR. IACR Cryptol. ePrint Arch. 2021: 1460 (2021) - 2020
- [j13]Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang:
Generic Attacks on Hash Combiners. J. Cryptol. 33(3): 742-823 (2020) - [j12]Itai Dinur, Nathan Keller, Ohad Klein:
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing. J. Cryptol. 33(3): 824-873 (2020) - [j11]Itai Dinur:
Cryptanalytic Time-Memory-Data Trade-offs for FX-Constructions and the Affine Equivalence Problem. J. Cryptol. 33(3): 874-909 (2020) - [j10]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Tight Bounds on Online Checkpointing Algorithms. ACM Trans. Algorithms 16(3): 31:1-31:22 (2020) - [j9]Itai Dinur, Gaëtan Leurent:
Preface to Volume 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process. IACR Trans. Symmetric Cryptol. 2020(S1): 1-4 (2020) - [c35]Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems. CRYPTO (3) 2020: 299-328 - [c34]Itai Dinur:
Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications. EUROCRYPT (1) 2020: 405-434 - [c33]Itai Dinur:
On the Streaming Indistinguishability of a Random Permutation and a Random Function. EUROCRYPT (2) 2020: 433-460 - [i40]Itai Dinur:
Improved Algorithms for Solving Polynomial Systems over GF(2) by Multiple Parity-Counting. CoRR abs/2005.04800 (2020) - [i39]Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems. IACR Cryptol. ePrint Arch. 2020: 188 (2020) - [i38]Itai Dinur:
Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications. IACR Cryptol. ePrint Arch. 2020: 229 (2020)
2010 – 2019
- 2019
- [j8]Itai Dinur:
An algorithmic framework for the generalized birthday problem. Des. Codes Cryptogr. 87(8): 1897-1926 (2019) - [j7]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications. J. Cryptol. 32(4): 1448-1490 (2019) - [c32]Itai Dinur, Natan Elul:
A Relay Attack on a Tamper Detection System (Brief Announcement). CSCML 2019: 198-201 - [c31]Itai Dinur, Daniel Kales, Angela Promitzer, Sebastian Ramacher, Christian Rechberger:
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC. EUROCRYPT (1) 2019: 343-372 - [c30]Itai Dinur, Niv Nadler:
Multi-target Attacks on the Picnic Signature Scheme and Related Protocols. EUROCRYPT (3) 2019: 699-727 - [i37]Itai Dinur:
On the Streaming Indistinguishability of a Random Permutation and a Random Function. IACR Cryptol. ePrint Arch. 2019: 413 (2019) - [i36]Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang:
Generic Attacks on Hash Combiners. IACR Cryptol. ePrint Arch. 2019: 755 (2019) - 2018
- [c29]Itai Dinur, Nathan Keller, Ohad Klein:
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing. CRYPTO (3) 2018: 213-242 - [c28]Itai Dinur:
An Improved Affine Equivalence Algorithm for Random Permutations. EUROCRYPT (1) 2018: 413-442 - [c27]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Tight Bounds on Online Checkpointing Algorithms. ICALP 2018: 13:1-13:13 - [e1]Itai Dinur, Shlomi Dolev, Sachin Lodha:
Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings. Lecture Notes in Computer Science 10879, Springer 2018, ISBN 978-3-319-94146-2 [contents] - [i35]Itai Dinur:
An Improved Affine Equivalence Algorithm for Random Permutations. IACR Cryptol. ePrint Arch. 2018: 115 (2018) - [i34]Itai Dinur:
An Algorithmic Framework for the Generalized Birthday Problem. IACR Cryptol. ePrint Arch. 2018: 575 (2018) - [i33]Itai Dinur, Nathan Keller, Ohad Klein:
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing. IACR Cryptol. ePrint Arch. 2018: 731 (2018) - [i32]Itai Dinur:
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC. IACR Cryptol. ePrint Arch. 2018: 772 (2018) - [i31]Itai Dinur, Niv Nadler:
Multi-Target Attacks on the Picnic Signature Scheme and Related Protocols. IACR Cryptol. ePrint Arch. 2018: 1212 (2018) - 2017
- [j6]Itai Dinur, Gaëtan Leurent:
Improved Generic Attacks Against Hash-Based MACs and HAIFA. Algorithmica 79(4): 1161-1195 (2017) - [c26]Itai Dinur, Niv Nadler:
Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme. CRYPTO (2) 2017: 375-403 - [c25]Jihoon Cho, Kyu Young Choi, Itai Dinur, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Veidberg:
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction. CT-RSA 2017: 293-308 - [i30]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Optimal Backup Strategies Against Cyber Attacks. CoRR abs/1704.02659 (2017) - [i29]Itai Dinur, Niv Nadler:
Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme. IACR Cryptol. ePrint Arch. 2017: 497 (2017) - 2016
- [j5]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes. J. Cryptol. 29(4): 697-728 (2016) - [c24]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Memory-Efficient Algorithms for Finding Needles in Haystacks. CRYPTO (2) 2016: 185-206 - [c23]Itai Dinur:
New Attacks on the Concatenation and XOR Hash Combiners. EUROCRYPT (1) 2016: 484-508 - [i28]Itai Dinur:
New Attacks on the Concatenation and XOR Hash Combiners. IACR Cryptol. ePrint Arch. 2016: 131 (2016) - [i27]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Memory-Efficient Algorithms for Finding Needles in Haystacks. IACR Cryptol. ePrint Arch. 2016: 560 (2016) - 2015
- [j4]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Reflections on slide with a twist attacks. Des. Codes Cryptogr. 77(2-3): 633-651 (2015) - [c22]Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang:
Optimized Interpolation Attacks on LowMC. ASIACRYPT (2) 2015: 535-560 - [c21]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. CRYPTO (1) 2015: 433-454 - [c20]Itai Dinur:
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE. EUROCRYPT (1) 2015: 231-253 - [c19]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Virginie Lallemand, Nathan Keller, Boaz Tsaban:
Cryptanalysis of SP Networks with Partial Non-Linear Layers. EUROCRYPT (1) 2015: 315-342 - [c18]Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus:
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function. EUROCRYPT (1) 2015: 733-761 - [c17]Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. LATINCRYPT 2015: 139-156 - [i26]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. IACR Cryptol. ePrint Arch. 2015: 146 (2015) - [i25]Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2015: 268 (2015) - [i24]Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang:
Optimized Interpolation Attacks on LowMC. IACR Cryptol. ePrint Arch. 2015: 418 (2015) - [i23]Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander:
Decomposing the ASASA Block Cipher Construction. IACR Cryptol. ePrint Arch. 2015: 507 (2015) - 2014
- [j3]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Dissection: a new paradigm for solving bicomposite search problems. Commun. ACM 57(10): 98-105 (2014) - [j2]Itai Dinur, Orr Dunkelman, Adi Shamir:
Improved Practical Attacks on Round-Reduced Keccak. J. Cryptol. 27(2): 183-209 (2014) - [c16]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. ASIACRYPT (1) 2014: 439-457 - [c15]Itai Dinur, Gaëtan Leurent:
Improved Generic Attacks against Hash-Based MACs and HAIFA. CRYPTO (1) 2014: 149-168 - [c14]Itai Dinur, Jérémy Jean:
Cryptanalysis of FIDES. FSE 2014: 224-240 - [c13]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. FSE 2014: 390-410 - [c12]Itai Dinur:
Improved Differential Cryptanalysis of Round-Reduced Speck. Selected Areas in Cryptography 2014: 147-164 - [i22]Itai Dinur, Jérémy Jean:
Cryptanalysis of FIDES. IACR Cryptol. ePrint Arch. 2014: 58 (2014) - [i21]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Virginie Lallemand, Boaz Tsaban:
Improved Analysis of Zorro-Like Ciphers. IACR Cryptol. ePrint Arch. 2014: 228 (2014) - [i20]Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus:
Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function. IACR Cryptol. ePrint Arch. 2014: 259 (2014) - [i19]Itai Dinur:
Improved Differential Cryptanalysis of Round-Reduced Speck. IACR Cryptol. ePrint Arch. 2014: 320 (2014) - [i18]Itai Dinur, Gaëtan Leurent:
Improved Generic Attacks Against Hash-based MACs and HAIFA. IACR Cryptol. ePrint Arch. 2014: 441 (2014) - [i17]Itai Dinur:
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE. IACR Cryptol. ePrint Arch. 2014: 656 (2014) - [i16]Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny, Michal Straus:
Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function. IACR Cryptol. ePrint Arch. 2014: 736 (2014) - [i15]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Reflections on Slide with a Twist Attacks. IACR Cryptol. ePrint Arch. 2014: 847 (2014) - 2013
- [c11]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2. ASIACRYPT (1) 2013: 337-356 - [c10]Itai Dinur, Orr Dunkelman, Adi Shamir:
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials. FSE 2013: 219-240 - [i14]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2. IACR Cryptol. ePrint Arch. 2013: 391 (2013) - [i13]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. IACR Cryptol. ePrint Arch. 2013: 634 (2013) - [i12]Eli Biham, Yaniv Carmeli, Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. IACR Cryptol. ePrint Arch. 2013: 674 (2013) - 2012
- [j1]Itai Dinur, Adi Shamir:
Applying cube attacks to stream ciphers in realistic scenarios. Cryptogr. Commun. 4(3-4): 217-232 (2012) - [c9]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. CRYPTO 2012: 719-740 - [c8]Itai Dinur, Orr Dunkelman, Adi Shamir:
Improved Attacks on Full GOST. FSE 2012: 9-28 - [c7]Itai Dinur, Orr Dunkelman, Adi Shamir:
New Attacks on Keccak-224 and Keccak-256. FSE 2012: 442-461 - [i11]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. IACR Cryptol. ePrint Arch. 2012: 217 (2012) - [i10]Itai Dinur, Orr Dunkelman, Adi Shamir:
Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3. IACR Cryptol. ePrint Arch. 2012: 672 (2012) - 2011
- [c6]Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann:
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. ASIACRYPT 2011: 327-343 - [c5]Itai Dinur, Adi Shamir:
An Improved Algebraic Attack on Hamsi-256. FSE 2011: 88-106 - [c4]Itai Dinur, Adi Shamir:
Breaking Grain-128 with Dynamic Cube Attacks. FSE 2011: 167-187 - [i9]Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann:
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. IACR Cryptol. ePrint Arch. 2011: 282 (2011) - [i8]Itai Dinur, Orr Dunkelman, Adi Shamir:
Improved Attacks on Full GOST. IACR Cryptol. ePrint Arch. 2011: 558 (2011) - [i7]Itai Dinur, Orr Dunkelman, Adi Shamir:
New attacks on Keccak-224 and Keccak-256. IACR Cryptol. ePrint Arch. 2011: 624 (2011) - 2010
- [c3]Itai Dinur, Adi Shamir:
Generic Analysis of Small Cryptographic Leaks. FDTC 2010: 39-48 - [i6]Itai Dinur, Adi Shamir:
Breaking Grain-128 with Dynamic Cube Attacks. IACR Cryptol. ePrint Arch. 2010: 570 (2010) - [i5]Itai Dinur, Adi Shamir:
An Improved Algebraic Attack on Hamsi-256. IACR Cryptol. ePrint Arch. 2010: 602 (2010)
2000 – 2009
- 2009
- [c2]Itai Dinur, Adi Shamir:
Cube Attacks on Tweakable Black Box Polynomials. EUROCRYPT 2009: 278-299 - [c1]Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir:
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. FSE 2009: 1-22 - [i4]Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir:
Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium. Symmetric Cryptography 2009 - [i3]Itai Dinur, Adi Shamir:
Side Channel Cube Attacks on Block Ciphers. IACR Cryptol. ePrint Arch. 2009: 127 (2009) - [i2]Jean-Philippe Aumasson, Itai Dinur, Luca Henzen, Willi Meier, Adi Shamir:
Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128. IACR Cryptol. ePrint Arch. 2009: 218 (2009) - 2008
- [i1]Itai Dinur, Adi Shamir:
Cube Attacks on Tweakable Black Box Polynomials. IACR Cryptol. ePrint Arch. 2008: 385 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint