default search action
Dong-Guk Han
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Ju-Hwan Kim, Dong-Guk Han:
Tiny Security Hole: First-Order Vulnerability of Masked SEED and Its Countermeasure. Sensors 24(18): 5894 (2024) - [c37]Jaeseung Han, Yeon-Jae Kim, Dong-Guk Han:
Side-Channel Protected PIPO Implementation in Hardware. SVCC 2024: 1-3 - 2023
- [j39]Seonghyuck Lim, Hye-Won Mun, Dong-Guk Han:
Deep-Learning Based Nonprofiling Side-Channel Attack on Mask Leakage-Free Environments Using Broadcast Operation. IEEE Access 11: 94335-94345 (2023) - [j38]Jonghyeok Lee, Jaeseung Han, Sangyub Lee, Jihoon Kwon, Keon-Hee Choi, Jae-Won Huh, Jihoon Cho, Dong-Guk Han:
Systematization of Shuffling Countermeasures: With an Application to CRYSTALS-Dilithium. IEEE Access 11: 142862-142873 (2023) - [j37]Seonghyuck Lim, Dong-Guk Han:
Experimental evaluation of differential fault attack on lightweight block cipher PIPO. IET Inf. Secur. 17(1): 80-88 (2023) - [c36]Keon-Hee Choi, Ju-Hwan Kim, Jaeseung Han, Jae-Won Huh, Dong-Guk Han:
Single Trace Analysis of Comparison Operation Based Constant-Time CDT Sampling and Its Countermeasure. ICISC (1) 2023: 185-201 - 2022
- [j36]Jaeseung Han, Yeon-Jae Kim, Soo-Jin Kim, Bo-Yeon Sim, Dong-Guk Han:
Improved Correlation Power Analysis on Bitslice Block Ciphers. IEEE Access 10: 39387-39396 (2022) - [j35]Seonghyuck Lim, Jaeseung Han, Dong-Guk Han:
Single-Byte Error-Based Practical Differential Fault Attack on Bit-Sliced Lightweight Block Cipher PIPO. IEEE Access 10: 67802-67813 (2022) - [j34]Ji-Eun Woo, Jaeseung Han, Dong-Guk Han:
Deep-Learning-Based Side-Channel Analysis of Block Cipher PIPO With Bitslice Implementation. IEEE Access 10: 69303-69311 (2022) - [j33]Bo-Yeon Sim, Aesun Park, Dong-Guk Han:
Chosen-Ciphertext Clustering Attack on CRYSTALS-KYBER Using the Side-Channel Leakage of Barrett Reduction. IEEE Internet Things J. 9(21): 21382-21397 (2022) - [c35]Jae-Won Huh, Dong-Guk Han:
Differential Fault Attack on AES Using Maximum Four Bytes Faulty Ciphertexts. ICISC 2022: 235-245 - 2021
- [j32]Yoo-Seung Won, Dong-Guk Han, Dirmanto Jap, Shivam Bhasin, Jong-Yeon Park:
Non-Profiled Side-Channel Attack Based on Deep Learning Using Picture Trace. IEEE Access 9: 22480-22492 (2021) - [j31]Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong:
A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application. IEEE Access 9: 150592-150607 (2021) - [j30]Jaeseung Han, Taeho Lee, Jihoon Kwon, Joohee Lee, Il-Ju Kim, Jihoon Cho, Dong-Guk Han, Bo-Yeon Sim:
Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling. IEEE Access 9: 166283-166292 (2021) - [j29]Sadiel de la Fe, Han-Byeol Park, Bo-Yeon Sim, Dong-Guk Han, Carles Ferrer:
Profiling Attack against RSA Key Generation Based on a Euclidean Algorithm. Inf. 12(11): 462 (2021) - [c34]Seonghyuck Lim, Jaeseung Han, Taeho Lee, Dong-Guk Han:
Differential Fault Attack on Lightweight Block Cipher PIPO. ICISC 2021: 296-307 - [c33]Ji-Eun Woo, Jaeseung Han, Yeon-Jae Kim, Hye-Won Mun, Seonghyuck Lim, Tae-Ho Lee, Seong-Hyun An, Soo-Jin Kim, Dong-Guk Han:
Learning-based Side-Channel Analysis on PIPO. ICISC 2021: 308-321 - [i18]Ju-Hwan Kim, Ji-Eun Woo, Soo-Jin Kim, So-Yeon Park, Dong-Guk Han:
GAP: Born to Break Hiding. IACR Cryptol. ePrint Arch. 2021: 242 (2021) - [i17]Bo-Yeon Sim, Aesun Park, Dong-Guk Han:
Chosen-ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-channel Leakage of Barrett Reduction. IACR Cryptol. ePrint Arch. 2021: 874 (2021) - [i16]Seonghyuck Lim, Jaeseung Han, Taeho Lee, Dong-Guk Han:
Differential Fault Attack on Lightweight Block Cipher PIPO. IACR Cryptol. ePrint Arch. 2021: 1190 (2021) - 2020
- [j28]Bo-Yeon Sim, Jihoon Kwon, Joohee Lee, Il-Ju Kim, Taeho Lee, Jaeseung Han, Hyo Jin Yoon, Jihoon Cho, Dong-Guk Han:
Single-Trace Attacks on Message Encoding in Lattice-Based KEMs. IEEE Access 8: 183175-183191 (2020) - [j27]Seonghyuck Lim, Jonghyeok Lee, Dong-Guk Han:
Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition. IEEE Access 8: 212794-212802 (2020) - [j26]JongHyeok Lee, Dong-Guk Han:
Security analysis on dummy based side-channel countermeasures - Case study: AES with dummy and shuffling. Appl. Soft Comput. 93: 106352 (2020) - [j25]Bo-Yeon Sim, Dong-Guk Han:
A Study on the SCA Trends for Application to IoT Devices. J. Internet Serv. Inf. Secur. 10(1): 2-21 (2020) - [c32]Han-Byeol Park, Bo-Yeon Sim, Dong-Guk Han:
Machine Learning-Based Profiling Attack Method in RSA Prime Multiplication. ICEA 2020: 32:1-32:6 - [c31]HanSeop Lim, Taeho Lee, Seonghyuck Lim, Jaeseong Han, Bo-Yeon Sim, Dong-Guk Han:
Fault Injection Method for Hardware-implemented AES without Artificial Triggering. ICEA 2020: 40:1-40:6 - [c30]Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong:
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations. ICISC 2020: 99-122 - [c29]JongHyeok Lee, Dong-Guk Han:
DLDDO: Deep Learning to Detect Dummy Operations. WISA 2020: 73-85 - [i15]JongHyeok Lee, Dong-Guk Han:
DLDDO: Deep Learning to Detect Dummy Operations. IACR Cryptol. ePrint Arch. 2020: 939 (2020) - [i14]Bo-Yeon Sim, Jihoon Kwon, Joohee Lee, Il-Ju Kim, Taeho Lee, Jaeseung Han, Hyo Jin Yoon, Jihoon Cho, Dong-Guk Han:
Single-Trace Attacks on the Message Encoding of Lattice-Based KEMs. IACR Cryptol. ePrint Arch. 2020: 992 (2020) - [i13]Il-Ju Kim, Taeho Lee, Jaeseung Han, Bo-Yeon Sim, Dong-Guk Han:
Novel Single-Trace ML Profiling Attacks on NIST 3 Round candidate Dilithium. IACR Cryptol. ePrint Arch. 2020: 1383 (2020) - [i12]Seonghyuck Lim, Jonghyeok Lee, Dong-Guk Han:
Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition. IACR Cryptol. ePrint Arch. 2020: 1534 (2020) - [i11]Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong:
A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application. IACR Cryptol. ePrint Arch. 2020: 1582 (2020)
2010 – 2019
- 2019
- [j24]Bo-Yeon Sim, Jihoon Kwon, Kyu Young Choi, Jihoon Cho, Aesun Park, Dong-Guk Han:
Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(4): 180-212 (2019) - [i10]Bo-Yeon Sim, Dong-Guk Han:
Single-Trace Vulnerability of Countermeasures against Instruction-related Timing Attack. IACR Cryptol. ePrint Arch. 2019: 1236 (2019) - 2018
- [j23]Aesun Park, Kyung-Ah Shim, Namhun Koo, Dong-Guk Han:
Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations - Rainbow and UOV -. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 500-523 (2018) - [c28]Bo-Yeon Sim, Kyu Young Choi, Dukjae Moon, Hyo Jin Yoon, Jihoon Cho, Dong-Guk Han:
T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks. ISPEC 2018: 407-423 - 2017
- [c27]Yoo-Seung Won, Dong-Guk Han:
Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices. COSADE 2017: 120-137 - [c26]Yoo-Seung Won, Aesun Park, Dong-Guk Han:
Novel Leakage Against Realistic Masking and Shuffling Countermeasures - Case Study on PRINCE and SEED. ICISC 2017: 139-154 - [c25]Bo-Yeon Sim, Dong-Guk Han:
Key Bit-Dependent Attack on Protected PKC Using a Single Trace. ISPEC 2017: 168-185 - 2016
- [c24]Aesun Park, Dong-Guk Han:
Chosen ciphertext Simple Power Analysis on software 8-bit implementation of ring-LWE encryption. AsianHOST 2016: 1-6 - [i9]Yoo-Seung Won, Dong-Guk Han:
Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices. IACR Cryptol. ePrint Arch. 2016: 664 (2016) - [i8]Hyunjin Ahn, Dong-Guk Han:
Multilateral White-Box Cryptanalysis: Case study on WB-AES of CHES Challenge 2016. IACR Cryptol. ePrint Arch. 2016: 807 (2016) - 2015
- [j22]Kyungho Son, Dong-Guk Han, Dongho Won:
Simple and Provably Secure Anonymous Authenticated Key Exchange with a Binding Property. IEICE Trans. Commun. 98-B(1): 160-170 (2015) - [c23]Yoo-Seung Won, Philip Hodgers, Máire O'Neill, Dong-Guk Han:
On the Security of Balanced Encoding Countermeasures. CARDIS 2015: 242-256 - [c22]Hyunjin Ahn, Neil Hanley, Máire O'Neill, Dong-Guk Han:
An Improved Second-Order Power Analysis Attack Based on a New Refined Expecter - - Case Study on Protected AES -. WISA 2015: 174-186 - 2014
- [j21]Jae Deok Ji, Dong-Guk Han, Seok Won Jung, Sangjin Lee, Jongsub Moon:
Practical Electromagnetic Disturbance Analysis on Commercial Contactless Smartcards. Int. J. Distributed Sens. Networks 10 (2014) - [j20]Jong-Yeon Park, Dong-Guk Han, Okyeon Yi, Jeong-Nyeo Kim:
An improved side channel attack using event information of subtraction. J. Netw. Comput. Appl. 38: 99-105 (2014) - [j19]HeeSeok Kim, Dong-Guk Han, Seokhie Hong, JaeCheol Ha:
Message blinding method requiring no multiplicative inversion for RSA. ACM Trans. Embed. Comput. Syst. 13(4): 80:1-80:10 (2014) - [c21]Jong-Yeon Park, Jung-Nyeo Kim, Jae-Dock Lim, Dong-Guk Han:
A Whitebox Cryptography Application for Mobile Device Security against Whitebox Attacks - How to Apply WBC on Mobile Device. ICITCS 2014: 1-5 - [e1]Hyang-Sook Lee, Dong-Guk Han:
Information Security and Cryptology - ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8565, Springer 2014, ISBN 978-3-319-12159-8 [contents] - 2012
- [j18]Kyungho Son, Dong-Guk Han, Dongho Won:
A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards. IEICE Trans. Commun. 95-B(5): 1819-1821 (2012) - [j17]You-Seok Lee, Young-Jun Lee, Dong-Guk Han, Howon Kim, Hyoung-Nam Kim:
Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(6): 1091-1094 (2012) - [c20]Min-Ku Kim, Dong-Guk Han, Jeong Choon Ryoo, Okyeon Yi:
CPA performance enhancement based on spectrogram. ICCST 2012: 195-200 - [c19]Aesun Park, Dong-Guk Han, Jeong Choon Ryoo:
CPA performance comparison based on Wavelet Transform. ICCST 2012: 201-206 - 2011
- [j16]HeeSeok Kim, Dong-Guk Han, Seokhie Hong:
First-order side channel attacks on Zhang's countermeasures. Inf. Sci. 181(18): 4051-4060 (2011) - [j15]Sung-Kyoung Kim, Tae Hyun Kim, Dong-Guk Han, Seokhie Hong:
An efficient CRT-RSA algorithm secure against power and fault attacks. J. Syst. Softw. 84(10): 1660-1669 (2011) - [c18]Jong-Yeon Park, Okyeon Yi, Dong-Guk Han, Dooho Choi:
Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT. ICCST 2011: 1-5 - 2010
- [j14]Nam Su Chang, Tae Hyun Kim, Chang Han Kim, Dong-Guk Han, Jongin Lim:
A new bit-serial multiplier over GF(pm) using irreducible trinomials. Comput. Math. Appl. 60(2): 355-361 (2010) - [j13]Mun-Kyu Lee, Jeong Eun Song, Dooho Choi, Dong-Guk Han:
Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 153-163 (2010) - [j12]Sung Jae Lee, Seog Chung Seo, Dong-Guk Han, Seokhie Hong, Sangjin Lee:
Acceleration of Differential Power Analysis through the Parallel Use of GPU and CPU. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(9): 1688-1692 (2010)
2000 – 2009
- 2009
- [j11]Masaaki Shirase, Yukinori Miyazaki, Tsuyoshi Takagi, Dong-Guk Han, Dooho Choi:
Efficient Implementation of Pairing-Based Cryptography on a Sensor Node. IEICE Trans. Inf. Syst. 92-D(5): 909-917 (2009) - [j10]Seog Chung Seo, Dong-Guk Han, Seokhie Hong:
TinyECCK16: An Efficient Field Multiplication Algorithm on 16-bit Environment and Its Application to Tmote Sky Sensor Motes. IEICE Trans. Inf. Syst. 92-D(5): 918-928 (2009) - [j9]You Sung Kang, Dooho Choi, Byung-Ho Chung, Hyun Sook Cho, Dong-Guk Han:
Efficient key detection method in the correlation electromagnetic analysis using peak selection algorithm. J. Commun. Networks 11(6): 556-563 (2009) - [j8]Dong-Guk Han, Dooho Choi, Howon Kim:
Improved Computation of Square Roots in Specific Finite Fields. IEEE Trans. Computers 58(2): 188-196 (2009) - 2008
- [j7]Seog Chung Seo, Dong-Guk Han, Hyung Chan Kim, Seokhie Hong:
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote. IEICE Trans. Inf. Syst. 91-D(5): 1338-1347 (2008) - [j6]Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Howon Kim, Tsuyoshi Takagi:
A More Compact Representation of XTR Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 2843-2850 (2008) - [j5]Dooho Choi, Dong-Guk Han, Howon Kim:
Construction of efficient and secure pairing algorithm and its application. J. Commun. Networks 10(4): 437-443 (2008) - [j4]Jeong Choon Ryoo, Dong-Guk Han, Sung-Kyoung Kim, Sangjin Lee:
Performance Enhancement of Differential Power Analysis Attacks With Signal Companding Methods. IEEE Signal Process. Lett. 15: 625-628 (2008) - [c17]You-Seok Lee, YongJe Choi, Dong-Guk Han, Ho Won Kim, Hyoung-Nam Kim:
A nobel key-search method for side channel attacks based on pattern recognition. ICASSP 2008: 1773-1776 - [i7]Seog Chung Seo, Dong-Guk Han, Seokhie Hong:
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-bit MICAz Mote. IACR Cryptol. ePrint Arch. 2008: 122 (2008) - 2007
- [c16]Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi:
Compressed XTR. ACNS 2007: 420-431 - [c15]Sung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim:
SPA Countermeasure Based on Unsigned Left-to-Right Recodings. ATC 2007: 286-295 - [c14]Dong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim:
Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. ISPEC 2007: 238-253 - [c13]HeeSeok Kim, Tae Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim:
Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. WISTP 2007: 39-52 - [i6]Dooho Choi, Dong-Guk Han, Howon Kim:
Construction of Efficient and Secure Pairing Algorithm and its Application. IACR Cryptol. ePrint Arch. 2007: 296 (2007) - 2006
- [j3]Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim, Yoon Sung Hwang, Beomin Kim, Young-Ho Park:
Enhanced Exhaustive Search Attack on Randomized BSD Type Countermeasure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(5): 1316-1327 (2006) - [c12]Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim:
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. CANS 2006: 168-181 - [c11]Tae Hyun Kim, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim:
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. CARDIS 2006: 119-134 - [c10]Dong-Guk Han, Tsuyoshi Takagi, Howon Kim, Kyoil Chung:
New Security Problem in RFID Systems "Tag Killing". ICCSA (3) 2006: 375-384 - [c9]Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim:
Further Security Analysis of XTR. ISPEC 2006: 33-44 - [i5]Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim:
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. IACR Cryptol. ePrint Arch. 2006: 243 (2006) - 2005
- [j2]Katsuyuki Okeya, Dong-Guk Han:
Cryptanalysis of Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(5): 1140-1147 (2005) - [j1]Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai:
Side Channel Cryptanalysis on XTR Public Key Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(5): 1214-1223 (2005) - [c8]Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Howon Kim, Kyoil Chung:
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. EUC Workshops 2005: 864-873 - [i4]Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyoil Chung:
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. IACR Cryptol. ePrint Arch. 2005: 316 (2005) - [i3]Dong-Guk Han, Tetsuya Izu, Tsuyoshi Takagi:
Some Explicit Formulae of NAF and its Left-to-Right Analogue. IACR Cryptol. ePrint Arch. 2005: 384 (2005) - [i2]Dong-Guk Han, Tsuyoshi Takagi:
Some Analysis of Radix-r Representations. IACR Cryptol. ePrint Arch. 2005: 402 (2005) - 2004
- [c7]Dong-Guk Han, Jongin Lim, Kouichi Sakurai:
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. ACISP 2004: 454-465 - [c6]Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung:
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. ACNS 2004: 398-413 - [c5]Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai:
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. ICICS 2004: 305-317 - [i1]Dong-Guk Han, Jongin Lim, Kouichi Sakurai:
On security of XTR public key cryptosystems against Side Channel Attacks. IACR Cryptol. ePrint Arch. 2004: 123 (2004) - 2003
- [c4]Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park, Chang Han Kim, Heuisu Ryu:
Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains. ACISP 2003: 67-78 - [c3]Katsuyuki Okeya, Dong-Guk Han:
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. INDOCRYPT 2003: 334-348 - 2002
- [c2]Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyungjin Yang:
A Practical Approach Defeating Blackmailing. ACISP 2002: 464-481 - [c1]Dong-Guk Han, Ki Soon Yoon, Young-Ho Park, Chang Han Kim, Jongin Lim:
Optimal Extension Fields for XTR. Selected Areas in Cryptography 2002: 369-384
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint