default search action
Lars R. Knudsen
Person information
- affiliation: Technical University of Denmark
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j30]Samir Hodzic, Lars R. Knudsen:
A quantum distinguisher for 7/8-round SMS4 block cipher. Quantum Inf. Process. 19(11): 411 (2020) - [c68]Samir Hodzic, Lars Ramkilde Knudsen, Andreas Brasen Kidmose:
On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability. PQCrypto 2020: 461-480
2010 – 2019
- 2017
- [j29]Christina Boura, Anne Canteaut, Lars R. Knudsen, Gregor Leander:
Reflection ciphers. Des. Codes Cryptogr. 82(1-2): 3-25 (2017) - 2016
- [j28]Praveen Gauravaram, Nasour Bagheri, Lars R. Knudsen:
Building indifferentiable compression functions from the PGV compression functions. Des. Codes Cryptogr. 78(2): 547-581 (2016) - [e4]Enes Pasalic, Lars R. Knudsen:
Cryptography and Information Security in the Balkans - Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9540, Springer 2016, ISBN 978-3-319-29171-0 [contents] - 2015
- [c67]Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen:
Security of the AES with a Secret S-Box. FSE 2015: 175-189 - [i9]Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen:
Security of the AES with a Secret S-box. IACR Cryptol. ePrint Arch. 2015: 144 (2015) - 2014
- [j27]Lars R. Knudsen:
Dynamic Encryption. J. Cyber Secur. Mobil. 3(4): 357-370 (2014) - 2013
- [j26]Julia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen:
Slender-Set Differential Cryptanalysis. J. Cryptol. 26(1): 11-38 (2013) - [e3]Lars R. Knudsen, Huapeng Wu:
Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7707, Springer 2013, ISBN 978-3-642-35998-9 [contents] - 2012
- [j25]Nasour Bagheri, Praveen Gauravaram, Lars R. Knudsen, Erik Zenner:
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis. Int. J. Inf. Sec. 11(6): 419-434 (2012) - [j24]Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre:
On-line Ciphers and the Hash-CBC Constructions. J. Cryptol. 25(4): 640-679 (2012) - [j23]Praveen Gauravaram, Lars R. Knudsen:
Security Analysis of Randomize-Hash-then-Sign Digital Signatures. J. Cryptol. 25(4): 748-779 (2012) - [c66]Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract. ASIACRYPT 2012: 208-225 - [c65]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, François-Xavier Standaert, John P. Steinberger, Elmar Tischhauser:
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract). EUROCRYPT 2012: 45-62 - [i8]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, François-Xavier Standaert, John P. Steinberger, Elmar Tischhauser:
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations. IACR Cryptol. ePrint Arch. 2012: 35 (2012) - [i7]Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version). IACR Cryptol. ePrint Arch. 2012: 529 (2012) - 2011
- [b1]Lars R. Knudsen, Matthew Robshaw:
The Block Cipher Companion. Information Security and Cryptography, Springer 2011, ISBN 978-3-642-17341-7, pp. I-XIV, 1-267 - [c64]Praveen Gauravaram, Lars R. Knudsen, Nasour Bagheri, Lei Wei:
Improved Security Analysis of Fugue-256 (Poster). ACISP 2011: 428-432 - [c63]Julia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen:
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes. FSE 2011: 270-289 - [r8]Lars R. Knudsen:
Block Ciphers. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 152-157 - [r7]Lars R. Knudsen, Gregor Leander:
C2 - Block Cipher. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 179-180 - [r6]Lars R. Knudsen:
CLEFIA. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 210-211 - [r5]Lars R. Knudsen:
Luby-Rackoff Ciphers. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 736-737 - [r4]Lars R. Knudsen, Gregor Leander:
PRESENT - Block Cipher. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 953-955 - [r3]Praveen Gauravaram, Lars R. Knudsen:
Cryptographic Hash Functions. Encyclopedia of Information Assurance 2011 - 2010
- [j22]Lars R. Knudsen, Charlotte V. Miolane:
Counting equations in algebraic attacks on block ciphers. Int. J. Inf. Sec. 9(2): 127-135 (2010) - [j21]Praveen Gauravaram, John Kelsey, Lars R. Knudsen, Søren S. Thomsen:
On hash functions using checksums. Int. J. Inf. Sec. 9(2): 137-151 (2010) - [j20]Lars R. Knudsen, John Erik Mathiassen, Frédéric Muller, Søren S. Thomsen:
Cryptanalysis of MD2. J. Cryptol. 23(1): 72-90 (2010) - [c62]Jean-Philippe Aumasson, Emilia Käsper, Lars R. Knudsen, Krystian Matusiewicz, Rune Steinsmo Ødegård, Thomas Peyrin, Martin Schläffer:
Distinguishers for the Compression Function and Output Transformation of Hamsi-256. ACISP 2010: 87-103 - [c61]Lars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw:
PRINTcipher: A Block Cipher for IC-Printing. CHES 2010: 16-32 - [c60]Julia Borghoff, Lars R. Knudsen, Krystian Matusiewicz:
Hill Climbing Algorithms and Trivium. Selected Areas in Cryptography 2010: 57-73 - [p1]Praveen Gauravaram, Lars R. Knudsen:
Cryptographic Hash Functions. Handbook of Information and Communication Security 2010: 59-79 - [i6]Jean-Philippe Aumasson, Emilia Käsper, Lars R. Knudsen, Krystian Matusiewicz, Rune Steinsmo Ødegård, Thomas Peyrin, Martin Schläffer:
Distinguishers for the Compression Function and Output Transformation of Hamsi-256. IACR Cryptol. ePrint Arch. 2010: 91 (2010) - [i5]Julia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen:
Cryptanalysis of PRESENT-like ciphers with secret S-boxes. IACR Cryptol. ePrint Arch. 2010: 574 (2010)
2000 – 2009
- 2009
- [j19]Nasour Bagheri, Lars R. Knudsen, Majid Naderi, Søren S. Thomsen:
Hash Functions and Information Theoretic Security. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(12): 3401-3403 (2009) - [j18]Nasour Bagheri, Matt Henricksen, Lars R. Knudsen, Majid Naderi, B. Sadeghyian:
Cryptanalysis of an iterated halving-based hash function: CRUSH. IET Inf. Secur. 3(4): 129-138 (2009) - [c59]Julia Borghoff, Lars R. Knudsen, Gregor Leander, Krystian Matusiewicz:
Cryptanalysis of C2. CRYPTO 2009: 250-266 - [c58]Praveen Gauravaram, Lars R. Knudsen:
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. EUROCRYPT 2009: 88-105 - [c57]Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen:
Cryptanalysis of MDC-2. EUROCRYPT 2009: 106-120 - [c56]Julia Borghoff, Lars R. Knudsen, Mathias Stolpe:
Bivium as a Mixed-Integer Linear Programming Problem. IMACC 2009: 133-152 - [c55]Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang:
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384. Selected Areas in Cryptography 2009: 141-156 - [i4]Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
Grøstl - a SHA-3 candidate. Symmetric Cryptography 2009 - [i3]Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang:
Practical pseudo-collisions for hash functions ARIRANG-224/384. IACR Cryptol. ePrint Arch. 2009: 197 (2009) - 2008
- [c54]Ivan Damgård, Lars R. Knudsen, Søren S. Thomsen:
Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. ACNS 2008: 144-155 - 2007
- [c53]Lars R. Knudsen, Vincent Rijmen:
Known-Key Distinguishers for Some Block Ciphers. ASIACRYPT 2007: 315-324 - [c52]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, C. Vikkelsoe:
PRESENT: An Ultra-Lightweight Block Cipher. CHES 2007: 450-466 - [c51]Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen:
The Grindahl Hash Functions. FSE 2007: 39-57 - [c50]Matthew Henricksen, Lars R. Knudsen:
Cryptanalysis of the CRUSH Hash Function. Selected Areas in Cryptography 2007: 74-83 - [i2]Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre:
On-Line Ciphers and the Hash-CBC Constructions. IACR Cryptol. ePrint Arch. 2007: 197 (2007) - 2006
- [j17]Lars R. Knudsen:
Small Size Hashes with Enhanced Security. Int. J. Netw. Secur. 2(1): 41-42 (2006) - [c49]Lars R. Knudsen, Søren S. Thomsen:
Proposals for Iterated Hash Functions. ICETE (Selected Papers) 2006: 107-118 - [c48]Lars R. Knudsen, Søren S. Thomsen:
Proposals for Iterated Hash Functions. SECRYPT 2006: 246-253 - 2005
- [j16]Lars R. Knudsen, Chris J. Mitchell:
Partial Key Recovery Attack Against RMAC. J. Cryptol. 18(4): 375-389 (2005) - [c47]Lars R. Knudsen, Frédéric Muller:
Some Attacks Against a Double Length Hash Proposal. ASIACRYPT 2005: 462-473 - [c46]Lars R. Knudsen:
SMASH - A Cryptographic Hash Function. FSE 2005: 228-242 - [c45]Lars R. Knudsen, John Erik Mathiassen:
Preimage and Collision Attacks on MD2. FSE 2005: 255-267 - [r2]Lars R. Knudsen:
Block ciphers. Encyclopedia of Cryptography and Security 2005 - [r1]Lars R. Knudsen:
Luby-Rackoff Ciphers. Encyclopedia of Cryptography and Security 2005 - [i1]Lars R. Knudsen:
Some properties of an FSE 2005 Hash Proposal. IACR Cryptol. ePrint Arch. 2005: 82 (2005) - 2004
- [c44]Hans Dobbertin, Lars R. Knudsen, Matthew J. B. Robshaw:
The Cryptanalysis of the AES - A Brief Survey. AES Conference 2004: 1-10 - [c43]Lars R. Knudsen, John Erik Mathiassen:
On the Role of Key Schedules in Attacks on Iterated Ciphers. ESORICS 2004: 322-334 - 2003
- [j15]Lars R. Knudsen, Chris J. Mitchell:
Analysis of 3gpp-MAC and Two-key 3gpp-MAC. Discret. Appl. Math. 128(1): 181-191 (2003) - [c42]Lars R. Knudsen, Tadayoshi Kohno:
Analysis of RMAC. FSE 2003: 182-191 - 2002
- [j14]Eli Biham, Lars R. Knudsen:
Cryptanalysis of the ANSI X9.52 CBCM Mode. J. Cryptol. 15(1): 47-59 (2002) - [j13]Lars R. Knudsen:
The Security of Feistel Ciphers with Six Rounds or Less. J. Cryptol. 15(3): 207-222 (2002) - [j12]Lars R. Knudsen, Bart Preneel:
Construction of secure and fast hash functions using nonbinary error-correcting codes. IEEE Trans. Inf. Theory 48(9): 2524-2539 (2002) - [c41]Lars R. Knudsen, David A. Wagner:
Integral Cryptanalysis. FSE 2002: 112-127 - [e2]Lars R. Knudsen:
Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings. Lecture Notes in Computer Science 2332, Springer 2002, ISBN 3-540-43553-0 [contents] - 2001
- [j11]Lars R. Knudsen, David A. Wagner:
On the structure of Skipjack. Discret. Appl. Math. 111(1-2): 103-116 (2001) - [j10]Joan Daemen, Lars R. Knudsen, Vincent Rijmen:
Linear Frameworks for Block Ciphers. Des. Codes Cryptogr. 22(1): 65-87 (2001) - [j9]Lars R. Knudsen, Chris J. Mitchell:
An analysis of the 3gpp-MAC scheme. Electron. Notes Discret. Math. 6: 346-355 (2001) - [j8]Thomas Jakobsen, Lars R. Knudsen:
Attacks on Block Ciphers of Low Algebraic Degree. J. Cryptol. 14(3): 197-210 (2001) - [c40]Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre:
Online Ciphers and the Hash-CBC Construction. CRYPTO 2001: 292-309 - [c39]Helena Handschuh, Lars R. Knudsen, Matthew J. B. Robshaw:
Analysis of SHA-1 in Encryption Mode. CT-RSA 2001: 70-83 - [c38]Håvard Raddum, Lars R. Knudsen:
A Differential Attack on Reduced-Round SC2000. Selected Areas in Cryptography 2001: 190-198 - 2000
- [j7]Lars R. Knudsen, Vincent Rijmen:
Ciphertext-only Attack on Akelarre. Cryptologia 24(2): 135-147 (2000) - [j6]Lars R. Knudsen:
A Detailed Analysis of SAFER K. J. Cryptol. 13(4): 417-436 (2000) - [c37]Ross J. Anderson, Eli Biham, Lars R. Knudsen:
The Case for Serpent. AES Candidate Conference 2000: 349-354 - [c36]Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell:
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. CRYPTO 2000: 184-196 - [c35]Lars R. Knudsen, Willi Meier:
Correlations in RC6 with a Reduced Number of Rounds. FSE 2000: 94-108 - [c34]Lars R. Knudsen, John Erik Mathiassen:
A Chosen-Plaintext Linear Attack on DES. FSE 2000: 262-272
1990 – 1999
- 1999
- [c33]Lars R. Knudsen, Matthew J. B. Robshaw, David A. Wagner:
Truncated Differentials and Skipjack. CRYPTO 1999: 165-180 - [c32]Lars R. Knudsen, Willi Meier:
Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. EUROCRYPT 1999: 363-374 - [c31]Lars R. Knudsen, Vincent Rijmen:
On the Decorrelated Fast Cipher (DFC) and Its Theory. FSE 1999: 81-94 - [c30]Lars R. Knudsen:
Advanced Encryption Standard (AES) - An Update. IMACC 1999: 185 - [e1]Lars R. Knudsen:
Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings. Lecture Notes in Computer Science 1636, Springer 1999, ISBN 3-540-66226-X [contents] - 1998
- [j5]Lars R. Knudsen, Keith M. Martin:
In Search of Multiple Domain Key Recovery. J. Comput. Secur. 6(4): 219-236 (1998) - [j4]Lars R. Knudsen, Xuejia Lai, Bart Preneel:
Attacks on Fast Double Block Length Hash Functions. J. Cryptol. 11(1): 59-72 (1998) - [j3]Ivan Damgård, Lars R. Knudsen:
Two-Key Triple Encryption. J. Cryptol. 11(3): 209-218 (1998) - [c29]Lars R. Knudsen:
Contemporary Block Ciphers. Lectures on Data Security 1998: 105-126 - [c28]Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege:
Analysis Methods for (Alleged) RC4. ASIACRYPT 1998: 327-341 - [c27]Ross J. Anderson, Eli Biham, Lars R. Knudsen:
Serpent and Smartcards. CARDIS 1998: 246-253 - [c26]Eli Biham, Lars R. Knudsen:
Cryptanalysis of the ANSI X9.52 CBCM Mode. EUROCRYPT 1998: 100-111 - [c25]Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw:
On the Design and Security of RC2. FSE 1998: 206-221 - [c24]Eli Biham, Ross J. Anderson, Lars R. Knudsen:
Serpent: A New Block Cipher Proposal. FSE 1998: 222-238 - [c23]Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen:
Differential Cryptanalysis of the ICE Encryption Algorithm. FSE 1998: 270-283 - 1997
- [j2]Lars R. Knudsen, Willi Meier:
Differential cryptanalysis of RC5. Eur. Trans. Telecommun. 8(5): 445-454 (1997) - [c22]Lars R. Knudsen:
Block Ciphers - A Survey. State of the Art in Applied Cryptography 1997: 18-48 - [c21]Lars R. Knudsen, Bart Preneel:
Fast and Secure Hashing Based on Codes. CRYPTO 1997: 485-498 - [c20]Johan Borst, Lars R. Knudsen, Vincent Rijmen:
Two Attacks on Reduced IDEA. EUROCRYPT 1997: 1-13 - [c19]Thomas Jakobsen, Lars R. Knudsen:
The Interpolation Attack on Block Ciphers. FSE 1997: 28-40 - [c18]Joan Daemen, Lars R. Knudsen, Vincent Rijmen:
The Block Cipher Square. FSE 1997: 149-165 - 1996
- [c17]Lars R. Knudsen, Bart Preneel:
Hash Functions Based on Block Ciphers and Quaternary Codes. ASIACRYPT 1996: 77-90 - [c16]Lars R. Knudsen, Willi Meier:
Improved Differential Attacks on RC5. CRYPTO 1996: 216-228 - [c15]Lars R. Knudsen, Matthew J. B. Robshaw:
Non-Linear Approximations in Linear Cryptanalysis. EUROCRYPT 1996: 224-236 - [c14]Lars R. Knudsen, Torben P. Pedersen:
On the Difficulty of Software Key Escrow. EUROCRYPT 1996: 237-244 - [c13]Lars R. Knudsen, Thomas A. Berson:
Truncated Differentials of SAFER. FSE 1996: 15-26 - 1995
- [j1]Kaisa Nyberg, Lars R. Knudsen:
Provable Security Against a Differential Attack. J. Cryptol. 8(1): 27-37 (1995) - [c12]Ivan Damgård, Lars R. Knudsen:
Multiple Encryption with Minimum Key. Cryptography: Policy and Algorithms 1995: 156-164 - [c11]Lars R. Knudsen:
A Key-schedule Weakness in SAFER K-64. CRYPTO 1995: 274-286 - 1994
- [c10]Lars R. Knudsen, Xuejia Lai:
New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM. EUROCRYPT 1994: 410-418 - [c9]Lars R. Knudsen:
New Potentially 'Weak' Keys for DES and LOKI (Extended Abstract). EUROCRYPT 1994: 419-424 - [c8]Lars R. Knudsen:
Truncated and Higher Order Differentials. FSE 1994: 196-211 - 1993
- [c7]Ivan Damgård, Lars R. Knudsen:
The Breaking of the AR Hash Function. EUROCRYPT 1993: 286-292 - [c6]Xuejia Lai, Lars R. Knudsen:
Attacks on Double Block Length Hash Functions. FSE 1993: 157-165 - [c5]Lars R. Knudsen:
Practically Secure Feistel Cyphers. FSE 1993: 211-221 - 1992
- [c4]Lars R. Knudsen:
Cryptanalysis of LOKI91. AUSCRYPT 1992: 196-208 - [c3]Lars R. Knudsen:
Iterative Characteristics of DES and s²-DES. CRYPTO 1992: 497-511 - [c2]Kaisa Nyberg, Lars R. Knudsen:
Provable Security Against Differential Cryptanalysis. CRYPTO 1992: 566-574 - 1991
- [c1]Lars R. Knudsen:
Cryptanalysis of LOKI. ASIACRYPT 1991: 22-35
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint