default search action
Takanori Isobe 0001
Person information
- affiliation: University of Hyogo, Japan
- unicode name: 五十部 孝典
Other persons with the same name
- Takanori Isobe 0002 — University of Tsukuba, Faculty of Pure and Applied Sciences, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j73]Shion Utsumi, Kosei Sakamoto, Takanori Isobe:
SAT-Based Analysis of Related-Key Impossible Distinguishers on Piccolo and (Tweakable) TWINE. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(8): 1186-1195 (2024) - [j72]Nobuyuki Takeuchi, Kosei Sakamoto, Takuro Shiraya, Takanori Isobe:
Improving the Security Bounds against Differential Attacks for Pholkos Family. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(8): 1196-1204 (2024) - [j71]Ravi Anand, Rimpa Nandi, Takanori Isobe:
Analysis of Atom against quantum attacks. IET Quantum Commun. 5(1): 88-102 (2024) - [j70]Shion Utsumi, Motoki Nakahashi, Kosei Sakamoto, Takanori Isobe:
Exploring the optimality of byte-wise permutations of a piccolo-type block cipher. Inf. Process. Lett. 184: 106436 (2024) - [j69]Satyam Kumar, Sandip Kumar Mondal, Santanu Sarkar, Takanori Isobe, Anubhab Baksi, Avishek Adhikari:
Restricted near collision attack on Plantlet. J. Cryptogr. Eng. 14(1): 19-34 (2024) - [j68]Ravi Anand, Takanori Isobe, Anup Kumar Kundu, Mostafizar Rahman, Sahiba Suryawanshi:
Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers - Rocca, Rocca-S and AEGIS. J. Cryptogr. Eng. 14(4): 595-607 (2024) - [j67]Shogo Shiraki, Hayato Kimura, Takanori Isobe:
Looking Further into the Security of End-to-End Encryption of SFrame. J. Inf. Process. 32: 679-689 (2024) - [j66]Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto:
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 545-587 (2024) - [j65]Libo Wang, Ling Song, Baofeng Wu, Mostafizar Rahman, Takanori Isobe:
Revisiting the Boomerang Attack From a Perspective of 3-Differential. IEEE Trans. Inf. Theory 70(7): 5343-5357 (2024) - [j64]Patrick Derbez, Pierre-Alain Fouque, Takanori Isobe, Mostafizar Rahman, André Schrottenloher:
Key Committing Attacks against AES-based AEAD Schemes. IACR Trans. Symmetric Cryptol. 2024(1): 135-157 (2024) - [c63]Rikuto Kurahara, Kosei Sakamoto, Yuto Nakano, Takanori Isobe:
Differential Distinguishing Attacks on SNOW-V, SNOW-Vi and KCipher-2. ACISP (1) 2024: 77-97 - [c62]Kodai Taiyama, Kosei Sakamoto, Rentaro Shiba, Takanori Isobe:
Collision Attacks on Hashing Modes of Areion. CANS (2) 2024: 265-285 - [c61]Ravi Anand, Shibam Ghosh, Takanori Isobe, Rentaro Shiba:
Quantum Key Recovery Attacks on 4-Round Iterated Even-Mansour with Two Keys. ISC (1) 2024: 87-103 - [c60]Takuro Shiraya, Kosei Sakamoto, Takanori Isobe:
Bit-Wise Analysis for Forgery Attacks on AES-Based AEAD Schemes. IWSEC 2024: 3-22 - [i57]Ravi Anand, Shibam Ghosh, Takanori Isobe, Rentaro Shiba:
Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys. IACR Cryptol. ePrint Arch. 2024: 1278 (2024) - [i56]Kodai Taiyama, Kosei Sakamoto, Ryoma Ito, Kazuma Taka, Takanori Isobe:
Key Collisions on AES and Its Applications. IACR Cryptol. ePrint Arch. 2024: 1508 (2024) - 2023
- [j63]Nobuyuki Takeuchi, Kosei Sakamoto, Takanori Isobe:
On Optimality of the Round Function of Rocca. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(1): 45-53 (2023) - [j62]Nobuyuki Takeuchi, Kosei Sakamoto, Takanori Isobe:
Security Evaluation of Initialization Phases and Round Functions of Rocca and AEGIS. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 253-262 (2023) - [j61]Takaki Asanuma, Takanori Isobe:
mPoW: How to Make Proof of Work Meaningful. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 333-340 (2023) - [j60]Rentaro Shiba, Ravi Anand, Kazuhiko Minematsu, Takanori Isobe:
Cubicle: A family of space-hard ciphers for IoT. IET Inf. Secur. 17(1): 131-146 (2023) - [j59]Takuro Shiraya, Nobuyuki Takeuchi, Kosei Sakamoto, Takanori Isobe:
MILP-based security evaluation for AEGIS/Tiaoxin-346/Rocca. IET Inf. Secur. 17(3): 458-467 (2023) - [j58]Shion Utsumi, Kosei Sakamoto, Takanori Isobe:
Bit-level evaluation of piccolo block cipher by satisfiability problem solver. IET Inf. Secur. 17(4): 616-625 (2023) - [j57]Takaki Asanuma, Takanori Isobe:
Even-Mansour Space-hard Cipher: White-box Cryptography Cipher Meets Physically Unclonable Function. J. Inf. Process. 31: 88-96 (2023) - [j56]Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu:
Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend. J. Inf. Process. 31: 523-536 (2023) - [j55]Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi:
A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers. J. Inf. Process. 31: 550-561 (2023) - [j54]Ravi Anand, Takanori Isobe:
Quantum security analysis of Rocca. Quantum Inf. Process. 22(4): 164 (2023) - [j53]Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba:
Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 115-154 (2023) - [c59]Motoki Nakahashi, Rentaro Shiba, Ravi Anand, Mostafizar Rahman, Kosei Sakamoto, Fukang Liu, Takanori Isobe:
Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security. ACISP 2023: 403-430 - [c58]Fukang Liu, Lorenzo Grassi, Clémence Bouvier, Willi Meier, Takanori Isobe:
Coefficient Grouping for Complex Affine Layers. CRYPTO (3) 2023: 540-572 - [c57]Kazuma Taka, Tatsuya Ishikawa, Kosei Sakamoto, Takanori Isobe:
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros. CT-RSA 2023: 277-304 - [c56]Ravi Anand, Subhadeep Banik, Andrea Caforio, Kazuhide Fukushima, Takanori Isobe, Shinsaku Kiyomoto, Fukang Liu, Yuto Nakano, Kosei Sakamoto, Nobuyuki Takeuchi:
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation. ESORICS (1) 2023: 229-248 - [c55]Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe:
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP. EUROCRYPT (4) 2023: 189-219 - [c54]Fukang Liu, Ravi Anand, Libo Wang, Willi Meier, Takanori Isobe:
Coefficient Grouping: Breaking Chaghri and More. EUROCRYPT (4) 2023: 287-317 - [c53]Kosei Sakamoto, Ryoma Ito, Takanori Isobe:
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications. SAC 2023: 409-428 - [i55]Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe:
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP. IACR Cryptol. ePrint Arch. 2023: 277 (2023) - [i54]Kazuma Taka, Tatsuya Ishikawa, Kosei Sakamoto, Takanori Isobe:
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros. IACR Cryptol. ePrint Arch. 2023: 674 (2023) - [i53]Manas Wadhwa, Anubhab Baksi, Kai Hu, Anupam Chattopadhyay, Takanori Isobe, Dhiman Saha:
Finding Desirable Substitution Box with SASQUATCH. IACR Cryptol. ePrint Arch. 2023: 742 (2023) - [i52]Anubhab Baksi, Jakub Breier, Anupam Chattopadhyay, Tomas Gerlich, Sylvain Guilley, Naina Gupta, Kai Hu, Takanori Isobe, Arpan Jati, Petr Jedlicka, Hyunjun Kim, Fukang Liu, Zdenek Martinasek, Kosei Sakamoto, Hwajeong Seo, Rentaro Shiba, Ritu Ranjan Shrivastwa:
BAKSHEESH: Similar Yet Different From GIFT. IACR Cryptol. ePrint Arch. 2023: 750 (2023) - [i51]Fukang Liu, Lorenzo Grassi, Clémence Bouvier, Willi Meier, Takanori Isobe:
Coefficient Grouping for Complex Affine Layers. IACR Cryptol. ePrint Arch. 2023: 782 (2023) - [i50]Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba:
Areion: Highly-Efficient Permutations and Its Applications (Extended Version). IACR Cryptol. ePrint Arch. 2023: 794 (2023) - [i49]Kosei Sakamoto, Ryoma Ito, Takanori Isobe:
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications. IACR Cryptol. ePrint Arch. 2023: 1227 (2023) - [i48]Takanori Isobe, Mostafizar Rahman:
Key Committing Security Analysis of AEGIS. IACR Cryptol. ePrint Arch. 2023: 1495 (2023) - [i47]Libo Wang, Ling Song, Baofeng Wu, Mostafizar Rahman, Takanori Isobe:
Revisiting the Boomerang Attack from a Perspective of 3-differential. IACR Cryptol. ePrint Arch. 2023: 1689 (2023) - 2022
- [j52]Kazuto Shimizu, Kosei Sakamoto, Takanori Isobe:
Applying Byte-Shuffling to CLEFIA-Type Structure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 268-277 (2022) - [j51]Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Takanori Isobe:
Design of a Linear Layer for a Block Cipher Based on Type-2 Generalized Feistel Network with 32 Branches. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 278-288 (2022) - [j50]Takaki Asanuma, Takanori Isobe:
A Proof of Work Based on Key Recovery Problem of Cascade Block Ciphers with ASIC Resistance. IEICE Trans. Inf. Syst. 105-D(2): 248-255 (2022) - [j49]Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu, Takanori Isobe:
Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC. IET Inf. Secur. 16(2): 75-85 (2022) - [j48]Rentaro Shiba, Kosei Sakamoto, Takanori Isobe:
Efficient constructions for large-state block ciphers based on AES New Instructions. IET Inf. Secur. 16(3): 145-160 (2022) - [j47]Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto:
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi. J. Inf. Secur. Appl. 65: 103100 (2022) - [j46]Takaki Asanuma, Takanori Isobe:
A Proof of Work based on Preimage Problem of Variants of SHA-3 with ASIC Resistance. J. Inf. Process. 30: 75-83 (2022) - [j45]Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
The Inverse of χ and Its Applications to Rasta-Like Ciphers. J. Cryptol. 35(4): 28 (2022) - [j44]Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe:
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting. IACR Trans. Symmetric Cryptol. 2022(3): 102-122 (2022) - [j43]Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe:
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences. IACR Trans. Symmetric Cryptol. 2022(3): 152-190 (2022) - [j42]Yosuke Todo, Takanori Isobe:
Hybrid Code Lifting on Space-Hard Block Ciphers Application to Yoroi and SPNbox. IACR Trans. Symmetric Cryptol. 2022(3): 368-402 (2022) - [c52]Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi:
Output Prediction Attacks on Block Ciphers Using Deep Learning. ACNS Workshops 2022: 248-276 - [c51]Fukang Liu, Santanu Sarkar, Gaoli Wang, Willi Meier, Takanori Isobe:
Algebraic Meet-in-the-Middle Attack on LowMC. ASIACRYPT (1) 2022: 225-255 - [c50]Akinori Hosoyamada, Takanori Isobe, Yosuke Todo, Kan Yasuda:
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs. ASIACRYPT (2) 2022: 585-619 - [c49]Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe, Mridul Nandi:
Big Brother Is Watching You: A Closer Look at Backdoor Construction. SPACE 2022: 81-96 - [e1]Takanori Isobe, Santanu Sarkar:
Progress in Cryptology - INDOCRYPT 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings. Lecture Notes in Computer Science 13774, Springer 2022, ISBN 978-3-031-22911-4 [contents] - [i46]Fukang Liu, Gaoli Wang, Willi Meier, Santanu Sarkar, Takanori Isobe:
Algebraic Meet-in-the-Middle Attack on LowMC. IACR Cryptol. ePrint Arch. 2022: 19 (2022) - [i45]Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe:
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version). IACR Cryptol. ePrint Arch. 2022: 116 (2022) - [i44]Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
The Inverse of χ and Its Applications to Rasta-like Ciphers. IACR Cryptol. ePrint Arch. 2022: 399 (2022) - [i43]Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe, Mridul Nandi:
Big Brother Is Watching You: A Closer Look At Backdoor Construction. IACR Cryptol. ePrint Arch. 2022: 953 (2022) - [i42]Fukang Liu, Ravi Anand, Libo Wang, Willi Meier, Takanori Isobe:
Coefficient Grouping: Breaking Chaghri and More. IACR Cryptol. ePrint Arch. 2022: 991 (2022) - [i41]Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe:
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting. IACR Cryptol. ePrint Arch. 2022: 1022 (2022) - [i40]Akinori Hosoyamada, Takanori Isobe, Yosuke Todo, Kan Yasuda:
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs. IACR Cryptol. ePrint Arch. 2022: 1253 (2022) - 2021
- [j41]Takanori Isobe, Ryoma Ito:
Security Analysis of End-to-End Encryption for Zoom Meetings. IEEE Access 9: 90677-90689 (2021) - [j40]Yuji Koike, Takuya Hayashi, Jun Kurihara, Takanori Isobe:
Virtual Vault: A Practical Leakage Resilient Scheme Using Space-Hard Ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 182-189 (2021) - [j39]Jin Hoki, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu, Takanori Isobe:
MILP-Aided Security Evaluation of Differential Attacks on KCipher-2. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 203-212 (2021) - [j38]Subhadeep Banik, Yuki Funabiki, Takanori Isobe:
Further Results on Efficient Implementations of Block Cipher Linear Layers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 213-225 (2021) - [j37]Jin Hoki, Kosei Sakamoto, Kazuhiko Minematsu, Takanori Isobe:
Practical Integral Distinguishers on SNOW 3G and KCipher-2. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(11): 1603-1611 (2021) - [j36]Ryoma Ito, Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Takanori Isobe:
Bit-wise cryptanalysis on AND-RX permutation Friet-PC. J. Inf. Secur. Appl. 59: 102860 (2021) - [j35]Yuji Koike, Takanori Isobe:
Yoroi: Updatable Whitebox Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 587-617 (2021) - [j34]Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar:
Atom: A Stream Cipher with Double Key Filter. IACR Trans. Symmetric Cryptol. 2021(1): 5-36 (2021) - [j33]Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto:
Orthros: A Low-Latency PRF. IACR Trans. Symmetric Cryptol. 2021(1): 37-77 (2021) - [j32]Fukang Liu, Takanori Isobe, Willi Meier:
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks. IACR Trans. Symmetric Cryptol. 2021(1): 185-216 (2021) - [j31]Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe:
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G. IACR Trans. Symmetric Cryptol. 2021(2): 1-30 (2021) - [j30]Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto:
Weak Keys in Reduced AEGIS and Tiaoxin. IACR Trans. Symmetric Cryptol. 2021(2): 104-139 (2021) - [j29]Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang:
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives. IACR Trans. Symmetric Cryptol. 2021(4): 36-73 (2021) - [c48]Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang:
Algebraic Attacks on Round-Reduced Keccak. ACISP 2021: 91-110 - [c47]Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto:
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V. ACISP 2021: 171-190 - [c46]Takanori Isobe, Ryoma Ito:
Security Analysis of End-to-End Encryption for Zoom Meetings. ACISP 2021: 234-253 - [c45]Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations. ASIACRYPT (1) 2021: 214-240 - [c44]Fukang Liu, Takanori Isobe, Willi Meier:
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques. CRYPTO (3) 2021: 368-401 - [c43]Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu:
Security Analysis of SFrame. ESORICS (2) 2021: 127-146 - [c42]Ravi Anand, Takanori Isobe:
Differential Fault Attack on Rocca. ICISC 2021: 283-295 - [c41]Anubhab Baksi, Vishnu Asutosh Dasu, Banashri Karmakar, Anupam Chattopadhyay, Takanori Isobe:
Three Input Exclusive-OR Gate Support for Boyar-Peralta's Algorithm. INDOCRYPT 2021: 141-158 - [i39]Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto:
Weak Keys in Reduced AEGIS and Tiaoxin. IACR Cryptol. ePrint Arch. 2021: 187 (2021) - [i38]Ryoma Ito, Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Takanori Isobe:
Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC. IACR Cryptol. ePrint Arch. 2021: 212 (2021) - [i37]Fukang Liu, Takanori Isobe, Willi Meier:
A Simple Algebraic Attack on 3-Round LowMC. IACR Cryptol. ePrint Arch. 2021: 255 (2021) - [i36]Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto:
Orthros: A Low-Latency PRF. IACR Cryptol. ePrint Arch. 2021: 390 (2021) - [i35]Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi:
Output Prediction Attacks on SPN Block Ciphers using Deep Learning. IACR Cryptol. ePrint Arch. 2021: 401 (2021) - [i34]Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar:
Atom: A Stream Cipher with Double Key Filter. IACR Cryptol. ePrint Arch. 2021: 403 (2021) - [i33]Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu:
Security Analysis of SFrame. IACR Cryptol. ePrint Arch. 2021: 424 (2021) - [i32]Fukang Liu, Takanori Isobe, Willi Meier:
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations. IACR Cryptol. ePrint Arch. 2021: 474 (2021) - [i31]Takanori Isobe, Ryoma Ito:
Security Analysis of End-to-End Encryption for Zoom Meetings. IACR Cryptol. ePrint Arch. 2021: 486 (2021) - [i30]Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto:
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V. IACR Cryptol. ePrint Arch. 2021: 546 (2021) - [i29]Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe:
Finding Practical Distinguishers for ZUC-256 Using Modular Differences. IACR Cryptol. ePrint Arch. 2021: 1104 (2021) - [i28]Anubhab Baksi, Vishnu Asutosh Dasu, Banashri Karmakar, Anupam Chattopadhyay, Takanori Isobe:
Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version). IACR Cryptol. ePrint Arch. 2021: 1400 (2021) - [i27]Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang:
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives. IACR Cryptol. ePrint Arch. 2021: 1523 (2021) - 2020
- [j28]Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Takanori Isobe:
Security of Related-Key Differential Attacks on TWINE, Revisited. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 212-214 (2020) - [j27]Takanori Isobe, Kazuhiko Minematsu:
Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 313-324 (2020) - [j26]Takanori Isobe, Kyoji Shibutani:
Key-Recovery Security of Single-Key Even-Mansour Ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(7): 893-905 (2020) - [j25]Fukang Liu, Takanori Isobe:
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(11): 1260-1273 (2020) - [j24]Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe:
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1629-1639 (2020) - [c40]Yuji Koike, Kosei Sakamoto, Takuya Hayashi, Takanori Isobe:
Galaxy: A Family of Stream-Cipher-Based Space-Hard Ciphers. ACISP 2020: 142-159 - [c39]Rintaro Fujita, Takanori Isobe, Kazuhiko Minematsu:
ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files? ACNS (1) 2020: 187-207 - [c38]Fukang Liu, Takanori Isobe, Willi Meier:
Automatic Verification of Differential Characteristics: Application to Reduced Gimli. CRYPTO (3) 2020: 219-248 - [c37]Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri:
WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher. SAC 2020: 535-564 - [i26]Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang:
Algebraic Attacks on Round-Reduced Keccak/Xoodoo. IACR Cryptol. ePrint Arch. 2020: 346 (2020) - [i25]Fukang Liu, Takanori Isobe, Willi Meier:
Exploiting Weak Diffusion of Gimli: A Full-Round Distinguisher and Reduced-Round Preimage Attacks. IACR Cryptol. ePrint Arch. 2020: 561 (2020) - [i24]Fukang Liu, Takanori Isobe, Willi Meier:
Automatic Verification of Differential Characteristics: Application to Reduced Gimli. IACR Cryptol. ePrint Arch. 2020: 591 (2020) - [i23]Fukang Liu, Takanori Isobe, Willi Meier:
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques. IACR Cryptol. ePrint Arch. 2020: 1034 (2020) - [i22]Rintaro Fujita, Takanori Isobe, Kazuhiko Minematsu:
ACE in Chains : How Risky is CBC Encryption of Binary Executable Files ? IACR Cryptol. ePrint Arch. 2020: 1159 (2020) - [i21]Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri:
WARP : Revisiting GFN for Lightweight 128-bit Block Cipher. IACR Cryptol. ePrint Arch. 2020: 1320 (2020)
2010 – 2019
- 2019
- [j23]Takanori Isobe, Kyoji Shibutani:
Meet-in-the-Middle Key Recovery Attacks on a Single-Key Two-Round Even-Mansour Cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 17-26 (2019) - [j22]Yuki Funabiki, Yosuke Todo, Takanori Isobe, Masakatu Morii:
Improved Integral Attack on HIGHT. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1259-1271 (2019) - [j21]Yonglin Hao, Takanori Isobe, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IEEE Trans. Computers 68(10): 1470-1486 (2019) - [j20]Subhadeep Banik, Khashayar Barooti, Takanori Isobe:
Cryptanalysis of Plantlet. IACR Trans. Symmetric Cryptol. 2019(3): 103-120 (2019) - [j19]Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. IACR Trans. Symmetric Cryptol. 2019(3): 169-192 (2019) - [j18]Fukang Liu, Takanori Isobe, Willi Meier:
Cube-Based Cryptanalysis of Subterranean-SAE. IACR Trans. Symmetric Cryptol. 2019(4): 192-222 (2019) - [c36]Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
Efficient Collision Attack Frameworks for RIPEMD-160. CRYPTO (2) 2019: 117-149 - [c35]Hayato Kimura, Takanori Isobe, Toshihiro Ohigashi:
Neural-Network-Based Pseudo-Random Number Generator Evaluation Tool for Stream Ciphers. CANDAR Workshops 2019: 333-338 - [c34]Subhadeep Banik, Yuki Funabiki, Takanori Isobe:
More Results on Shortest Linear Programs. IWSEC 2019: 109-128 - [c33]Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe:
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. IWSEC 2019: 129-145 - [c32]Fukang Liu, Takanori Isobe:
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods. IWSEC 2019: 306-326 - [c31]Fukang Liu, Takanori Isobe:
Iterative Differential Characteristic of TRIFLE-BC. SAC 2019: 85-100 - [c30]Takanori Isobe, Kazuhiko Minematsu:
Plaintext Recovery Attacks Against XTS Beyond Collisions. SAC 2019: 103-123 - [i20]Fukang Liu, Takanori Isobe:
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods. IACR Cryptol. ePrint Arch. 2019: 618 (2019) - [i19]Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. IACR Cryptol. ePrint Arch. 2019: 668 (2019) - [i18]Subhadeep Banik, Khashayar Barooti, Takanori Isobe:
Cryptanalysis of Plantlet. IACR Cryptol. ePrint Arch. 2019: 702 (2019) - [i17]Fukang Liu, Takanori Isobe:
Iterative Differential Characteristic of TRIFLE-BC. IACR Cryptol. ePrint Arch. 2019: 727 (2019) - [i16]Takanori Isobe, Kazuhiko Minematsu:
Plaintext Recovery Attacks against XTS Beyond Collisions. IACR Cryptol. ePrint Arch. 2019: 825 (2019) - [i15]Subhadeep Banik, Yuki Funabiki, Takanori Isobe:
More results on Shortest Linear Programs. IACR Cryptol. ePrint Arch. 2019: 856 (2019) - [i14]Fukang Liu, Takanori Isobe, Willi Meier:
Cryptanalysis of Subterranean-SAE. IACR Cryptol. ePrint Arch. 2019: 879 (2019) - [i13]Fukang Liu, Takanori Isobe, Willi Meier:
Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods. IACR Cryptol. ePrint Arch. 2019: 1080 (2019) - 2018
- [j17]Subhadeep Banik, Takanori Isobe, Masakatu Morii:
On Design of Robust Lightweight Stream Cipher with Short Internal State. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 99-109 (2018) - [j16]Yuhei Watanabe, Takanori Isobe, Masakatu Morii:
Cryptanalysis of Reduced Kreyvium. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1548-1556 (2018) - [j15]Sonu Jha, Subhadeep Banik, Takanori Isobe, Toshihiro Ohigashi, Santanu Sarkar:
Theoretical Understanding of Some Conditional and Joint Biases in RC4 Stream Cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(11): 1869-1879 (2018) - [j14]Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. IEEE Trans. Computers 67(12): 1720-1736 (2018) - [j13]Subhadeep Banik, Vasily Mikhalev, Frederik Armknecht, Takanori Isobe, Willi Meier, Andrey Bogdanov, Yuhei Watanabe, Francesco Regazzoni:
Towards Low Energy Stream Ciphers. IACR Trans. Symmetric Cryptol. 2018(2): 1-19 (2018) - [j12]Gianira N. Alfarano, Christof Beierle, Takanori Isobe, Stefan Kölbl, Gregor Leander:
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny. IACR Trans. Symmetric Cryptol. 2018(2): 20-47 (2018) - [c29]Yuki Funabiki, Yosuke Todo, Takanori Isobe, Masakatu Morii:
Several MILP-Aided Attacks Against SNOW 2.0. CANS 2018: 394-413 - [c28]Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. CRYPTO (2) 2018: 129-159 - [c27]Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. CRYPTO (1) 2018: 275-305 - [c26]Takanori Isobe, Kazuhiko Minematsu:
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE. ESORICS (2) 2018: 249-268 - [c25]Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni, Takanori Isobe, Harunaga Hiwatari, Toru Akishita:
Inverse gating for low energy encryption. HOST 2018: 173-176 - [i12]Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. IACR Cryptol. ePrint Arch. 2018: 522 (2018) - [i11]Takanori Isobe, Kazuhiko Minematsu:
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE. IACR Cryptol. ePrint Arch. 2018: 668 (2018) - 2017
- [j11]Yuhei Watanabe, Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii:
How to Efficiently Exploit Different Types of Biases for Plaintext Recovery of RC4. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(3): 803-810 (2017) - [j10]Subhadeep Banik, Takanori Isobe, Masakatu Morii:
Analysis and Improvements of the Full Spritz Stream Cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(6): 1296-1305 (2017) - [j9]Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen:
Analysis of Software Countermeasures for Whitebox Encryption. IACR Trans. Symmetric Cryptol. 2017(1): 307-328 (2017) - [j8]Subhadeep Banik, Takanori Isobe, Tingting Cui, Jian Guo:
Some cryptanalytic results on Lizard. IACR Trans. Symmetric Cryptol. 2017(4): 82-98 (2017) - [c24]Yuki Funabiki, Yosuke Todo, Takanori Isobe, Masakatu Morii:
Improved Integral Attack on HIGHT. ACISP (1) 2017: 363-383 - [c23]Yuhei Watanabe, Takanori Isobe, Masakatu Morii:
Conditional Differential Cryptanalysis for Kreyvium. ACISP (1) 2017: 421-434 - [c22]Takanori Isobe, Kyoji Shibutani:
New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers. ASIACRYPT (1) 2017: 244-263 - [c21]Takeru Koie, Takanori Isobe, Yosuke Todo, Masakatu Morii:
Low-Data Complexity Attacks on Camellia. ATIS 2017: 128-140 - [c20]Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. CRYPTO (3) 2017: 250-279 - [i10]Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen:
Analysis of Software Countermeasures for Whitebox Encryption. IACR Cryptol. ePrint Arch. 2017: 183 (2017) - [i9]Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. IACR Cryptol. ePrint Arch. 2017: 306 (2017) - [i8]Subhadeep Banik, Takanori Isobe:
Some cryptanalytic results on Lizard. IACR Cryptol. ePrint Arch. 2017: 346 (2017) - [i7]Takanori Isobe, Kyoji Shibutani:
New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers. IACR Cryptol. ePrint Arch. 2017: 868 (2017) - [i6]Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IACR Cryptol. ePrint Arch. 2017: 1063 (2017) - 2016
- [c19]Andrey Bogdanov, Takanori Isobe, Elmar Tischhauser:
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness. ASIACRYPT (1) 2016: 126-158 - [c18]Subhadeep Banik, Takanori Isobe:
Cryptanalysis of the Full Spritz Stream Cipher. FSE 2016: 63-77 - [c17]Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni, Takanori Isobe, Harunaga Hiwatari, Toru Akishita:
Round gating for low energy block ciphers. HOST 2016: 55-60 - [c16]Sonu Jha, Subhadeep Banik, Takanori Isobe, Toshihiro Ohigashi:
Some Proofs of Joint Distributions of Keystream Biases in RC4. INDOCRYPT 2016: 305-321 - [i5]Subhadeep Banik, Takanori Isobe:
Cryptanalysis of the Full Spritz Stream Cipher. IACR Cryptol. ePrint Arch. 2016: 92 (2016) - 2015
- [j7]Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, Masakatu Morii:
Full Plaintext Recovery Attacks on RC4 Using Multiple Biases. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 81-91 (2015) - [c15]Andrey Bogdanov, Takanori Isobe:
How Secure is AES Under Leakage. ASIACRYPT (2) 2015: 361-385 - [c14]Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni:
Midori: A Block Cipher for Low Energy. ASIACRYPT (2) 2015: 411-436 - [c13]Andrey Bogdanov, Takanori Isobe:
White-Box Cryptography Revisited: Space-Hard Ciphers. CCS 2015: 1058-1069 - [i4]Takanori Isobe, Kyoji Shibutani:
Generic Key Recovery Attack on Feistel Scheme. IACR Cryptol. ePrint Arch. 2015: 526 (2015) - [i3]Takanori Isobe, Kyoji Shibutani:
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers. IACR Cryptol. ePrint Arch. 2015: 557 (2015) - [i2]Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni:
Midori: A Block Cipher for Low Energy (Extended Version). IACR Cryptol. ePrint Arch. 2015: 1142 (2015) - 2014
- [j6]Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, Masakatu Morii:
Comprehensive Analysis of Initial Keystream Biases of RC4. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 139-151 (2014) - [j5]Atsushi Nagao, Toshihiro Ohigashi, Takanori Isobe, Masakatu Morii:
Expanding Weak-key Space of RC4. J. Inf. Process. 22(2): 357-365 (2014) - [c12]Takanori Isobe, Kyoji Shibutani:
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers. FSE 2014: 104-126 - 2013
- [j4]Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii:
Slide Property of RAKAPOSHI and Its Application to Key Recovery Attack. Inf. Media Technol. 8(4): 987-994 (2013) - [j3]Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii:
Slide Property of RAKAPOSHI and Its Application to Key Recovery Attack. J. Inf. Process. 21(4): 599-606 (2013) - [j2]Takanori Isobe:
A Single-Key Attack on the Full GOST Block Cipher. J. Cryptol. 26(1): 172-189 (2013) - [c11]Takanori Isobe, Yu Sasaki, Jiageng Chen:
Related-Key Boomerang Attacks on KATAN32/48/64. ACISP 2013: 268-285 - [c10]Takanori Isobe, Kyoji Shibutani:
Generic Key Recovery Attack on Feistel Scheme. ASIACRYPT (1) 2013: 464-485 - [c9]Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, Masakatu Morii:
Full Plaintext Recovery Attack on Broadcast RC4. FSE 2013: 179-202 - [c8]Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, Masakatu Morii:
How to Recover Any Byte of Plaintext on RC4. Selected Areas in Cryptography 2013: 155-173 - 2012
- [c7]Takanori Isobe, Kyoji Shibutani:
Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo. ACISP 2012: 71-86 - [c6]Ji Li, Takanori Isobe, Kyoji Shibutani:
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2. FSE 2012: 264-286 - [c5]Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii:
Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI. IWSEC 2012: 138-155 - [c4]Takanori Isobe, Kyoji Shibutani:
All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach. Selected Areas in Cryptography 2012: 202-221 - 2011
- [c3]Kyoji Shibutani, Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, Taizo Shirai:
Piccolo: An Ultra-Lightweight Blockcipher. CHES 2011: 342-357 - [c2]Takanori Isobe:
A Single-Key Attack on the Full GOST Block Cipher. FSE 2011: 290-305 - 2010
- [i1]Takanori Isobe, Taizo Shirai:
Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512. IACR Cryptol. ePrint Arch. 2010: 434 (2010)
2000 – 2009
- 2009
- [j1]Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii:
A Chosen-IV Key Recovery Attack on Py and Pypy. IEICE Trans. Inf. Syst. 92-D(1): 32-40 (2009) - [c1]Takanori Isobe, Kyoji Shibutani:
Preimage Attacks on Reduced Tiger and SHA-2. FSE 2009: 139-155
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint