


default search action
Takeshi Sugawara 0001
Person information
- affiliation: The University of Electro-Communications, Tokyo, Japan
Other persons with the same name
- Takeshi Sugawara 0002
— The University of Tokyo, Tokyo, Japan
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j29]Kohei Doi, Takeshi Sugawara:
Laser-Based Covert Channel Attack Using Inaudible Acoustic Leakage from Multilayer Ceramic Capacitors. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 108(3): 207-214 (2025) - 2024
- [j28]Tatsuki Tanaka
, Sara Rampazzi
, Takeshi Sugawara
:
LightTouch: Harnessing Laser-Based Signal Injection to Manipulate Optical Human-Computer Interfaces. IEEE Access 12: 84033-84045 (2024) - [j27]Tamon Asano, Takeshi Sugawara
:
Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version. J. Cryptogr. Eng. 14(1): 165-180 (2024) - [c49]Yusuke Naito, Yu Sasaki, Takeshi Sugawara
:
KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More. ACNS (1) 2024: 318-347 - [c48]Kohei Doi
, Kunihiko Ooi
, Takeshi Sugawara
:
Acoustic Eavesdropping Attack Using Self-Mixing Laser Interferometer. ASHES@CCS 2024: 23-35 - [c47]Yusuke Naito, Yu Sasaki, Takeshi Sugawara
:
The Exact Multi-user Security of 2-Key Triple DES. CT-RSA 2024: 112-135 - [c46]Yusuke Naito, Yu Sasaki, Takeshi Sugawara
:
The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation. EUROCRYPT (1) 2024: 97-127 - [c45]Takami Sato, Sri Hrushikesh Varma Bhupathiraju, Michael Clifford, Takeshi Sugawara, Qi Alfred Chen, Sara Rampazzi:
Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign Perception. NDSS 2024 - [c44]Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi:
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management. SP 2024: 331-349 - [i14]Takami Sato, Sri Hrushikesh Varma Bhupathiraju, Michael Clifford, Takeshi Sugawara, Qi Alfred Chen, Sara Rampazzi:
Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign Perception. CoRR abs/2401.03582 (2024) - [i13]Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi:
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management. CoRR abs/2404.11815 (2024) - [i12]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Committing Wide Encryption Mode with Minimum Ciphertext Expansion. IACR Cryptol. ePrint Arch. 2024: 1257 (2024) - 2023
- [j26]Mitsuru Shiozaki, Takeshi Sugawara
, Takeshi Fujino:
Exploring Effect of Residual Electric Charges on Cryptographic Circuits: Extended Version. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 281-293 (2023) - [j25]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
MMM: Authenticated Encryption with Minimum Secret State for Masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 80-109 (2023) - [j24]Yusuke Naito, Yu Sasaki, Takeshi Sugawara
:
Committing Security of Ascon: Cryptanalysis on Primitive and Proof on Mode. IACR Trans. Symmetric Cryptol. 2023(4): 420-451 (2023) - [c43]Yukihito Hiraga, Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size. ISC 2023: 351-371 - [c42]Yuki Matsukawa, Daiki Miyahara, Takeshi Sugawara, Kazuo Sakiyama, Yang Li:
Exploring Leakage Characteristics and Attacks Through Profiles of Screaming Channels. MobiSec 2023: 152-166 - [c41]Benjamin Cyr, Yan Long
, Takeshi Sugawara, Kevin Fu:
Position Paper: Space System Threat Models Must Account for Satellite Sensor Spoofing. SpaceSec 2023 - [c40]Yulong Cao, S. Hrushikesh Bhupathiraju, Pirouz Naghavi, Takeshi Sugawara, Z. Morley Mao, Sara Rampazzi:
You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks. USENIX Security Symposium 2023: 2993-3010 - [c39]Sri Hrushikesh Varma Bhupathiraju
, Jennifer Sheldon
, Luke A. Bauer
, Vincent Bindschaedler
, Takeshi Sugawara
, Sara Rampazzi
:
EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic Interference. WISEC 2023: 329-340 - 2022
- [j23]Go Takami, Takeshi Sugawara
, Kazuo Sakiyama, Yang Li:
Mixture-Based 5-Round Physical Attack against AES: Attack Proposal and Noise Evaluation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 289-299 (2022) - [j22]Kohei Yamashita, Benjamin Cyr, Kevin Fu, Wayne P. Burleson, Takeshi Sugawara
:
Redshift: Manipulating Signal Propagation Delay via Continuous-Wave Lasers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 463-489 (2022) - [c38]Yusuke Naito, Yu Sasaki, Takeshi Sugawara
, Kan Yasuda:
The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES. CCS 2022: 2323-2336 - [c37]Kohei Doi, Takeshi Sugawara
:
Poster: Inaudible Acoustic Noise from Silicon Capacitors for Voice-Command Injection. CCS 2022: 3339-3341 - [c36]Yusuke Naito, Yu Sasaki, Takeshi Sugawara
:
Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking. CRYPTO (3) 2022: 315-345 - [c35]Tatsuki Tanaka, Takeshi Sugawara
:
Laser-Based Signal-Injection Attack on Piezoresistive MEMS Pressure Sensors. IEEE SENSORS 2022: 1-4 - [i11]Yulong Cao, S. Hrushikesh Bhupathiraju, Pirouz Naghavi, Takeshi Sugawara, Z. Morley Mao, Sara Rampazzi:
You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks. CoRR abs/2210.09482 (2022) - [i10]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking. IACR Cryptol. ePrint Arch. 2022: 812 (2022) - 2021
- [j21]Yusuke Naito, Yu Sasaki, Takeshi Sugawara
:
AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 298-333 (2021) - [c34]Yusuke Naito, Yu Sasaki, Takeshi Sugawara
:
Double-Block-Length Hash Function for Minimum Memory Size. ASIACRYPT (3) 2021: 376-406 - [c33]Rei Kudo, Takeshi Sugawara
, Kazuo Sakiyama, Yuko Hara-Azumi, Yang Li:
Revisiting System Noise in Side-Channel Attacks: Mutual Assistant SCA vs. Genetic Algorithm. AsianHOST 2021: 1-6 - [c32]Benjamin Cyr, Takeshi Sugawara
, Kevin Fu:
Why Lasers Inject Perceived Sound Into MEMS Microphones: Indications and Contraindications of Photoacoustic and Photoelectric Effects. IEEE SENSORS 2021: 1-4 - [i9]Taiga Ono, Takeshi Sugawara, Jun Sakuma, Tatsuya Mori:
Application of Adversarial Examples to Physical ECG Signals. CoRR abs/2108.08972 (2021) - 2020
- [j20]Takeshi Sugawara
:
Hardware Performance Evaluation of Authenticated Encryption SAEAES with Threshold Implementation. Cryptogr. 4(3): 23 (2020) - [j19]Yusuke Naito, Takeshi Sugawara
:
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 66-94 (2020) - [j18]Yusuke Naito, Yu Sasaki, Takeshi Sugawara
:
LM-DAE: Low-Memory Deterministic Authenticated Encryption for 128-bit Security. IACR Trans. Symmetric Cryptol. 2020(4): 1-38 (2020) - [c31]Go Takatoi, Takeshi Sugawara
, Kazuo Sakiyama, Yang Li:
Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks. ACNS Workshops 2020: 181-197 - [c30]Mitsuru Shiozaki, Takeshi Sugawara
, Takeshi Fujino:
Exploring Effect of Residual Electric Charges on Cryptographic Circuits. ASHES@CCS 2020: 57-66 - [c29]Yusuke Naito, Yu Sasaki, Takeshi Sugawara
:
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation. EUROCRYPT (2) 2020: 705-735 - [c28]Tsubasa Takaki, Yang Li, Kazuo Sakiyama, Shoei Nashimoto, Daisuke Suzuki, Takeshi Sugawara
:
An Optimized Implementation of AES-GCM for FPGA Acceleration Using High-Level Synthesis. GCCE 2020: 176-180 - [c27]Marika Yabu, Kazuo Sakiyama, Takeshi Sugawara
:
Low-Memory Implementation of Authenticated Encryption Algorithm SAEAES on ARM Cortex-M0 Microcontroller. GCCE 2020: 181-185 - [c26]Takeshi Sugawara
, Tatsuya Onuma, Yang Li:
(Short Paper) Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function. IWSEC 2020: 117-127 - [c25]Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu:
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. USENIX Security Symposium 2020: 2631-2648 - [i8]Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu:
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. CoRR abs/2006.11946 (2020) - [i7]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation. IACR Cryptol. ePrint Arch. 2020: 542 (2020) - [i6]Takeshi Sugawara, Tatsuya Onuma, Yang Li:
Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function. IACR Cryptol. ePrint Arch. 2020: 716 (2020)
2010 – 2019
- 2019
- [j17]Takeshi Sugawara
, Natsu Shoji, Kazuo Sakiyama
, Kohei Matsuda, Noriyuki Miura, Makoto Nagata
:
Side-channel leakage from sensor-based countermeasures against fault injection attack. Microelectron. J. 90: 63-71 (2019) - [j16]Takeshi Sugawara
:
3-Share Threshold Implementation of AES S-box without Fresh Randomness. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1): 123-145 (2019) - [c24]Natsu Shoji, Takeshi Sugawara
, Mitsugu Iwamoto, Kazuo Sakiyama:
An Abstraction Model for 1-bit Probing Attack on Block Ciphers. ICCCS 2019: 502-506 - [c23]Yang Li, Ryota Hatano, Sho Tada, Kohei Matsuda, Noriyuki Miura, Takeshi Sugawara, Kazuo Sakiyama:
Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser Sensor. Inscrypt 2019: 346-361 - [i5]Yusuke Naito, Takeshi Sugawara
:
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2019: 339 (2019) - [i4]Yusuke Naito, Mitsuru Matsui, Takeshi Sugawara
, Daisuke Suzuki:
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation. IACR Cryptol. ePrint Arch. 2019: 700 (2019) - 2018
- [j15]Risa Yashiro, Takeshi Sugawara
, Mitsugu Iwamoto, Kazuo Sakiyama:
Q-Class Authentication System for Double Arbiter PUF. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 129-137 (2018) - [j14]Kohei Matsuda
, Tatsuya Fujii, Natsu Shoji, Takeshi Sugawara
, Kazuo Sakiyama
, Yu-ichi Hayashi, Makoto Nagata
, Noriyuki Miura
:
A 286 F2/Cell Distributed Bulk-Current Sensor and Secure Flush Code Eraser Against Laser Fault Injection Attack on Cryptographic Processor. IEEE J. Solid State Circuits 53(11): 3174-3182 (2018) - [j13]Yusuke Naito, Mitsuru Matsui, Takeshi Sugawara
, Daisuke Suzuki:
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 192-217 (2018) - [c22]Shoei Nashimoto, Daisuke Suzuki, Takeshi Sugawara
, Kazuo Sakiyama:
Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack. AsiaCCS 2018: 511-524 - [c21]Ryuga Matsumura, Takeshi Sugawara
, Kazuo Sakiyama:
A Secure LiDAR with AES-Based Side-Channel Fingerprinting. CANDAR Workshops 2018: 479-482 - [c20]Zhiwei Yuan, Yang Li, Kazuo Sakiyama, Takeshi Sugawara
, Jian Wang:
Recovering Memory Access Sequence with Differential Flush+Reload Attack. ISPEC 2018: 424-439 - [c19]Kohei Matsuda, Tatsuya Fujii, Natsu Shoji, Takeshi Sugawara
, Kazuo Sakiyama, Yu-ichi Hayashi, Makoto Nagata
, Noriyuki Miura:
A 286F2/cell distributed bulk-current sensor and secure flush code eraser against laser fault injection attack. ISSCC 2018: 352-354 - 2017
- [c18]Takeshi Sugawara
, Natsu Shoji, Kazuo Sakiyama, Kohei Matsuda, Noriyuki Miura, Makoto Nagata
:
Exploiting Bitflip Detector for Non-invasive Probing and its Application to Ineffective Fault Analysis. FDTC 2017: 49-56 - [c17]Eito Miyamoto, Takeshi Sugawara
, Kazuo Sakiyama:
Efficient Software Implementation of Modular Multiplication in Prime Fields on TI's DSP TMS320C6678. WISA 2017: 261-273 - 2016
- [j12]Takeshi Sugawara
, Daisuke Suzuki, Minoru Saeki:
Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(7): 1323-1333 (2016) - [c16]Shoichi Hirose, Yusuke Naito, Takeshi Sugawara:
Output Masking of Tweakable Even-Mansour Can Be Eliminated for Message Authentication Code. SAC 2016: 341-359 - 2015
- [j11]Takeshi Sugawara
, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino:
Reversing stealthy dopant-level circuits. J. Cryptogr. Eng. 5(2): 85-94 (2015) - [c15]Takeshi Sugawara
, Daisuke Suzuki, Minoru Saeki:
Two Operands of Multipliers in Side-Channel Attack. COSADE 2015: 64-78 - [c14]Koichi Shimizu, Takeshi Sugawara
, Daisuke Suzuki:
PUF as a sensor. GCCE 2015: 88-92 - [i3]Takeshi Sugawara
, Daisuke Suzuki, Minoru Saeki:
Two Operands of Multipliers in Side-Channel Attack. IACR Cryptol. ePrint Arch. 2015: 291 (2015) - 2014
- [j10]Koichi Shimizu, Daisuke Suzuki, Toyohiro Tsurumaru
, Takeshi Sugawara
, Mitsuru Shiozaki, Takeshi Fujino:
Unified Coprocessor Architecture for Secure Key Storage and Challenge-Response Authentication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 264-274 (2014) - [j9]Takeshi Sugawara
, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino:
On measurable side-channel leaks inside ASIC design primitives. J. Cryptogr. Eng. 4(1): 59-73 (2014) - [c13]Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino:
Reversing Stealthy Dopant-Level Circuits. CHES 2014: 112-126 - [i2]Takeshi Sugawara
, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino:
Reversing Stealthy Dopant-Level Circuits. IACR Cryptol. ePrint Arch. 2014: 508 (2014) - 2013
- [c12]Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino:
On Measurable Side-Channel Leaks Inside ASIC Design Primitives. CHES 2013: 159-178 - [i1]Takeshi Sugawara
, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino:
On Measurable Side-Channel Leaks inside ASIC Design Primitives. IACR Cryptol. ePrint Arch. 2013: 579 (2013) - 2012
- [j8]Sho Endo, Takeshi Sugawara
, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
A Configurable On-Chip Glitchy-Clock Generator for Fault Injection Experiments. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 263-266 (2012) - [j7]Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki
, Takeshi Sugawara
, Yoshiki Kayano, Takafumi Aoki, Shigeki Minegishi, Akashi Satoh, Hideaki Sone, Hiroshi Inoue:
Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current. IEICE Trans. Electron. 95-C(6): 1089-1097 (2012) - [j6]Miroslav Knezevic, Kazuyuki Kobayashi, Jun Ikegami, Shin'ichiro Matsuo, Akashi Satoh, Ünal Koçabas, Junfeng Fan, Toshihiro Katashita
, Takeshi Sugawara
, Kazuo Sakiyama, Ingrid Verbauwhede
, Kazuo Ohta, Naofumi Homma, Takafumi Aoki:
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates. IEEE Trans. Very Large Scale Integr. Syst. 20(5): 827-840 (2012) - [c11]Takeshi Sugawara
, Daisuke Suzuki, Toshihiro Katashita
:
Circuit Simulation for Fault Sensitivity Analysis and Its Application to Cryptographic LSI. FDTC 2012: 16-23 - 2011
- [j5]Takeshi Sugawara
, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
High-Performance Architecture for Concurrent Error Detection for AES Processors. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(10): 1971-1980 (2011) - [j4]Sho Endo, Takeshi Sugawara
, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
An on-chip glitchy-clock generator for testing fault injection attacks. J. Cryptogr. Eng. 1(4): 265-270 (2011) - 2010
- [j3]Takeshi Sugawara
, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
Profiling attack using multivariate regression analysis. IEICE Electron. Express 7(15): 1139-1144 (2010) - [c10]Akashi Satoh, Toshihiro Katashita
, Takeshi Sugawara
, Naofumi Homma, Takafumi Aoki:
Hardware Implementations of Hash Function Luffa. HOST 2010: 130-134
2000 – 2009
- 2009
- [j2]Akashi Satoh, Takeshi Sugawara
, Takafumi Aoki:
High-Performance Hardware Architectures for Galois Counter Mode. IEEE Trans. Computers 58(7): 917-930 (2009) - [c9]Takeshi Sugawara
, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
Differential power analysis of AES ASIC implementations with various S-box circuits. ECCTD 2009: 395-398 - [c8]Toshihiro Katashita
, Akashi Satoh, Takeshi Sugawara
, Naofumi Homma, Takafumi Aoki:
Development of side-channel attack standard evaluation environment. ECCTD 2009: 403-408 - [c7]Takeshi Sugawara
, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki
, Takafumi Aoki, Hideaki Sone, Akashi Satoh:
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules. WISA 2009: 66-78 - 2008
- [j1]Naofumi Homma, Sei Nagashima, Takeshi Sugawara
, Takafumi Aoki, Akashi Satoh:
A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 193-202 (2008) - [c6]Akashi Satoh, Takeshi Sugawara
, Naofumi Homma, Takafumi Aoki:
High-Performance Concurrent Error Detection Scheme for AES Hardware. CHES 2008: 100-112 - [c5]Takeshi Sugawara
, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
High-performance ASIC implementations of the 128-bit block cipher CLEFIA. ISCAS 2008: 2925-2928 - [c4]Toshihiro Katashita
, Akashi Satoh, Takeshi Sugawara
, Naofumi Homma, Takafumi Aoki:
Enhanced Correlation Power Analysis Using Key Screening Technique. ReConFig 2008: 403-408 - [c3]Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool. WISA 2008: 28-40 - 2007
- [c2]Takeshi Sugawara
, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
A High-Performance ASIC Implementation of the 64-bit Block Cipher CAST-128. ISCAS 2007: 1859-1862 - [c1]Akashi Satoh, Takeshi Sugawara, Takafumi Aoki:
High-Speed Pipelined Hardware Architecture for Galois Counter Mode. ISC 2007: 118-129
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-28 00:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint