The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase ciphertext-only (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1998 (16) 2000-2004 (15) 2005-2007 (19) 2008-2016 (15) 2017-2022 (19) 2023-2024 (2)
Publication types (Num. hits)
article(35) incollection(2) inproceedings(49)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 74 occurrences of 50 keywords

Results
Found 86 publication records. Showing 86 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
85Elad Barkan, Eli Biham, Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ciphertext-only, SIM, A5/2, A5/1, Cryptanalysis, SMS, GSM, GPRS, Cellular
76Anne Canteaut, Eric Filiol Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF ciphertext only reconstruction, Boolean function, stream cipher, correlation, linear feedback shift register
76Alex Biryukov, Eyal Kushilevitz From Differential Cryptanalysis to Ciphertext-Only Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Madryga, RC5, ciphertext-only attack, differential-linear attack, block-ciphers, DES, differential cryptanalysis
65Yukiyasu Tsunoo, Eiji Okamoto, Tomohiko Uyematsu Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
53Nicolas T. Courtois Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF overdefined systems of multivariate equations, MQ problem, Gröbner bases, ciphertext-only attacks, Toyocrypt-HR1, Toyocrypt-HS1, Cryptrec, stream ciphers, nonlinear filtering, pseudo-random generators, Multivariate cryptography, XL algorithm
51Elad Barkan, Eli Biham, Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
45Nicolas T. Courtois, Willi Meier Algebraic Attacks on Stream Ciphers with Linear Feedback. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Algebraic attacks on stream ciphers, factoring multivariate polynomials, overdefined problems, ciphertext-only attacks, Toyocrypt, Cryptrec, LILI-128, Boolean functions, nonlinear filtering, pseudo-random generators, Nessie, XL algorithm, multivariate equations
44Tzonelih Hwang, T. R. N. Rao Secret Error-Correcting Codes (SECC). Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity
43Dominik Engel, Rade Kutil, Andreas Uhl A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ciphertext-only, known-plaintext, secret frequency domain, secret parameterized wavelet filters, attack, JPEG2000
38Yunyu Li, Jiantao Zhou 0001, Yuanman Li Ciphertext-Only Attack on an Image Homomorphic Encryption Scheme with Small Ciphertext Expansion. Search on Bibsonomy ACM Multimedia The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
36Yuji Watanabe, Masayuki Numao Conditional Cryptographic Delegation for P2P Data Sharing. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Yair Frankel, Moti Yung Cryptanalysis of the Immunized LL Public Key Systems. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
35Norman Proctor A Self-Synchronizing Cascaded Cipher System With Dynamic Control of Error-Propagation. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
32Slobodan Petrovic, Amparo Fúster-Sabater Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Irregular clocking, Cryptanalysis, Edit distance, Correlation attack, Directed search
27Andrey Bogdanov, Thomas Eisenbarth 0001, Andy Rupp A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF A5/2, SMITH, cryptanalysis, GSM, Gaussian elimination, special-purpose hardware, linear systems of equations
27Mithun Acharya, Joao Girão, Dirk Westhoff Secure Comparison of Encrypted Data in Wireless Sensor Networks. Search on Bibsonomy WiOpt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Shyam Murthy, Santosh Kumar Upadhyaya, Srinivas Vivek 0001 Ciphertext-Only Attack on a Secure k-NN Computation on Cloud. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Dongjae Lee, Jaewoo Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong A Practical Ciphertext-Only Attack on GMR-2 System. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Dongjae Lee, Deukjo Hong, Jaechul Sung, Seonggyeom Kim, Seokhie Hong Improved Ciphertext-Only Attack on GMR-1. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Haoyu Li, Renzhang Liu, Zhen Liu, Yanbin Pan, Tianyuan Xie Ciphertext-Only Attacks Against Compact-LWE Submitted to NIST PQC Project. Search on Bibsonomy J. Syst. Sci. Complex. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Wei Li 0013, Shan Cao, Dawu Gu, Jiayao Li, Tianpei Cai, Menglin Wang, Li Sun, Zhiqiang Liu 0001, Ya Liu 0001 Ciphertext-only fault analysis of GIFT lightweight cryptosystem. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Tatsuya Chuman, Hitoshi Kiya Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only Attacks. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Tatsuya Chuman, Hitoshi Kiya Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification Against Ciphertext-Only Attacks. Search on Bibsonomy ICMLC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Anas Ibrahim, Alexander G. Chefranov, Rushdi Hamamreh Ciphertext-only attack on RSA using lattice basis reduction. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Thomas Kaeding Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers. Search on Bibsonomy Cryptologia The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Wei Li 0013, Linfeng Liao, Dawu Gu, Shan Cao, Yixin Wu, Jiayao Li, Zhihong Zhou, Zheng Guo 0001, Ya Liu 0001, Zhiqiang Liu 0001 Ciphertext-only fault analysis on the Midori lightweight cryptosystem. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Warit Sirichotedumrong, Hitoshi Kiya Visual Security Evaluation of Learnable Image Encryption Methods against Ciphertext-only Attacks. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
23Thomas Kaeding Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
23Thomas Kaeding Automated ciphertext-only attack on the Wheatstone Cryptograph and related devices. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
23Warit Sirichotedumrong, Hitoshi Kiya Visual Security Evaluation of Learnable Image Encryption Methods against Ciphertext-only Attacks. Search on Bibsonomy APSIPA The full citation details ... 2020 DBLP  BibTeX  RDF
23Shuming Jiao, Ting Lei, Yang Gao, Zhenwei Xie, Xiaocong Yuan Known-Plaintext Attack and Ciphertext-Only Attack for Encrypted Single-Pixel Imaging. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Shuming Jiao, Yang Gao, Ting Lei, Zhenwei Xie, Xiaocong Yuan Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
23Wei Li 0013, Linfeng Liao, Dawu Gu, Chaoyun Li, Chenyu Ge, Zheng Guo 0001, Ya Liu 0001, Zhiqiang Liu 0001 Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Nicolas T. Courtois, Maria-Bristena Oprisanu Ciphertext-only attacks and weak long-term keys in T-310. Search on Bibsonomy Cryptologia The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23George Lasry, Nils Kopal, Arno Wacker Ciphertext-only cryptanalysis of short Hagelin M-209 ciphertexts. Search on Bibsonomy Cryptologia The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Shahram Khazaei, Siavash Ahmadi Ciphertext-only attack on d × d Hill in O(d13d). Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Yongwoo Lee 0002, Young-Sik Kim, Jong-Seon No Ciphertext-Only Attack on Linear Feedback Shift Register-Based Esmaeili-Gulliver Cryptosystem. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23George Lasry, Nils Kopal, Arno Wacker Ciphertext-only cryptanalysis of Hagelin M-209 pins and lugs. Search on Bibsonomy Cryptologia The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Shahram Khazaei, Siavash Ahmadi Ciphertext-only attack on d*d Hill in O(d13d). Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
23Carlo Meijer, Roel Verdult Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Fabrizio De Santis, Oscar M. Guillen, Ermin Sakic, Georg Sigl Ciphertext-Only Fault Attacks on PRESENT. Search on Bibsonomy LightSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Michal Mikus, Marek Sýs Ciphertext-Only Attack on Gentry-Halevi Implementation of Somewhat Homomorphic Scheme. Search on Bibsonomy MEMICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Alex Biryukov Ciphertext-Only Attack. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Yanbin Pan, Yingpu Deng A Ciphertext-Only Attack Against the Cai-Cusick Lattice-Based Public-Key Cryptosystem. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Raj S. Katti, Sudarshan K. Srinivasan, Aida Vosoughi On the Security of Randomized Arithmetic Codes Against Ciphertext-Only Attacks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Rainer Steinwandt A ciphertext-only attack on Polly Two. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23António Machiavelo, Rogério Reis Automated Ciphertext - Only Cryptanalysis of the Bifid Cipher. Search on Bibsonomy Cryptologia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Liaqat Ali Khan, Muhammad Shamim Baig, M. Ashraf Ashraf Exploiting Silence for Ciphertext Only Cryptanalysis of Stream Ciphered Digitized Voice. Search on Bibsonomy Security and Management The full citation details ... 2007 DBLP  BibTeX  RDF
23Alex Biryukov Ciphertext-Only Attack. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Lars R. Knudsen, Vincent Rijmen Ciphertext-only Attack on Akelarre. Search on Bibsonomy Cryptologia The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
23Heidi Williams Applying Statistical Language Recognition Techniques in the Ciphertext-only Cryptanalysis of Enigma. Search on Bibsonomy Cryptologia The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
23James J. Gillogly Ciphertext-only Cryptanalysis of Enigma. Search on Bibsonomy Cryptologia The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
23Thomas Siegenthaler Decrypting a Class of Stream Ciphers Using Ciphertext Only. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1985 DBLP  DOI  BibTeX  RDF pseudonoise generator, exhaustive trials, cryptanalysis, Correlation
23Donald V. Miller Ciphertext only Attack on the Merkle-Hellman Public-Key System under Broadcast Situations. Search on Bibsonomy Cryptologia The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
23Herbert S. Bright Cryptanalytic Attack and Defense: Ciphertext-Only, Known-Plaintext, Chosen-Plaintext. Search on Bibsonomy Cryptologia The full citation details ... 1977 DBLP  DOI  BibTeX  RDF
20Ernest F. Brickell, Yacov Yacobi On Privacy Homomorphisms (Extended Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
19Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Daniel Socek, Dubravko Culibrk On the security of a clipped hopfield neural network-based cryptosystem. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF neural networks, cryptography, randomness, permutations, data security
19Chris J. Mitchell Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Toshiki Habutsu, Yoshifumi Nishio, Iwao Sasase, Shinsaku Mori A Secret Key Cryptosystem by Iterating a Chaotic Map. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
18Elad Barkan, Eli Biham Conditional Estimators: An Effective Attack on A5/1. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Luke McAven, Reihaneh Safavi-Naini, Moti Yung Unconditionally Secure Encryption Under Strong Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Yacov Yacobi A Key Distribution "Paradox". Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
11Jean Paul Degabriele, Kenneth G. Paterson Attacking the IPsec Standards in Encryption-only Configurations. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Jorge Nakahara Jr., Daniel Santana de Freitas Cryptanalysis of Ake98. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Akelarre, Ake98, RC5, cryptanalysis, AES, IDEA, RC6
10Scott R. Fluhrer, Itsik Mantin, Adi Shamir Weaknesses in the Key Scheduling Algorithm of RC4. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10David A. Wagner 0001, Leonie Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier Cryptanalysis of ORYX. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
10Miodrag J. Mihaljevic Security Examination of a Cellular Automata Based Pseudorandom Bit Generator Using an Algebraic Replica Approach. Search on Bibsonomy AAECC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
9Meiqin Wang, Jorge Nakahara Jr., Yue Sun Cryptanalysis of the Full MMB Block Cipher. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MMB block cipher, square cryptanalysis, differential cryptanalysis, modular multiplication, linear cryptanalysis
9Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF linear hulls, algebraic analysis, systems of sparse polynomial equations of low degree, RFID, block ciphers
9Shujun Li, Guanrong Chen, Albert Cheung, Kwok-Tung Lo, Mohan S. Kankanhalli On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables. Search on Bibsonomy PSIVT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Xiaolan Joy Zhang, Brian King An Anti-Counterfeiting RFID Privacy Protection Protocol. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, integrity, RFID security
9Ayoub Massoudi, Frédéric Lefèbvre, Marc Joye Cryptanalysis of a Video Scrambling Based on Space Filling Curves. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Jorge Nakahara Jr. A Linear Analysis of Blowfish and Khufu. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Blowfish, Khufu, key-dependent S- boxes, linear cryptanalysis
9Bin Zhang 0003, Dengguo Feng Security analysis of a new stream cipher. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF divide-and-conquer attack, non-linear feedback shift registers (NLFSR), stream cipher, chaotic sequence
9Einar Mykletun, Gene Tsudik Aggregation Queries in the Database-As-a-Service Model. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Hong Wang Weaknesses of COSvd (2, 128) Stream Cipher. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF COS cipher, Non- linear feedback shift register, Stream cipher, Divide-and-Conquer
9Dahua Xie, C.-C. Jay Kuo Multimedia data encryption via random rotation in partitioned bit streams. Search on Bibsonomy ISCAS (6) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Security Weaknesses of Certain Broadcast Encryption Schemes. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF time-memory-data trade-off, cryptanalysis, key management, broadcast encryption
9Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF time-limited services, cryptographic keys management, time-bound keys, one-way mappings, broadcast encryption, pseudorandom number generators
9Rainer Steinwandt Loopholes in Two Public Key Cryptosystems Using the Modular Group. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
9Itsik Mantin, Adi Shamir A Practical Attack on Broadcast RC4. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
9Muxiang Zhang, Christopher Carroll, Agnes Hui Chan Analysis of IS-95 CDMA Voice Privacy. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
9Eric Filiol Decimation Attack of Stream Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF sequence decimation, multiple clocking, Stream cipher, linear feedback shift register, correlation attack, fast correlation attack
9Sheelagh Lloyd Properties of Binary Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
9Thomas Siegenthaler Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #86 of 86 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license