High order differential attacks on stream ciphers View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2012-08-29

AUTHORS

Simon Knellwolf, Willi Meier

ABSTRACT

Differential cryptanalysis is probably the most popular tool for chosen plaintext attacks on block ciphers. It also applies to chosen IV attacks on stream ciphers, but here, high order differential attacks have been surprisingly successful, namely on NLFSR-based constructions. Most approaches have been developed in terms of the algebraic normal form of Boolean functions. Prominent examples are the d-monomial test, cube attacks, and cube testers. We review the various techniques and translate them into the terminology of high order derivatives introduced by Lai. The unified view points out similarities between seemingly different approaches and naturally suggests generalizations and refinements such as conditional differential cryptanalysis. More... »

PAGES

203-215

References to SciGraph publications

  • 2005. How to Break MD5 and Other Hash Functions in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2005
  • 2009. Cube Attacks on Tweakable Black Box Polynomials in ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009
  • 2002-12-16. A New Statistical Testing for Symmetric Ciphers and Hash Functions in INFORMATION AND COMMUNICATIONS SECURITY
  • 2008-01-01. Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2008
  • 2008. Analysis of Grain’s Initialization Algorithm in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2008
  • 2010. Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010
  • 2007. A Framework for Chosen IV Statistical Analysis of Stream Ciphers in PROGRESS IN CRYPTOLOGY – INDOCRYPT 2007
  • 2011. Breaking Grain-128 with Dynamic Cube Attacks in FAST SOFTWARE ENCRYPTION
  • 1994. Differential Cryptanalysis of Lucifer in ADVANCES IN CRYPTOLOGY — CRYPTO’ 93
  • 2012. Conditional Differential Cryptanalysis of Trivium and KATAN in SELECTED AREAS IN CRYPTOGRAPHY
  • 2006. Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles in INFORMATION SECURITY
  • 1995. Truncated and higher order differentials in FAST SOFTWARE ENCRYPTION
  • 1994. Higher Order Derivatives and Differential Cryptanalysis in COMMUNICATIONS AND CRYPTOGRAPHY
  • 2006. Resynchronization Attacks on WG and LEX in FAST SOFTWARE ENCRYPTION
  • 2010. Greedy Distinguishers and Nonrandomness Detectors in PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010
  • 2009. Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium in FAST SOFTWARE ENCRYPTION
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s12095-012-0071-9

    DOI

    http://dx.doi.org/10.1007/s12095-012-0071-9

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1047000756


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/01", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Mathematical Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0101", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Pure Mathematics", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0102", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Applied Mathematics", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0103", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Numerical and Computational Mathematics", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "FHNW, Windisch, Switzerland", 
              "id": "http://www.grid.ac/institutes/grid.410380.e", 
              "name": [
                "ETH Zurich, Zurich, Switzerland", 
                "FHNW, Windisch, Switzerland"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Knellwolf", 
            "givenName": "Simon", 
            "id": "sg:person.016510524306.72", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016510524306.72"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "FHNW, Windisch, Switzerland", 
              "id": "http://www.grid.ac/institutes/grid.410380.e", 
              "name": [
                "FHNW, Windisch, Switzerland"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Meier", 
            "givenName": "Willi", 
            "id": "sg:person.07653531142.18", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-642-21702-9_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030653330", 
              "https://doi.org/10.1007/978-3-642-21702-9_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11799313_27", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050928943", 
              "https://doi.org/10.1007/11799313_27"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11426639_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043264875", 
              "https://doi.org/10.1007/11426639_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-17373-8_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017495732", 
              "https://doi.org/10.1007/978-3-642-17373-8_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48329-2_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023877301", 
              "https://doi.org/10.1007/3-540-48329-2_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-68164-9_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1033624456", 
              "https://doi.org/10.1007/978-3-540-68164-9_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11836810_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038251529", 
              "https://doi.org/10.1007/11836810_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-28496-0_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020197941", 
              "https://doi.org/10.1007/978-3-642-28496-0_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-1-4615-2694-0_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010308889", 
              "https://doi.org/10.1007/978-1-4615-2694-0_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36159-6_29", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014281940", 
              "https://doi.org/10.1007/3-540-36159-6_29"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-01001-9_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052713322", 
              "https://doi.org/10.1007/978-3-642-01001-9_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-17401-8_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016256936", 
              "https://doi.org/10.1007/978-3-642-17401-8_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-77026-8_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041077964", 
              "https://doi.org/10.1007/978-3-540-77026-8_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-03317-9_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041320003", 
              "https://doi.org/10.1007/978-3-642-03317-9_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-60590-8_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018329205", 
              "https://doi.org/10.1007/3-540-60590-8_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-68164-9_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1001260373", 
              "https://doi.org/10.1007/978-3-540-68164-9_19"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2012-08-29", 
        "datePublishedReg": "2012-08-29", 
        "description": "Differential cryptanalysis is probably the most popular tool for chosen plaintext attacks on block ciphers. It also applies to chosen IV attacks on stream ciphers, but here, high order differential attacks have been surprisingly successful, namely on NLFSR-based constructions. Most approaches have been developed in terms of the algebraic normal form of Boolean functions. Prominent examples are the d-monomial test, cube attacks, and cube testers. We review the various techniques and translate them into the terminology of high order derivatives introduced by Lai. The unified view points out similarities between seemingly different approaches and naturally suggests generalizations and refinements such as conditional differential cryptanalysis.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s12095-012-0071-9", 
        "inLanguage": "en", 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1136695", 
            "issn": [
              "1936-2447", 
              "1936-2455"
            ], 
            "name": "Cryptography and Communications", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "3-4", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "4"
          }
        ], 
        "keywords": [
          "stream cipher", 
          "differential attack", 
          "plaintext attack", 
          "differential cryptanalysis", 
          "block cipher", 
          "most approaches", 
          "unified view", 
          "cipher", 
          "higher order differential attack", 
          "algebraic normal form", 
          "popular tool", 
          "cryptanalysis", 
          "attacks", 
          "cube testers", 
          "Boolean functions", 
          "cube attack", 
          "different approaches", 
          "prominent example", 
          "normal form", 
          "NLFSR", 
          "conditional differential cryptanalysis", 
          "tool", 
          "higher order derivatives", 
          "order derivatives", 
          "technique", 
          "example", 
          "terminology", 
          "generalization", 
          "refinement", 
          "construction", 
          "view", 
          "similarity", 
          "tester", 
          "terms", 
          "function", 
          "form", 
          "test", 
          "LAI", 
          "derivatives", 
          "approach", 
          "order differential attacks", 
          "monomial test"
        ], 
        "name": "High order differential attacks on stream ciphers", 
        "pagination": "203-215", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1047000756"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s12095-012-0071-9"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s12095-012-0071-9", 
          "https://app.dimensions.ai/details/publication/pub.1047000756"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-01-01T18:28", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/article/article_571.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s12095-012-0071-9"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s12095-012-0071-9'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s12095-012-0071-9'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s12095-012-0071-9'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s12095-012-0071-9'


     

    This table displays all metadata directly associated to this object as RDF triples.

    180 TRIPLES      22 PREDICATES      85 URIs      59 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s12095-012-0071-9 schema:about anzsrc-for:01
    2 anzsrc-for:0101
    3 anzsrc-for:0102
    4 anzsrc-for:0103
    5 schema:author Nf8a98b44ae234cb48aedd59a088b0a21
    6 schema:citation sg:pub.10.1007/11426639_2
    7 sg:pub.10.1007/11799313_27
    8 sg:pub.10.1007/11836810_13
    9 sg:pub.10.1007/3-540-36159-6_29
    10 sg:pub.10.1007/3-540-48329-2_17
    11 sg:pub.10.1007/3-540-60590-8_16
    12 sg:pub.10.1007/978-1-4615-2694-0_23
    13 sg:pub.10.1007/978-3-540-68164-9_16
    14 sg:pub.10.1007/978-3-540-68164-9_19
    15 sg:pub.10.1007/978-3-540-77026-8_20
    16 sg:pub.10.1007/978-3-642-01001-9_16
    17 sg:pub.10.1007/978-3-642-03317-9_1
    18 sg:pub.10.1007/978-3-642-17373-8_8
    19 sg:pub.10.1007/978-3-642-17401-8_16
    20 sg:pub.10.1007/978-3-642-21702-9_10
    21 sg:pub.10.1007/978-3-642-28496-0_12
    22 schema:datePublished 2012-08-29
    23 schema:datePublishedReg 2012-08-29
    24 schema:description Differential cryptanalysis is probably the most popular tool for chosen plaintext attacks on block ciphers. It also applies to chosen IV attacks on stream ciphers, but here, high order differential attacks have been surprisingly successful, namely on NLFSR-based constructions. Most approaches have been developed in terms of the algebraic normal form of Boolean functions. Prominent examples are the d-monomial test, cube attacks, and cube testers. We review the various techniques and translate them into the terminology of high order derivatives introduced by Lai. The unified view points out similarities between seemingly different approaches and naturally suggests generalizations and refinements such as conditional differential cryptanalysis.
    25 schema:genre article
    26 schema:inLanguage en
    27 schema:isAccessibleForFree false
    28 schema:isPartOf N16212c38c9bf404ebdde2df650b11902
    29 N3b4b65d03ea9495899fb7ad6306122a9
    30 sg:journal.1136695
    31 schema:keywords Boolean functions
    32 LAI
    33 NLFSR
    34 algebraic normal form
    35 approach
    36 attacks
    37 block cipher
    38 cipher
    39 conditional differential cryptanalysis
    40 construction
    41 cryptanalysis
    42 cube attack
    43 cube testers
    44 derivatives
    45 different approaches
    46 differential attack
    47 differential cryptanalysis
    48 example
    49 form
    50 function
    51 generalization
    52 higher order derivatives
    53 higher order differential attack
    54 monomial test
    55 most approaches
    56 normal form
    57 order derivatives
    58 order differential attacks
    59 plaintext attack
    60 popular tool
    61 prominent example
    62 refinement
    63 similarity
    64 stream cipher
    65 technique
    66 terminology
    67 terms
    68 test
    69 tester
    70 tool
    71 unified view
    72 view
    73 schema:name High order differential attacks on stream ciphers
    74 schema:pagination 203-215
    75 schema:productId N2b5f005705014a0d9d3d7fa10e629d9f
    76 N986e6f6d12c243808c684cf96ac00123
    77 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047000756
    78 https://doi.org/10.1007/s12095-012-0071-9
    79 schema:sdDatePublished 2022-01-01T18:28
    80 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    81 schema:sdPublisher Na96483bc557641bfbba511d6255b547f
    82 schema:url https://doi.org/10.1007/s12095-012-0071-9
    83 sgo:license sg:explorer/license/
    84 sgo:sdDataset articles
    85 rdf:type schema:ScholarlyArticle
    86 N12a59a701eb442cf8208328033c65fae rdf:first sg:person.07653531142.18
    87 rdf:rest rdf:nil
    88 N16212c38c9bf404ebdde2df650b11902 schema:issueNumber 3-4
    89 rdf:type schema:PublicationIssue
    90 N2b5f005705014a0d9d3d7fa10e629d9f schema:name doi
    91 schema:value 10.1007/s12095-012-0071-9
    92 rdf:type schema:PropertyValue
    93 N3b4b65d03ea9495899fb7ad6306122a9 schema:volumeNumber 4
    94 rdf:type schema:PublicationVolume
    95 N986e6f6d12c243808c684cf96ac00123 schema:name dimensions_id
    96 schema:value pub.1047000756
    97 rdf:type schema:PropertyValue
    98 Na96483bc557641bfbba511d6255b547f schema:name Springer Nature - SN SciGraph project
    99 rdf:type schema:Organization
    100 Nf8a98b44ae234cb48aedd59a088b0a21 rdf:first sg:person.016510524306.72
    101 rdf:rest N12a59a701eb442cf8208328033c65fae
    102 anzsrc-for:01 schema:inDefinedTermSet anzsrc-for:
    103 schema:name Mathematical Sciences
    104 rdf:type schema:DefinedTerm
    105 anzsrc-for:0101 schema:inDefinedTermSet anzsrc-for:
    106 schema:name Pure Mathematics
    107 rdf:type schema:DefinedTerm
    108 anzsrc-for:0102 schema:inDefinedTermSet anzsrc-for:
    109 schema:name Applied Mathematics
    110 rdf:type schema:DefinedTerm
    111 anzsrc-for:0103 schema:inDefinedTermSet anzsrc-for:
    112 schema:name Numerical and Computational Mathematics
    113 rdf:type schema:DefinedTerm
    114 sg:journal.1136695 schema:issn 1936-2447
    115 1936-2455
    116 schema:name Cryptography and Communications
    117 schema:publisher Springer Nature
    118 rdf:type schema:Periodical
    119 sg:person.016510524306.72 schema:affiliation grid-institutes:grid.410380.e
    120 schema:familyName Knellwolf
    121 schema:givenName Simon
    122 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016510524306.72
    123 rdf:type schema:Person
    124 sg:person.07653531142.18 schema:affiliation grid-institutes:grid.410380.e
    125 schema:familyName Meier
    126 schema:givenName Willi
    127 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18
    128 rdf:type schema:Person
    129 sg:pub.10.1007/11426639_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043264875
    130 https://doi.org/10.1007/11426639_2
    131 rdf:type schema:CreativeWork
    132 sg:pub.10.1007/11799313_27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050928943
    133 https://doi.org/10.1007/11799313_27
    134 rdf:type schema:CreativeWork
    135 sg:pub.10.1007/11836810_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038251529
    136 https://doi.org/10.1007/11836810_13
    137 rdf:type schema:CreativeWork
    138 sg:pub.10.1007/3-540-36159-6_29 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014281940
    139 https://doi.org/10.1007/3-540-36159-6_29
    140 rdf:type schema:CreativeWork
    141 sg:pub.10.1007/3-540-48329-2_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023877301
    142 https://doi.org/10.1007/3-540-48329-2_17
    143 rdf:type schema:CreativeWork
    144 sg:pub.10.1007/3-540-60590-8_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018329205
    145 https://doi.org/10.1007/3-540-60590-8_16
    146 rdf:type schema:CreativeWork
    147 sg:pub.10.1007/978-1-4615-2694-0_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010308889
    148 https://doi.org/10.1007/978-1-4615-2694-0_23
    149 rdf:type schema:CreativeWork
    150 sg:pub.10.1007/978-3-540-68164-9_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033624456
    151 https://doi.org/10.1007/978-3-540-68164-9_16
    152 rdf:type schema:CreativeWork
    153 sg:pub.10.1007/978-3-540-68164-9_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001260373
    154 https://doi.org/10.1007/978-3-540-68164-9_19
    155 rdf:type schema:CreativeWork
    156 sg:pub.10.1007/978-3-540-77026-8_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041077964
    157 https://doi.org/10.1007/978-3-540-77026-8_20
    158 rdf:type schema:CreativeWork
    159 sg:pub.10.1007/978-3-642-01001-9_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052713322
    160 https://doi.org/10.1007/978-3-642-01001-9_16
    161 rdf:type schema:CreativeWork
    162 sg:pub.10.1007/978-3-642-03317-9_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041320003
    163 https://doi.org/10.1007/978-3-642-03317-9_1
    164 rdf:type schema:CreativeWork
    165 sg:pub.10.1007/978-3-642-17373-8_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017495732
    166 https://doi.org/10.1007/978-3-642-17373-8_8
    167 rdf:type schema:CreativeWork
    168 sg:pub.10.1007/978-3-642-17401-8_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016256936
    169 https://doi.org/10.1007/978-3-642-17401-8_16
    170 rdf:type schema:CreativeWork
    171 sg:pub.10.1007/978-3-642-21702-9_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030653330
    172 https://doi.org/10.1007/978-3-642-21702-9_10
    173 rdf:type schema:CreativeWork
    174 sg:pub.10.1007/978-3-642-28496-0_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020197941
    175 https://doi.org/10.1007/978-3-642-28496-0_12
    176 rdf:type schema:CreativeWork
    177 grid-institutes:grid.410380.e schema:alternateName FHNW, Windisch, Switzerland
    178 schema:name ETH Zurich, Zurich, Switzerland
    179 FHNW, Windisch, Switzerland
    180 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...