## Found 1,743 Documents (Results 1–100)

100
MathJax

### Implementation of point-counting algorithms on genus 2 hyperelliptic curves based on the birthday paradox. (English)Zbl 07510667

MSC:  68-XX 65-XX
Full Text:

MSC:  68Qxx
Full Text:

### Concentration of the collision estimator. (English)Zbl 07530251

Bampis, Evripidis (ed.) et al., Fundamentals of computation theory. 23rd international symposium, FCT 2021, Athens, Greece, September 12–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12867, 440-456 (2021).
MSC:  68Qxx
Full Text:

### Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting. (English)Zbl 07512103

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 309-336 (2021).
MSC:  94A60
Full Text:

### Attacks on beyond-birthday-bound MACs in the quantum setting. (English)Zbl 1485.94090

Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 421-441 (2021).
MSC:  94A60 94A62 81P94
Full Text:

### On the cost of ASIC hardware crackers: a SHA-1 case study. (English)Zbl 07449896

Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 657-681 (2021).
MSC:  68P25 94A60
Full Text:

### On homogeneous multivariate distributions in random occupancy models and their applications. (English)Zbl 1473.62056

MSC:  62E15 60E05
Full Text:

MSC:  01A70
Full Text:

MSC:  01A70
Full Text:

### Design of hash function using two dimensional cellular automata. (English)Zbl 07388835

Giri, Debasis (ed.) et al., Proceedings of the fifth international conference on mathematics and computing, ICMC 2019, Bhubaneswar, India, February 6–9, 2019. Singapore: Springer. Adv. Intell. Syst. Comput. 1170, 33-45 (2021).
MSC:  68-XX
Full Text:

### The Deoxys AEAD family. (English)Zbl 1470.94091

MSC:  94A60 94A62 68P25
Full Text:

### Beyond-birthday security for permutation-based Feistel networks. (English)Zbl 1459.94113

MSC:  94A60 65C10
Full Text:

### Lightweight authenticated encryption mode suitable for threshold implementation. (English)Zbl 07496567

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 705-735 (2020).
MSC:  94A60
Full Text:

### Optimal merging in quantum $$k$$-xor and $$k$$-sum algorithms. (English)Zbl 07496554

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 311-340 (2020).
Full Text:

### Tight security bounds for double-block hash-then-sum MACs. (English)Zbl 1479.94327

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 435-465 (2020).
MSC:  94A62 94A60
Full Text:

### Mind the composition: birthday bound attacks on EWCDMD and SoKAC21. (English)Zbl 1479.94337

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 203-220 (2020).
MSC:  94A62 94A60
Full Text:

### Vladimir Petrovich Platonov (on his 80th birthday). (English. Russian original)Zbl 1445.01024

Russ. Math. Surv. 75, No. 2, 387-391 (2020); translation from Usp. Mat. Nauk 75, No. 2, 197-200 (2020).
MSC:  01A70
Full Text:

### Universal forgery attack against GCM-RUP. (English)Zbl 1457.94161

Jarecki, Stanislaw (ed.), Topics in cryptology – CT-RSA 2020. The cryptographers’ track at the RSA conference 2020, San Francisco, CA, USA, February 24–28, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12006, 15-34 (2020).
MSC:  94A60
Full Text:

Full Text:

MSC:  01A70
Full Text:

### Near birthday attack on “8 bits” AEAD mode. (English)Zbl 1474.94063

MSC:  94A60 94A62
Full Text:

### How to build pseudorandom functions from public random permutations. (English)Zbl 1456.94064

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11692, 266-293 (2019).
MSC:  94A60
Full Text:

### Grigoriĭ Iosifovich Ol’shanskiĭ (on his 70th birthday). (English. Russian original)Zbl 1432.01083

Russ. Math. Surv. 74, No. 3, 555-577 (2019); translation from Usp. Mat. Nauk 74, No. 3, 193-213 (2019).
MSC:  01A70
Full Text:

### Probability, statistics, and random signals. (English)Zbl 1459.60001

Oxford: Oxford University Press (ISBN 978-0-19-020052-7/pbk). xiv, 418 p. (2019).
MSC:  60-01 62-01

### Improved XKX-based AEAD scheme: removing the birthday terms. (English)Zbl 1454.94089

Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 228-246 (2019).
MSC:  94A60 94A62
Full Text:

### Multi party computation motivated by the birthday problem. (English)Zbl 1463.94037

MSC:  94A60 60C05
Full Text:

### Parallelizable MACs based on the sum of PRPs with security beyond the birthday bound. (English)Zbl 1458.94308

Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11464, 131-151 (2019).
MSC:  94A62 94A60
Full Text:

### Hash function based on quantum walks. (English)Zbl 1433.81070

MSC:  81P94 94A60
Full Text:

MSC:  94A60
Full Text:

### Beyond-birthday secure domain-preserving PRFs from a single permutation. (English)Zbl 1445.94020

MSC:  94A60 68P25
Full Text:

### A new birthday-type algorithm for attacking the fresh re-keying countermeasure. (English)Zbl 1481.94105

MSC:  94A60 68P25
Full Text:

### Fat chance. Probability from 0 to 1. (English)Zbl 1423.00005

Cambridge: Cambridge University Press (ISBN 978-1-108-48296-7/hbk; 978-1-108-72818-8/pbk; 978-1-108-61027-8/ebook). xi, 200 p. (2019).
MSC:  00A09 97A80 60-01 97K50
Full Text:

### Surprises in probability: seventeen short stories. (English)Zbl 1408.00006

Boca Raton, FL: CRC Press (ISBN 978-0-367-00082-0/hbk; 978-0-367-00043-1/pbk; 978-0-4298-1549-2/ebook). xiii, 131 p. (2019).
MSC:  00A09 00A35 97A80 97K50 60-01
Full Text:

### On discrete distributions generated from drawing balls with bivariate labels. (English)Zbl 07416463

MSC:  62-XX 62E15 60E05
Full Text:

### Improved security bound of LightMAC_Plus and its single-key variant. (English)Zbl 07154108

Smart, Nigel P. (ed.), Topics in cryptology – CT-RSA 2018. The cryptographers’ track at the RSA conference 2018, San Francisco, CA, USA, April 16–20, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10808, 300-318 (2018).
MSC:  94A60
Full Text:

### Evgeniĭ Mikhaĭlovich Chirka. (English. Russian original)Zbl 1412.01020

Russ. Math. Surv. 73, No. 6, 1137-1144 (2018); translation from Usp. Mat. Nauk 73, No. 6, 204-210 (2018).
MSC:  01A70
Full Text:

### Aleksandr Semenovich Kholevo (on his 75th birthday). (English. Russian original)Zbl 1427.01012

Russ. Math. Surv. 73, No. 6, 1131-1136 (2018); translation from Usp. Mat. Nauk 73, No. 6, 199-203 (2018).
MSC:  01A70
Full Text:

### Quantum algorithms for the $$k$$-XOR problem. (English)Zbl 1446.94132

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 527-559 (2018).
MSC:  94A60 68Q12
Full Text:

### Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model. (English)Zbl 1446.94148

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 305-335 (2018).
MSC:  94A60
Full Text:

### Short variable length domain extenders with beyond birthday bound security. (English)Zbl 1446.94116

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 244-274 (2018).
MSC:  94A60
Full Text:

### Length-preserving encryption based on single-key tweakable block cipher. (English)Zbl 1443.94086

Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 313-326 (2018).
MSC:  94A60
Full Text:

### Simple hash function using discrete-time quantum walks. (English)Zbl 1448.81296

MSC:  81P94 60G50 81U05
Full Text:

### Constructing quantum hash functions based on quantum walks on Johnson graphs. (English)Zbl 1433.81063

MSC:  81P94 81Q93 94A60
Full Text:

MSC:  94A60
Full Text:

### Provable security of (tweakable) block ciphers based on substitution-permutation networks. (English)Zbl 1444.94055

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10991, 722-753 (2018).
MSC:  94A60
Full Text:

### Generic attacks against beyond-birthday-bound MACs. (English)Zbl 1444.94084

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10991, 306-336 (2018).
MSC:  94A60
Full Text:

### Can CAESAR beat Galois? Robustness of CAESAR candidates against nonce reusing and high data complexity attacks. (English)Zbl 1440.94102

Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 476-494 (2018).
MSC:  94A62 94A60
Full Text:

MSC:  94A60
Full Text:

MSC:  01A70
Full Text:

### Elena Ivanovna Kharlamova (on her 90th birthday). (Russian)Zbl 07510104

MSC:  01A70 70-03
Full Text:

MSC:  01A70
Full Text:

MSC:  01A70
Full Text:

### A birthday repetition theorem and complexity of approximating dense CSPs. (English)Zbl 1441.68048

Chatzigiannakis, Ioannis (ed.) et al., 44th international colloquium on automata, languages, and programming, ICALP 2017, Warsaw, Poland July 10–14, 2017. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 80, Article 78, 15 p. (2017).
Full Text:

### Honest signaling in zero-sum games is hard, and lying is even harder. (English)Zbl 1441.68080

Chatzigiannakis, Ioannis (ed.) et al., 44th international colloquium on automata, languages, and programming, ICALP 2017, Warsaw, Poland July 10–14, 2017. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 80, Article 77, 13 p. (2017).
Full Text:

### Irina Georgiyevna Goryacheva (on her birthday). (English. Russian original)Zbl 1440.01014

J. Appl. Math. Mech. 81, No. 3, 165-172 (2017); translation from Prikl. Mat. Mekh. 81, No. 3, 243-256 (2017).
MSC:  01A70
Full Text:

MSC:  01A70

### Blockcipher-based MACs: beyond the birthday bound without message length. (English)Zbl 1417.94076

Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10626, 446-470 (2017).
MSC:  94A60 94A62
Full Text:

Full Text:

MSC:  94A60
Full Text:

MSC:  01A70
Full Text:

MSC:  01A70

MSC:  01A70

MSC:  01A70
Full Text:

MSC:  01A70
Full Text:

MSC:  01A70
Full Text:

MSC:  01A70
Full Text:

### A MAC mode for lightweight block ciphers. (English)Zbl 1387.94092

Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 43-59 (2016).
MSC:  94A60
Full Text:

MSC:  01A70
Full Text:

MSC:  01A70
Full Text:

### Calculus meets the birthday problem. (English)Zbl 1384.60034

MSC:  60C05 97K50
Full Text:

### Simpira v2: a family of efficient permutations using the AES round function. (English)Zbl 1404.94077

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 95-125 (2016).
MSC:  94A60
Full Text:

### EWCDM: an efficient, beyond-birthday secure, nonce-misuse resistant MAC. (English)Zbl 1351.94034

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 121-149 (2016).
MSC:  94A60
Full Text:

### Counter-in-Tweak: authenticated encryption modes for tweakable block ciphers. (English)Zbl 1351.94063

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 33-63 (2016).
MSC:  94A60 94A62
Full Text:

### A provably secure non-iterative hash function resisting birthday attack. (English)Zbl 1371.94657

MSC:  94A60 94A62
Full Text:

### On the influence of message length in PMAC’s security bounds. (English)Zbl 1385.94057

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 596-621 (2016).
MSC:  94A60 94A62
Full Text:

### One-key compression function based MAC with security beyond birthday bound. (English)Zbl 1403.94056

Liu, Joseph K. K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-40252-9/pbk; 978-3-319-40253-6/ebook). Lecture Notes in Computer Science 9722, 343-358 (2016).
MSC:  94A60
Full Text:

### Alexander Borisovich Kurzhanskiĭ (on the occasion of his 75th birthday). (English. Russian original)Zbl 1342.01027

Proc. Steklov Inst. Math. 292, Suppl. 1, S1-S13 (2016); translation from Tr. Inst. Mat. Mekh. (Ekaterinburg) 20, No. 4, 5-16 (2014).
MSC:  01A70 93-03 49-03
Full Text:

### Valentin Anatol’evich Skvortsov (on his 80th birthday). (English. Russian original)Zbl 1377.01026

Russ. Math. Surv. 71, No. 1, 175-177 (2016); translation from Usp. Mat. Nauk 71, No. 1, 184-186 (2016).
MSC:  01A70
Full Text:

### Asymptotic distribution for the birthday problem with multiple coincidences, via an embedding of the collision process. (English)Zbl 1376.60017

MSC:  60C05 60F05 60F15
Full Text:

MSC:  94A60
Full Text:

### Formal modelling and analysis of socio-technical systems. (English)Zbl 1478.91141

Probst, Christian W. (ed.) et al., Semantics, logics, and calculi. Essays dedicated to Hanne Riis Nielson and Flemming Nielson on the occasion of their 60th birthdays. Cham: Springer. Lect. Notes Comput. Sci. 9560, 54-73 (2016).
MSC:  91C99
Full Text:

MSC:  01A70
Full Text:

MSC:  01A70
Full Text:

MSC:  01A70
Full Text:

MSC:  01A70
Full Text:

MSC:  01A70
Full Text:

MSC:  01A70
Full Text:

### Multiple discrete logarithm problems with auxiliary inputs. (English)Zbl 1396.11142

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 174-188 (2015).
MSC:  11Y16 11T71 94A60
Full Text:

### Refinements of the $$k$$-tree algorithm for the generalized birthday problem. (English)Zbl 1382.94147

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 683-703 (2015).
MSC:  94A60 05C85
Full Text:

### Beyond-birthday-bound security for tweakable Even-Mansour ciphers with linear tweak and key mixing. (English)Zbl 1375.94113

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 134-158 (2015).
MSC:  94A60
Full Text:

### On the XOR of multiple random permutations. (English)Zbl 1423.94089

Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 619-634 (2015).
MSC:  94A60 68P25
Full Text:

### Using an error-correction code for fast, beyond-birthday-bound authentication. (English)Zbl 1382.94173

Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 291-307 (2015).
MSC:  94A60 94A62
Full Text:

### A new non-Merkle-Damgård structural hash function with provable security. (English)Zbl 1465.94090

Xu, Dachuan (ed.) et al., Computing and combinatorics. 21st international conference, COCOON 2015, Beijing, China, August 4–6, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9198, 661-673 (2015).
MSC:  94A60
Full Text:

MSC:  01A70

### Optimally secure tweakable blockciphers. (English)Zbl 1382.94141

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 428-448 (2015).
MSC:  94A60
Full Text:

### The indistinguishability of the XOR of $$k$$ permutations. (English)Zbl 1382.94084

Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 285-302 (2015).
MSC:  94A60
Full Text:

MSC:  94A60
Full Text:

### Vladimir Petrovich Platonov (on his 75th birthday). (English. Russian original)Zbl 1316.01014

Russ. Math. Surv. 70, No. 1, 197-201 (2015); translation from Usp. Mat. Nauk. 70, No. 1, 204-207 (2015).
MSC:  01A70
Full Text:

### The collected papers of Albert Einstein. Vol. 14. The Berlin years: writings and correspondence, April 1923 – May 1925. English translation of selected texts. Translated by Ann M. Hentschel and Jennifer Nollar James in consultation with Klaus Hentschel. Edited by Diana Kormos Buchwald, József Illy, Ze’ev Rosenkranz, Tilman Sauer and Osik Moses. (English)Zbl 1321.01003

Princeton, NJ: Princeton University Press (ISBN 978-0-691-16422-9/pbk). xxx, 522 p. (2015).
MSC:  01A75 01A60

### The collected papers of Albert Einstein. Vol. 14. The Berlin years: writings and correspondence, April 1923 – May 1925. Edited by Diana Kormos Buchwald, József Illy, Ze’ev Rosenkranz, Tilman Sauer and Osik Moses. (English, German, French)Zbl 1321.01002

Princeton, NJ: Princeton University Press (ISBN 978-0-691-16410-6/hbk). ci, 1103 p. (2015).
MSC:  01A75 01A60

all top 5

all top 5

all top 5

all top 3

all top 3

all top 3