[{"project":[{"_id":"2533E772-B435-11E9-9278-68D0E5697425","name":"Efficient Simulation of Natural Phenomena at Extremely Large Scales","grant_number":"638176","call_identifier":"H2020"}],"abstract":[{"text":"Includes source codes, test cases, and example data used in the thesis Brittle Fracture Simulation with Boundary Elements for Computer Graphics. Also includes pre-built binaries of the HyENA library, but not sources - please contact the HyENA authors to obtain these sources if required (https://mech.tugraz.at/hyena)","lang":"eng"}],"file_date_updated":"2020-07-14T12:47:04Z","type":"research_data","citation":{"mla":"Hahn, David. <i>Source Codes: Brittle Fracture Simulation with Boundary Elements for Computer Graphics</i>. Institute of Science and Technology Austria, 2017, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:73\">10.15479/AT:ISTA:73</a>.","apa":"Hahn, D. (2017). Source codes: Brittle fracture simulation with boundary elements for computer graphics. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:73\">https://doi.org/10.15479/AT:ISTA:73</a>","chicago":"Hahn, David. “Source Codes: Brittle Fracture Simulation with Boundary Elements for Computer Graphics.” Institute of Science and Technology Austria, 2017. <a href=\"https://doi.org/10.15479/AT:ISTA:73\">https://doi.org/10.15479/AT:ISTA:73</a>.","ama":"Hahn D. Source codes: Brittle fracture simulation with boundary elements for computer graphics. 2017. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:73\">10.15479/AT:ISTA:73</a>","short":"D. Hahn, (2017).","ista":"Hahn D. 2017. Source codes: Brittle fracture simulation with boundary elements for computer graphics, Institute of Science and Technology Austria, <a href=\"https://doi.org/10.15479/AT:ISTA:73\">10.15479/AT:ISTA:73</a>.","ieee":"D. Hahn, “Source codes: Brittle fracture simulation with boundary elements for computer graphics.” Institute of Science and Technology Austria, 2017."},"_id":"5568","department":[{"_id":"ChWo"}],"article_processing_charge":"No","publisher":"Institute of Science and Technology Austria","datarep_id":"73","has_accepted_license":"1","title":"Source codes: Brittle fracture simulation with boundary elements for computer graphics","author":[{"full_name":"Hahn, David","id":"357A6A66-F248-11E8-B48F-1D18A9856A87","first_name":"David","last_name":"Hahn"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","file":[{"checksum":"2323a755842a3399cbc47d76545fc9a0","access_level":"open_access","relation":"main_file","file_id":"5615","content_type":"application/zip","creator":"system","file_size":199353471,"date_created":"2018-12-12T13:02:57Z","date_updated":"2020-07-14T12:47:04Z","file_name":"IST-2017-73-v1+1_FractureRB_v1.1_2017_07_20_final_public.zip"}],"doi":"10.15479/AT:ISTA:73","oa_version":"Published Version","ec_funded":1,"related_material":{"record":[{"relation":"research_paper","status":"public","id":"839"}]},"day":"16","status":"public","ddc":["004"],"date_created":"2018-12-12T12:31:35Z","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by-sa/4.0/legalcode","name":"Creative Commons Attribution-ShareAlike 4.0 International Public License (CC BY-SA 4.0)","image":"/images/cc_by_sa.png","short":"CC BY-SA (4.0)"},"license":"https://creativecommons.org/licenses/by-sa/4.0/","year":"2017","date_published":"2017-08-16T00:00:00Z","month":"08","oa":1,"keyword":["Boundary elements","brittle fracture","computer graphics","fracture simulation"],"date_updated":"2024-02-21T13:48:02Z"},{"volume":58,"date_created":"2018-12-11T11:47:10Z","tmp":{"short":"CC BY-NC-ND (4.0)","image":"/images/cc_by_nc_nd.png","legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)"},"ddc":["576"],"day":"14","status":"public","doi":"10.1167/iovs.17-22634","publication":"Investigative Ophthalmology and Visual Science","oa_version":"Published Version","intvolume":"        58","month":"12","date_published":"2017-12-14T00:00:00Z","date_updated":"2023-10-10T14:06:18Z","issue":"14","oa":1,"page":"6091 - 6104","license":"https://creativecommons.org/licenses/by-nc-nd/4.0/","year":"2017","citation":{"ama":"Nickells R, Schmitt H, Maes ME, Schlamp C. AAV2 mediated transduction of the mouse retina after optic nerve injury. <i>Investigative Ophthalmology and Visual Science</i>. 2017;58(14):6091-6104. doi:<a href=\"https://doi.org/10.1167/iovs.17-22634\">10.1167/iovs.17-22634</a>","short":"R. Nickells, H. Schmitt, M.E. Maes, C. Schlamp, Investigative Ophthalmology and Visual Science 58 (2017) 6091–6104.","ieee":"R. Nickells, H. Schmitt, M. E. Maes, and C. Schlamp, “AAV2 mediated transduction of the mouse retina after optic nerve injury,” <i>Investigative Ophthalmology and Visual Science</i>, vol. 58, no. 14. Association for Research in Vision and Ophthalmology, pp. 6091–6104, 2017.","ista":"Nickells R, Schmitt H, Maes ME, Schlamp C. 2017. AAV2 mediated transduction of the mouse retina after optic nerve injury. Investigative Ophthalmology and Visual Science. 58(14), 6091–6104.","chicago":"Nickells, Robert, Heather Schmitt, Margaret E Maes, and Cassandra Schlamp. “AAV2 Mediated Transduction of the Mouse Retina after Optic Nerve Injury.” <i>Investigative Ophthalmology and Visual Science</i>. Association for Research in Vision and Ophthalmology, 2017. <a href=\"https://doi.org/10.1167/iovs.17-22634\">https://doi.org/10.1167/iovs.17-22634</a>.","apa":"Nickells, R., Schmitt, H., Maes, M. E., &#38; Schlamp, C. (2017). AAV2 mediated transduction of the mouse retina after optic nerve injury. <i>Investigative Ophthalmology and Visual Science</i>. Association for Research in Vision and Ophthalmology. <a href=\"https://doi.org/10.1167/iovs.17-22634\">https://doi.org/10.1167/iovs.17-22634</a>","mla":"Nickells, Robert, et al. “AAV2 Mediated Transduction of the Mouse Retina after Optic Nerve Injury.” <i>Investigative Ophthalmology and Visual Science</i>, vol. 58, no. 14, Association for Research in Vision and Ophthalmology, 2017, pp. 6091–104, doi:<a href=\"https://doi.org/10.1167/iovs.17-22634\">10.1167/iovs.17-22634</a>."},"publication_identifier":{"issn":["01460404"]},"file_date_updated":"2020-07-14T12:47:04Z","type":"journal_article","abstract":[{"lang":"eng","text":"PURPOSE. Gene therapy of retinal ganglion cells (RGCs) has promise as a powerful therapeutic for the rescue and regeneration of these cells after optic nerve damage. However, early after damage, RGCs undergo atrophic changes, including gene silencing. It is not known if these changes will deleteriously affect transduction and transgene expression, or if the therapeutic protein can influence reactivation of the endogenous genome. METHODS. Double-transgenic mice carrying a Rosa26-(LoxP)-tdTomato reporter, and a mutant allele for the proapoptotic Bax gene were reared. The Bax mutant blocks apoptosis, but RGCs still exhibit nuclear atrophy and gene silencing. At times ranging from 1 hour to 4 weeks after optic nerve crush (ONC), eyes received an intravitreal injection of AAV2 virus carrying the Cre recombinase. Successful transduction was monitored by expression of the tdTomato reporter. Immunostaining was used to localize tdTomato expression in select cell types. RESULTS. Successful transduction of RGCs was achieved at all time points after ONC using AAV2 expressing Cre from the phosphoglycerate kinase (Pgk) promoter, but not the CMV promoter. ONC promoted an increase in the transduction of cell types in the inner nuclear layer, including Müller cells and rod bipolar neurons. There was minimal evidence of transduction of amacrine cells and astrocytes in the inner retina or optic nerve. CONCLUSIONS. Damaged RGCs can be transduced and at least some endogenous genes can be subsequently activated. Optic nerve damage may change retinal architecture to allow greater penetration of an AAV2 virus to transduce several additional cell types in the inner nuclear layer."}],"scopus_import":"1","_id":"557","quality_controlled":"1","publication_status":"published","has_accepted_license":"1","publisher":"Association for Research in Vision and Ophthalmology","file":[{"file_name":"IST-2018-920-v1+1_i1552-5783-58-14-6091.pdf","date_created":"2018-12-12T10:17:53Z","date_updated":"2020-07-14T12:47:04Z","creator":"system","file_size":2955559,"content_type":"application/pdf","file_id":"5311","access_level":"open_access","checksum":"d7a7b6f1fa9211a04e5e65634a0265d9","relation":"main_file"}],"title":"AAV2 mediated transduction of the mouse retina after optic nerve injury","author":[{"full_name":"Nickells, Robert","last_name":"Nickells","first_name":"Robert"},{"full_name":"Schmitt, Heather","last_name":"Schmitt","first_name":"Heather"},{"full_name":"Maes, Margaret E","id":"3838F452-F248-11E8-B48F-1D18A9856A87","first_name":"Margaret E","orcid":"0000-0001-9642-1085","last_name":"Maes"},{"full_name":"Schlamp, Cassandra","first_name":"Cassandra","last_name":"Schlamp"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","article_processing_charge":"No","publist_id":"7254","department":[{"_id":"SaSi"}],"language":[{"iso":"eng"}],"pubrep_id":"920"},{"doi":"10.15479/AT:ISTA:75","oa_version":"Published Version","citation":{"apa":"Hauschild, R. (2017). Forward migration indexes. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:75\">https://doi.org/10.15479/AT:ISTA:75</a>","mla":"Hauschild, Robert. <i>Forward Migration Indexes</i>. Institute of Science and Technology Austria, 2017, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:75\">10.15479/AT:ISTA:75</a>.","ama":"Hauschild R. Forward migration indexes. 2017. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:75\">10.15479/AT:ISTA:75</a>","short":"R. Hauschild, (2017).","ista":"Hauschild R. 2017. Forward migration indexes, Institute of Science and Technology Austria, <a href=\"https://doi.org/10.15479/AT:ISTA:75\">10.15479/AT:ISTA:75</a>.","ieee":"R. Hauschild, “Forward migration indexes.” Institute of Science and Technology Austria, 2017.","chicago":"Hauschild, Robert. “Forward Migration Indexes.” Institute of Science and Technology Austria, 2017. <a href=\"https://doi.org/10.15479/AT:ISTA:75\">https://doi.org/10.15479/AT:ISTA:75</a>."},"abstract":[{"lang":"eng","text":"Matlab script to calculate the forward migration indexes (<d_y>/<L>) from TrackMate spot-statistics files."}],"file_date_updated":"2020-07-14T12:47:04Z","type":"research_data","tmp":{"short":"CC0 (1.0)","image":"/images/cc_0.png","name":"Creative Commons Public Domain Dedication (CC0 1.0)","legal_code_url":"https://creativecommons.org/publicdomain/zero/1.0/legalcode"},"_id":"5570","ddc":["570"],"date_created":"2018-12-12T12:31:35Z","status":"public","day":"04","article_processing_charge":"No","department":[{"_id":"Bio"}],"license":"https://creativecommons.org/publicdomain/zero/1.0/","year":"2017","date_published":"2017-10-04T00:00:00Z","datarep_id":"75","has_accepted_license":"1","month":"10","publisher":"Institute of Science and Technology Austria","keyword":["Cell migration","tracking","forward migration index","FMI"],"date_updated":"2024-02-21T13:47:14Z","title":"Forward migration indexes","oa":1,"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","author":[{"orcid":"0000-0001-9843-3522","last_name":"Hauschild","id":"4E01D6B4-F248-11E8-B48F-1D18A9856A87","first_name":"Robert","full_name":"Hauschild, Robert"}],"file":[{"access_level":"open_access","relation":"main_file","checksum":"cb7a2fa622460eca6231d659ce590e32","file_size":799,"creator":"system","file_id":"5596","content_type":"application/octet-stream","date_updated":"2020-07-14T12:47:04Z","date_created":"2018-12-12T13:02:29Z","file_name":"IST-2017-75-v1+1_FMI.m"}]},{"publisher":"Institute of Science and Technology Austria","datarep_id":"78","date_published":"2017-11-06T00:00:00Z","has_accepted_license":"1","month":"11","oa":1,"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","author":[{"full_name":"Vicoso, Beatriz","id":"49E1C5C6-F248-11E8-B48F-1D18A9856A87","first_name":"Beatriz","orcid":"0000-0002-4579-8306","last_name":"Vicoso"}],"title":"Data for \"The genomic characterization of the t-haplotype, a mouse meiotic driver, highlights its complex history and specialized biology\"","file":[{"access_level":"open_access","checksum":"4520eb2b8379417ee916995719158f16","relation":"main_file","creator":"system","file_size":143697895,"content_type":"application/zip","file_id":"5618","date_created":"2018-12-12T13:03:00Z","date_updated":"2020-07-14T12:47:04Z","file_name":"IST-2017-78-v1+1_Data.zip"}],"date_updated":"2024-02-21T13:48:16Z","department":[{"_id":"BeVi"}],"article_processing_charge":"No","year":"2017","abstract":[{"lang":"eng","text":"This folder contains all the data used in each of the main figures of \"The genomic characterization of the t-haplotype, a mouse meiotic driver, highlights its complex history and specialized biology\" (Kelemen, R., Vicoso, B.), as well as in the supplementary figures. \r\n"}],"file_date_updated":"2020-07-14T12:47:04Z","type":"research_data","citation":{"mla":"Vicoso, Beatriz. <i>Data for “The Genomic Characterization of the t-Haplotype, a Mouse Meiotic Driver, Highlights Its Complex History and Specialized Biology.”</i> Institute of Science and Technology Austria, 2017, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:78\">10.15479/AT:ISTA:78</a>.","apa":"Vicoso, B. (2017). Data for “The genomic characterization of the t-haplotype, a mouse meiotic driver, highlights its complex history and specialized biology.” Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:78\">https://doi.org/10.15479/AT:ISTA:78</a>","chicago":"Vicoso, Beatriz. “Data for ‘The Genomic Characterization of the t-Haplotype, a Mouse Meiotic Driver, Highlights Its Complex History and Specialized Biology.’” Institute of Science and Technology Austria, 2017. <a href=\"https://doi.org/10.15479/AT:ISTA:78\">https://doi.org/10.15479/AT:ISTA:78</a>.","ieee":"B. Vicoso, “Data for ‘The genomic characterization of the t-haplotype, a mouse meiotic driver, highlights its complex history and specialized biology.’” Institute of Science and Technology Austria, 2017.","ista":"Vicoso B. 2017. Data for ‘The genomic characterization of the t-haplotype, a mouse meiotic driver, highlights its complex history and specialized biology’, Institute of Science and Technology Austria, <a href=\"https://doi.org/10.15479/AT:ISTA:78\">10.15479/AT:ISTA:78</a>.","short":"B. Vicoso, (2017).","ama":"Vicoso B. Data for “The genomic characterization of the t-haplotype, a mouse meiotic driver, highlights its complex history and specialized biology.” 2017. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:78\">10.15479/AT:ISTA:78</a>"},"status":"public","day":"06","tmp":{"short":"CC0 (1.0)","image":"/images/cc_0.png","name":"Creative Commons Public Domain Dedication (CC0 1.0)","legal_code_url":"https://creativecommons.org/publicdomain/zero/1.0/legalcode"},"ddc":["576"],"_id":"5571","date_created":"2018-12-12T12:31:36Z","doi":"10.15479/AT:ISTA:78","oa_version":"Submitted Version","contributor":[{"contributor_type":"contact_person","id":"49E1C5C6-F248-11E8-B48F-1D18A9856A87","first_name":"Beatriz","last_name":"Vicoso"}],"related_material":{"record":[{"relation":"research_paper","status":"public","id":"542"}]}},{"doi":"10.15479/AT:ISTA:79 ","related_material":{"record":[{"relation":"research_paper","status":"public","id":"542"}]},"oa_version":"Submitted Version","citation":{"apa":"Vicoso, B. (2017). Code for “The genomic characterization of the t-haplotype, a mouse meiotic driver, highlights its complex history and specialized biology.” Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:79 \">https://doi.org/10.15479/AT:ISTA:79 </a>","mla":"Vicoso, Beatriz. <i>Code for “The Genomic Characterization of the t-Haplotype, a Mouse Meiotic Driver, Highlights Its Complex History and Specialized Biology.”</i> Institute of Science and Technology Austria, 2017, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:79 \">10.15479/AT:ISTA:79 </a>.","ama":"Vicoso B. Code for “The genomic characterization of the t-haplotype, a mouse meiotic driver, highlights its complex history and specialized biology.” 2017. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:79 \">10.15479/AT:ISTA:79 </a>","ieee":"B. Vicoso, “Code for ‘The genomic characterization of the t-haplotype, a mouse meiotic driver, highlights its complex history and specialized biology.’” Institute of Science and Technology Austria, 2017.","short":"B. Vicoso, (2017).","ista":"Vicoso B. 2017. Code for ‘The genomic characterization of the t-haplotype, a mouse meiotic driver, highlights its complex history and specialized biology’, Institute of Science and Technology Austria, <a href=\"https://doi.org/10.15479/AT:ISTA:79 \">10.15479/AT:ISTA:79 </a>.","chicago":"Vicoso, Beatriz. “Code for ‘The Genomic Characterization of the t-Haplotype, a Mouse Meiotic Driver, Highlights Its Complex History and Specialized Biology.’” Institute of Science and Technology Austria, 2017. <a href=\"https://doi.org/10.15479/AT:ISTA:79 \">https://doi.org/10.15479/AT:ISTA:79 </a>."},"type":"research_data","file_date_updated":"2020-07-14T12:47:05Z","abstract":[{"text":"Code described in the Supplementary Methods of \"The genomic characterization of the t-haplotype, a mouse meiotic driver, highlights its complex history and specialized biology\" (Kelemen, R., Vicoso, B.)","lang":"eng"}],"date_created":"2018-12-12T12:31:36Z","tmp":{"short":"CC0 (1.0)","image":"/images/cc_0.png","name":"Creative Commons Public Domain Dedication (CC0 1.0)","legal_code_url":"https://creativecommons.org/publicdomain/zero/1.0/legalcode"},"_id":"5572","ddc":["576"],"day":"06","status":"public","article_processing_charge":"No","department":[{"_id":"BeVi"}],"year":"2017","month":"11","has_accepted_license":"1","datarep_id":"79","date_published":"2017-11-06T00:00:00Z","publisher":"Institute of Science and Technology Austria","date_updated":"2024-02-21T13:48:28Z","file":[{"file_size":49823,"creator":"system","content_type":"application/zip","file_id":"5643","checksum":"3e70a7bcd6ff0c38b79e4c8a7d137034","relation":"main_file","access_level":"open_access","file_name":"IST-2017-79-v1+1_Code.zip","date_updated":"2020-07-14T12:47:05Z","date_created":"2018-12-12T13:05:15Z"}],"oa":1,"author":[{"full_name":"Vicoso, Beatriz","last_name":"Vicoso","orcid":"0000-0002-4579-8306","first_name":"Beatriz","id":"49E1C5C6-F248-11E8-B48F-1D18A9856A87"}],"title":"Code for \"The genomic characterization of the t-haplotype, a mouse meiotic driver, highlights its complex history and specialized biology\"","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87"},{"article_processing_charge":"No","department":[{"_id":"SyCr"}],"publist_id":"7255","language":[{"iso":"eng"}],"article_type":"original","publisher":"The Royal Society","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","title":"Specificity of oral immune priming in the red flour beetle Tribolium castaneum","author":[{"first_name":"Momir","last_name":"Futo","full_name":"Futo, Momir"},{"last_name":"Sell","first_name":"Marie","full_name":"Sell, Marie"},{"id":"29D0B332-F248-11E8-B48F-1D18A9856A87","first_name":"Megan","orcid":"0000-0002-8696-6978","last_name":"Kutzer","full_name":"Kutzer, Megan"},{"last_name":"Kurtz","first_name":"Joachim","full_name":"Kurtz, Joachim"}],"publication_status":"published","citation":{"chicago":"Futo, Momir, Marie Sell, Megan Kutzer, and Joachim Kurtz. “Specificity of Oral Immune Priming in the Red Flour Beetle Tribolium Castaneum.” <i>Biology Letters</i>. The Royal Society, 2017. <a href=\"https://doi.org/10.1098/rsbl.2017.0632\">https://doi.org/10.1098/rsbl.2017.0632</a>.","ama":"Futo M, Sell M, Kutzer M, Kurtz J. Specificity of oral immune priming in the red flour beetle Tribolium castaneum. <i>Biology Letters</i>. 2017;13(12). doi:<a href=\"https://doi.org/10.1098/rsbl.2017.0632\">10.1098/rsbl.2017.0632</a>","ista":"Futo M, Sell M, Kutzer M, Kurtz J. 2017. Specificity of oral immune priming in the red flour beetle Tribolium castaneum. Biology Letters. 13(12), 0632.","ieee":"M. Futo, M. Sell, M. Kutzer, and J. Kurtz, “Specificity of oral immune priming in the red flour beetle Tribolium castaneum,” <i>Biology Letters</i>, vol. 13, no. 12. The Royal Society, 2017.","short":"M. Futo, M. Sell, M. Kutzer, J. Kurtz, Biology Letters 13 (2017).","mla":"Futo, Momir, et al. “Specificity of Oral Immune Priming in the Red Flour Beetle Tribolium Castaneum.” <i>Biology Letters</i>, vol. 13, no. 12, 0632, The Royal Society, 2017, doi:<a href=\"https://doi.org/10.1098/rsbl.2017.0632\">10.1098/rsbl.2017.0632</a>.","apa":"Futo, M., Sell, M., Kutzer, M., &#38; Kurtz, J. (2017). Specificity of oral immune priming in the red flour beetle Tribolium castaneum. <i>Biology Letters</i>. The Royal Society. <a href=\"https://doi.org/10.1098/rsbl.2017.0632\">https://doi.org/10.1098/rsbl.2017.0632</a>"},"publication_identifier":{"issn":["1744-9561"]},"scopus_import":"1","abstract":[{"text":"Immune specificity is the degree to which a host’s immune system discriminates among various pathogens or antigenic variants. Vertebrate immune memory is highly specific due to antibody responses. On the other hand, some invertebrates show immune priming, i.e. improved survival after secondary exposure to a previously encountered pathogen. Until now, specificity of priming has only been demonstrated via the septic infection route or when live pathogens were used for priming. Therefore, we tested for specificity in the oral priming route in the red flour beetle, Tribolium castaneum. For priming, we used pathogen-free supernatants derived from three different strains of the entomopathogen, Bacillus thuringiensis, which express different Cry toxin variants known for their toxicity against this beetle. Subsequent exposure to the infective spores showed that oral priming was specific for two naturally occurring strains, while a third engineered strain did not induce any priming effect. Our data demonstrate that oral immune priming with a non-infectious bacterial agent can be specific, but the priming effect is not universal across all bacterial strains.","lang":"eng"}],"type":"journal_article","_id":"558","quality_controlled":"1","external_id":{"pmid":["29237813"]},"year":"2017","date_published":"2017-12-01T00:00:00Z","intvolume":"        13","month":"12","article_number":"0632","date_updated":"2023-10-18T06:42:25Z","issue":"12","publication":"Biology Letters","doi":"10.1098/rsbl.2017.0632","oa_version":"None","volume":13,"pmid":1,"date_created":"2018-12-11T11:47:10Z","day":"01","status":"public"},{"volume":10625,"date_created":"2018-12-11T11:47:10Z","day":"18","status":"public","doi":"10.1007/978-3-319-70697-9_13","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2017/893.pdf"}],"related_material":{"record":[{"id":"83","relation":"dissertation_contains","status":"public"}]},"ec_funded":1,"oa_version":"Submitted Version","alternative_title":["LNCS"],"date_published":"2017-11-18T00:00:00Z","intvolume":"     10625","month":"11","date_updated":"2023-09-07T12:30:22Z","oa":1,"page":"357 - 379","conference":{"end_date":"2017-12-07","start_date":"2017-12-03","name":"ASIACRYPT: Theory and Applications of Cryptology and Information Security","location":"Hong Kong, China"},"year":"2017","citation":{"ama":"Abusalah HM, Alwen JF, Cohen B, Khilko D, Pietrzak KZ, Reyzin L. Beyond Hellman’s time-memory trade-offs with applications to proofs of space. In: Vol 10625. Springer; 2017:357-379. doi:<a href=\"https://doi.org/10.1007/978-3-319-70697-9_13\">10.1007/978-3-319-70697-9_13</a>","ista":"Abusalah HM, Alwen JF, Cohen B, Khilko D, Pietrzak KZ, Reyzin L. 2017. Beyond Hellman’s time-memory trade-offs with applications to proofs of space. ASIACRYPT: Theory and Applications of Cryptology and Information Security, LNCS, vol. 10625, 357–379.","short":"H.M. Abusalah, J.F. Alwen, B. Cohen, D. Khilko, K.Z. Pietrzak, L. Reyzin, in:, Springer, 2017, pp. 357–379.","ieee":"H. M. Abusalah, J. F. Alwen, B. Cohen, D. Khilko, K. Z. Pietrzak, and L. Reyzin, “Beyond Hellman’s time-memory trade-offs with applications to proofs of space,” presented at the ASIACRYPT: Theory and Applications of Cryptology and Information Security, Hong Kong, China, 2017, vol. 10625, pp. 357–379.","chicago":"Abusalah, Hamza M, Joel F Alwen, Bram Cohen, Danylo Khilko, Krzysztof Z Pietrzak, and Leonid Reyzin. “Beyond Hellman’s Time-Memory Trade-Offs with Applications to Proofs of Space,” 10625:357–79. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-70697-9_13\">https://doi.org/10.1007/978-3-319-70697-9_13</a>.","apa":"Abusalah, H. M., Alwen, J. F., Cohen, B., Khilko, D., Pietrzak, K. Z., &#38; Reyzin, L. (2017). Beyond Hellman’s time-memory trade-offs with applications to proofs of space (Vol. 10625, pp. 357–379). Presented at the ASIACRYPT: Theory and Applications of Cryptology and Information Security, Hong Kong, China: Springer. <a href=\"https://doi.org/10.1007/978-3-319-70697-9_13\">https://doi.org/10.1007/978-3-319-70697-9_13</a>","mla":"Abusalah, Hamza M., et al. <i>Beyond Hellman’s Time-Memory Trade-Offs with Applications to Proofs of Space</i>. Vol. 10625, Springer, 2017, pp. 357–79, doi:<a href=\"https://doi.org/10.1007/978-3-319-70697-9_13\">10.1007/978-3-319-70697-9_13</a>."},"publication_identifier":{"isbn":["978-331970696-2"]},"abstract":[{"lang":"eng","text":"Proofs of space (PoS) were suggested as more ecological and economical alternative to proofs of work, which are currently used in blockchain designs like Bitcoin. The existing PoS are based on rather sophisticated graph pebbling lower bounds. Much simpler and in several aspects more efficient schemes based on inverting random functions have been suggested, but they don’t give meaningful security guarantees due to existing time-memory trade-offs. In particular, Hellman showed that any permutation over a domain of size N can be inverted in time T by an algorithm that is given S bits of auxiliary information whenever (Formula presented). For functions Hellman gives a weaker attack with S2· T≈ N2 (e.g., S= T≈ N2/3). To prove lower bounds, one considers an adversary who has access to an oracle f: [ N] → [N] and can make T oracle queries. The best known lower bound is S· T∈ Ω(N) and holds for random functions and permutations. We construct functions that provably require more time and/or space to invert. Specifically, for any constant k we construct a function [N] → [N] that cannot be inverted unless Sk· T∈ Ω(Nk) (in particular, S= T≈ (Formula presented). Our construction does not contradict Hellman’s time-memory trade-off, because it cannot be efficiently evaluated in forward direction. However, its entire function table can be computed in time quasilinear in N, which is sufficient for the PoS application. Our simplest construction is built from a random function oracle g: [N] × [N] → [ N] and a random permutation oracle f: [N] → N] and is defined as h(x) = g(x, x′) where f(x) = π(f(x′)) with π being any involution without a fixed point, e.g. flipping all the bits. For this function we prove that any adversary who gets S bits of auxiliary information, makes at most T oracle queries, and inverts h on an ϵ fraction of outputs must satisfy S2· T∈ Ω(ϵ2N2)."}],"scopus_import":1,"type":"conference","_id":"559","quality_controlled":"1","project":[{"grant_number":"682815","call_identifier":"H2020","name":"Teaching Old Crypto New Tricks","_id":"258AA5B2-B435-11E9-9278-68D0E5697425"}],"publication_status":"published","publisher":"Springer","title":"Beyond Hellman’s time-memory trade-offs with applications to proofs of space","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","author":[{"last_name":"Abusalah","first_name":"Hamza M","id":"40297222-F248-11E8-B48F-1D18A9856A87","full_name":"Abusalah, Hamza M"},{"id":"2A8DFA8C-F248-11E8-B48F-1D18A9856A87","first_name":"Joel F","last_name":"Alwen","full_name":"Alwen, Joel F"},{"last_name":"Cohen","first_name":"Bram","full_name":"Cohen, Bram"},{"last_name":"Khilko","first_name":"Danylo","full_name":"Khilko, Danylo"},{"full_name":"Pietrzak, Krzysztof Z","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","first_name":"Krzysztof Z","orcid":"0000-0002-9139-1654","last_name":"Pietrzak"},{"full_name":"Reyzin, Leonid","first_name":"Leonid","last_name":"Reyzin"}],"publist_id":"7257","department":[{"_id":"KrPi"}],"language":[{"iso":"eng"}]},{"date_published":"2017-11-01T00:00:00Z","month":"11","intvolume":"       473","article_number":"0104","date_updated":"2021-01-12T08:03:04Z","oa":1,"issue":"2207","year":"2017","volume":473,"date_created":"2018-12-11T11:47:11Z","day":"01","status":"public","publication":"Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences","doi":"10.1098/rspa.2017.0104","main_file_link":[{"url":"https://arxiv.org/abs/1702.03229","open_access":"1"}],"ec_funded":1,"oa_version":"Submitted Version","publisher":"Royal Society of London","title":"On stochastic differential equations with arbitrarily slow convergence rates for strong approximation in two space dimensions","author":[{"first_name":"Mate","id":"44ECEDF2-F248-11E8-B48F-1D18A9856A87","last_name":"Gerencser","full_name":"Gerencser, Mate"},{"full_name":"Jentzen, Arnulf","last_name":"Jentzen","first_name":"Arnulf"},{"full_name":"Salimova, Diyora","last_name":"Salimova","first_name":"Diyora"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publist_id":"7256","department":[{"_id":"JaMa"}],"language":[{"iso":"eng"}],"publication_identifier":{"issn":["13645021"]},"citation":{"mla":"Gerencser, Mate, et al. “On Stochastic Differential Equations with Arbitrarily Slow Convergence Rates for Strong Approximation in Two Space Dimensions.” <i>Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences</i>, vol. 473, no. 2207, 0104, Royal Society of London, 2017, doi:<a href=\"https://doi.org/10.1098/rspa.2017.0104\">10.1098/rspa.2017.0104</a>.","apa":"Gerencser, M., Jentzen, A., &#38; Salimova, D. (2017). On stochastic differential equations with arbitrarily slow convergence rates for strong approximation in two space dimensions. <i>Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences</i>. Royal Society of London. <a href=\"https://doi.org/10.1098/rspa.2017.0104\">https://doi.org/10.1098/rspa.2017.0104</a>","chicago":"Gerencser, Mate, Arnulf Jentzen, and Diyora Salimova. “On Stochastic Differential Equations with Arbitrarily Slow Convergence Rates for Strong Approximation in Two Space Dimensions.” <i>Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences</i>. Royal Society of London, 2017. <a href=\"https://doi.org/10.1098/rspa.2017.0104\">https://doi.org/10.1098/rspa.2017.0104</a>.","ama":"Gerencser M, Jentzen A, Salimova D. On stochastic differential equations with arbitrarily slow convergence rates for strong approximation in two space dimensions. <i>Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences</i>. 2017;473(2207). doi:<a href=\"https://doi.org/10.1098/rspa.2017.0104\">10.1098/rspa.2017.0104</a>","ieee":"M. Gerencser, A. Jentzen, and D. Salimova, “On stochastic differential equations with arbitrarily slow convergence rates for strong approximation in two space dimensions,” <i>Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences</i>, vol. 473, no. 2207. Royal Society of London, 2017.","ista":"Gerencser M, Jentzen A, Salimova D. 2017. On stochastic differential equations with arbitrarily slow convergence rates for strong approximation in two space dimensions. Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences. 473(2207), 0104.","short":"M. Gerencser, A. Jentzen, D. Salimova, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 473 (2017)."},"scopus_import":1,"abstract":[{"lang":"eng","text":"In a recent article (Jentzen et al. 2016 Commun. Math. Sci. 14, 1477–1500 (doi:10.4310/CMS.2016.v14. n6.a1)), it has been established that, for every arbitrarily slow convergence speed and every natural number d ? {4, 5, . . .}, there exist d-dimensional stochastic differential equations with infinitely often differentiable and globally bounded coefficients such that no approximation method based on finitely many observations of the driving Brownian motion can converge in absolute mean to the solution faster than the given speed of convergence. In this paper, we strengthen the above result by proving that this slow convergence phenomenon also arises in two (d = 2) and three (d = 3) space dimensions."}],"type":"journal_article","_id":"560","quality_controlled":"1","project":[{"_id":"25681D80-B435-11E9-9278-68D0E5697425","name":"International IST Postdoc Fellowship Programme","call_identifier":"FP7","grant_number":"291734"}],"publication_status":"published"},{"issue":"12","oa":1,"date_updated":"2023-09-07T11:59:32Z","article_number":"20170646","acknowledgement":"This work was funded by an HFSP Young Investigators' grant RGY0079/2011 (C.C.G.). M.P. is a recipient of a DOC Fellowship of the Austrian Academy of Science at the Institute of Science and Technology Austria.","month":"12","intvolume":"        13","date_published":"2017-12-01T00:00:00Z","year":"2017","external_id":{"pmid":["29237814"]},"status":"public","day":"01","date_created":"2018-12-11T11:47:11Z","pmid":1,"volume":13,"oa_version":"Published Version","related_material":{"record":[{"id":"9847","relation":"research_data","status":"public"},{"id":"202","relation":"dissertation_contains","status":"public"}]},"main_file_link":[{"open_access":"1","url":"https://doi.org/10.1098/rsbl.2017.0646"}],"doi":"10.1098/rsbl.2017.0646","publication":"Biology Letters","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","author":[{"last_name":"Pleska","orcid":"0000-0001-7460-7479","id":"4569785E-F248-11E8-B48F-1D18A9856A87","first_name":"Maros","full_name":"Pleska, Maros"},{"orcid":"0000-0001-6220-2052","last_name":"Guet","first_name":"Calin C","id":"47F8433E-F248-11E8-B48F-1D18A9856A87","full_name":"Guet, Calin C"}],"title":"Effects of mutations in phage restriction sites during escape from restriction–modification","publisher":"The Royal Society","article_type":"original","language":[{"iso":"eng"}],"publist_id":"7253","department":[{"_id":"CaGu"}],"article_processing_charge":"No","quality_controlled":"1","_id":"561","type":"journal_article","abstract":[{"lang":"eng","text":"Restriction–modification systems are widespread genetic elements that protect bacteria from bacteriophage infections by recognizing and cleaving heterologous DNA at short, well-defined sequences called restriction sites. Bioinformatic evidence shows that restriction sites are significantly underrepresented in bacteriophage genomes, presumably because bacteriophages with fewer restriction sites are more likely to escape cleavage by restriction–modification systems. However, how mutations in restriction sites affect the likelihood of bacteriophage escape is unknown. Using the bacteriophage l and the restriction–modification system EcoRI, we show that while mutation effects at different restriction sites are unequal, they are independent. As a result, the probability of bacteriophage escape increases with each mutated restriction site. Our results experimentally support the role of restriction site avoidance as a response to selection imposed by restriction–modification systems and offer an insight into the events underlying the process of bacteriophage escape."}],"scopus_import":"1","citation":{"mla":"Pleska, Maros, and Calin C. Guet. “Effects of Mutations in Phage Restriction Sites during Escape from Restriction–Modification.” <i>Biology Letters</i>, vol. 13, no. 12, 20170646, The Royal Society, 2017, doi:<a href=\"https://doi.org/10.1098/rsbl.2017.0646\">10.1098/rsbl.2017.0646</a>.","apa":"Pleska, M., &#38; Guet, C. C. (2017). Effects of mutations in phage restriction sites during escape from restriction–modification. <i>Biology Letters</i>. The Royal Society. <a href=\"https://doi.org/10.1098/rsbl.2017.0646\">https://doi.org/10.1098/rsbl.2017.0646</a>","chicago":"Pleska, Maros, and Calin C Guet. “Effects of Mutations in Phage Restriction Sites during Escape from Restriction–Modification.” <i>Biology Letters</i>. The Royal Society, 2017. <a href=\"https://doi.org/10.1098/rsbl.2017.0646\">https://doi.org/10.1098/rsbl.2017.0646</a>.","ama":"Pleska M, Guet CC. Effects of mutations in phage restriction sites during escape from restriction–modification. <i>Biology Letters</i>. 2017;13(12). doi:<a href=\"https://doi.org/10.1098/rsbl.2017.0646\">10.1098/rsbl.2017.0646</a>","ista":"Pleska M, Guet CC. 2017. Effects of mutations in phage restriction sites during escape from restriction–modification. Biology Letters. 13(12), 20170646.","short":"M. Pleska, C.C. Guet, Biology Letters 13 (2017).","ieee":"M. Pleska and C. C. Guet, “Effects of mutations in phage restriction sites during escape from restriction–modification,” <i>Biology Letters</i>, vol. 13, no. 12. The Royal Society, 2017."},"publication_identifier":{"issn":["1744-9561"]},"publication_status":"published","project":[{"_id":"251BCBEC-B435-11E9-9278-68D0E5697425","name":"Multi-Level Conflicts in Evolutionary Dynamics of Restriction-Modification Systems (HFSP Young investigators' grant)","grant_number":"RGY0079/2011"},{"name":"Effects of Stochasticity on the Function of Restriction-Modi cation Systems at the Single-Cell Level (DOC Fellowship)","_id":"251D65D8-B435-11E9-9278-68D0E5697425","grant_number":"24210"}]},{"publication_status":"published","project":[{"name":"Random matrices, universality and disordered quantum systems","_id":"258DCDE6-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","grant_number":"338804"}],"quality_controlled":"1","_id":"567","type":"book","abstract":[{"text":"This book is a concise and self-contained introduction of recent techniques to prove local spectral universality for large random matrices. Random matrix theory is a fast expanding research area, and this book mainly focuses on the methods that the authors participated in developing over the past few years. Many other interesting topics are not included, and neither are several new developments within the framework of these methods. The authors have chosen instead to present key concepts that they believe are the core of these methods and should be relevant for future applications. They keep technicalities to a minimum to make the book accessible to graduate students. With this in mind, they include in this book the basic notions and tools for high-dimensional analysis, such as large deviation, entropy, Dirichlet form, and the logarithmic Sobolev inequality.\r\n","lang":"eng"}],"citation":{"chicago":"Erdös, László, and Horng Yau. <i>A Dynamical Approach to Random Matrix Theory</i>. Vol. 28. Courant Lecture Notes. American Mathematical Society, 2017. <a href=\"https://doi.org/10.1090/cln/028\">https://doi.org/10.1090/cln/028</a>.","ama":"Erdös L, Yau H. <i>A Dynamical Approach to Random Matrix Theory</i>. Vol 28. American Mathematical Society; 2017. doi:<a href=\"https://doi.org/10.1090/cln/028\">10.1090/cln/028</a>","ista":"Erdös L, Yau H. 2017. A Dynamical Approach to Random Matrix Theory, American Mathematical Society, 226p.","short":"L. Erdös, H. Yau, A Dynamical Approach to Random Matrix Theory, American Mathematical Society, 2017.","ieee":"L. Erdös and H. Yau, <i>A Dynamical Approach to Random Matrix Theory</i>, vol. 28. American Mathematical Society, 2017.","mla":"Erdös, László, and Horng Yau. <i>A Dynamical Approach to Random Matrix Theory</i>. Vol. 28, American Mathematical Society, 2017, doi:<a href=\"https://doi.org/10.1090/cln/028\">10.1090/cln/028</a>.","apa":"Erdös, L., &#38; Yau, H. (2017). <i>A Dynamical Approach to Random Matrix Theory</i> (Vol. 28). American Mathematical Society. <a href=\"https://doi.org/10.1090/cln/028\">https://doi.org/10.1090/cln/028</a>"},"publication_identifier":{"isbn":["9-781-4704-3648-3"],"eisbn":["978-1-4704-4194-4"]},"language":[{"iso":"eng"}],"department":[{"_id":"LaEr"}],"publist_id":"7247","article_processing_charge":"No","title":"A Dynamical Approach to Random Matrix Theory","author":[{"orcid":"0000-0001-5366-9603","last_name":"Erdös","first_name":"László","id":"4DBD5372-F248-11E8-B48F-1D18A9856A87","full_name":"Erdös, László"},{"last_name":"Yau","first_name":"Horng","full_name":"Yau, Horng"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"American Mathematical Society","ec_funded":1,"oa_version":"None","doi":"10.1090/cln/028","status":"public","day":"01","date_created":"2018-12-11T11:47:13Z","volume":28,"year":"2017","series_title":"Courant Lecture Notes","page":"226","date_updated":"2022-05-24T06:57:28Z","month":"01","intvolume":"        28","date_published":"2017-01-01T00:00:00Z","alternative_title":["Courant Lecture Notes"]},{"date_updated":"2021-01-12T08:03:12Z","issue":"2","oa":1,"month":"01","intvolume":"        19","date_published":"2017-01-01T00:00:00Z","year":"2017","page":"313 - 342","date_created":"2018-12-11T11:47:14Z","status":"public","day":"01","volume":19,"oa_version":"Submitted Version","ec_funded":1,"main_file_link":[{"url":"https://arxiv.org/abs/1507.04310","open_access":"1"}],"doi":"10.4310/HHA.2017.v19.n2.a16","publication":"Homology, Homotopy and Applications","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","author":[{"full_name":"Franek, Peter","last_name":"Franek","id":"473294AE-F248-11E8-B48F-1D18A9856A87","first_name":"Peter"},{"first_name":"Marek","id":"33E21118-F248-11E8-B48F-1D18A9856A87","last_name":"Krcál","full_name":"Krcál, Marek"}],"title":"Persistence of zero sets","publisher":"International Press","language":[{"iso":"eng"}],"publist_id":"7246","department":[{"_id":"UlWa"},{"_id":"HeEd"}],"_id":"568","quality_controlled":"1","citation":{"apa":"Franek, P., &#38; Krcál, M. (2017). Persistence of zero sets. <i>Homology, Homotopy and Applications</i>. International Press. <a href=\"https://doi.org/10.4310/HHA.2017.v19.n2.a16\">https://doi.org/10.4310/HHA.2017.v19.n2.a16</a>","mla":"Franek, Peter, and Marek Krcál. “Persistence of Zero Sets.” <i>Homology, Homotopy and Applications</i>, vol. 19, no. 2, International Press, 2017, pp. 313–42, doi:<a href=\"https://doi.org/10.4310/HHA.2017.v19.n2.a16\">10.4310/HHA.2017.v19.n2.a16</a>.","ama":"Franek P, Krcál M. Persistence of zero sets. <i>Homology, Homotopy and Applications</i>. 2017;19(2):313-342. doi:<a href=\"https://doi.org/10.4310/HHA.2017.v19.n2.a16\">10.4310/HHA.2017.v19.n2.a16</a>","short":"P. Franek, M. Krcál, Homology, Homotopy and Applications 19 (2017) 313–342.","ista":"Franek P, Krcál M. 2017. Persistence of zero sets. Homology, Homotopy and Applications. 19(2), 313–342.","ieee":"P. Franek and M. Krcál, “Persistence of zero sets,” <i>Homology, Homotopy and Applications</i>, vol. 19, no. 2. International Press, pp. 313–342, 2017.","chicago":"Franek, Peter, and Marek Krcál. “Persistence of Zero Sets.” <i>Homology, Homotopy and Applications</i>. International Press, 2017. <a href=\"https://doi.org/10.4310/HHA.2017.v19.n2.a16\">https://doi.org/10.4310/HHA.2017.v19.n2.a16</a>."},"publication_identifier":{"issn":["15320073"]},"type":"journal_article","abstract":[{"text":"We study robust properties of zero sets of continuous maps f: X → ℝn. Formally, we analyze the family Z&lt; r(f) := (g-1(0): ||g - f|| &lt; r) of all zero sets of all continuous maps g closer to f than r in the max-norm. All of these sets are outside A := (x: |f(x)| ≥ r) and we claim that Z&lt; r(f) is fully determined by A and an element of a certain cohomotopy group which (by a recent result) is computable whenever the dimension of X is at most 2n - 3. By considering all r &gt; 0 simultaneously, the pointed cohomotopy groups form a persistence module-a structure leading to persistence diagrams as in the case of persistent homology or well groups. Eventually, we get a descriptor of persistent robust properties of zero sets that has better descriptive power (Theorem A) and better computability status (Theorem B) than the established well diagrams. Moreover, if we endow every point of each zero set with gradients of the perturbation, the robust description of the zero sets by elements of cohomotopy groups is in some sense the best possible (Theorem C).","lang":"eng"}],"scopus_import":1,"project":[{"name":"International IST Postdoc Fellowship Programme","_id":"25681D80-B435-11E9-9278-68D0E5697425","call_identifier":"FP7","grant_number":"291734"},{"name":"Atomic-Resolution Structures of Mitochondrial Respiratory Chain Supercomplexes (H2020)","_id":"2590DB08-B435-11E9-9278-68D0E5697425","grant_number":"701309","call_identifier":"H2020"}],"publication_status":"published"},{"year":"2017","license":"https://creativecommons.org/licenses/by/4.0/","date_updated":"2023-02-23T12:30:29Z","oa":1,"date_published":"2017-11-06T00:00:00Z","intvolume":"         6","month":"11","article_number":"e30867","oa_version":"Published Version","publication":"eLife","doi":"10.7554/eLife.30867","ddc":["570"],"tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"date_created":"2018-12-11T11:47:14Z","status":"public","day":"06","volume":6,"language":[{"iso":"eng"}],"pubrep_id":"919","department":[{"_id":"MiSi"}],"publist_id":"7245","author":[{"full_name":"Spira, Felix","last_name":"Spira","first_name":"Felix"},{"full_name":"Cuylen Haering, Sara","last_name":"Cuylen Haering","first_name":"Sara"},{"last_name":"Mehta","first_name":"Shalin","full_name":"Mehta, Shalin"},{"last_name":"Samwer","first_name":"Matthias","full_name":"Samwer, Matthias"},{"full_name":"Reversat, Anne","orcid":"0000-0003-0666-8928","last_name":"Reversat","first_name":"Anne","id":"35B76592-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Amitabh","last_name":"Verma","full_name":"Verma, Amitabh"},{"last_name":"Oldenbourg","first_name":"Rudolf","full_name":"Oldenbourg, Rudolf"},{"full_name":"Sixt, Michael K","id":"41E9FBEA-F248-11E8-B48F-1D18A9856A87","first_name":"Michael K","last_name":"Sixt","orcid":"0000-0002-6620-9179"},{"first_name":"Daniel","last_name":"Gerlich","full_name":"Gerlich, Daniel"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","title":"Cytokinesis in vertebrate cells initiates by contraction of an equatorial actomyosin network composed of randomly oriented filaments","file":[{"checksum":"ba09c1451153d39e4f4b7cee013e314c","access_level":"open_access","relation":"main_file","creator":"system","file_size":9666973,"file_id":"4829","content_type":"application/pdf","date_created":"2018-12-12T10:10:40Z","date_updated":"2020-07-14T12:47:10Z","file_name":"IST-2017-919-v1+1_elife-30867-figures-v1.pdf"},{"relation":"main_file","checksum":"01eb51f1d6ad679947415a51c988e137","access_level":"open_access","file_id":"4830","content_type":"application/pdf","creator":"system","file_size":5951246,"date_created":"2018-12-12T10:10:41Z","date_updated":"2020-07-14T12:47:10Z","file_name":"IST-2017-919-v1+2_elife-30867-v1.pdf"}],"has_accepted_license":"1","publisher":"eLife Sciences Publications","publication_status":"published","_id":"569","quality_controlled":"1","citation":{"ista":"Spira F, Cuylen Haering S, Mehta S, Samwer M, Reversat A, Verma A, Oldenbourg R, Sixt MK, Gerlich D. 2017. Cytokinesis in vertebrate cells initiates by contraction of an equatorial actomyosin network composed of randomly oriented filaments. eLife. 6, e30867.","short":"F. Spira, S. Cuylen Haering, S. Mehta, M. Samwer, A. Reversat, A. Verma, R. Oldenbourg, M.K. Sixt, D. Gerlich, ELife 6 (2017).","ieee":"F. Spira <i>et al.</i>, “Cytokinesis in vertebrate cells initiates by contraction of an equatorial actomyosin network composed of randomly oriented filaments,” <i>eLife</i>, vol. 6. eLife Sciences Publications, 2017.","ama":"Spira F, Cuylen Haering S, Mehta S, et al. Cytokinesis in vertebrate cells initiates by contraction of an equatorial actomyosin network composed of randomly oriented filaments. <i>eLife</i>. 2017;6. doi:<a href=\"https://doi.org/10.7554/eLife.30867\">10.7554/eLife.30867</a>","chicago":"Spira, Felix, Sara Cuylen Haering, Shalin Mehta, Matthias Samwer, Anne Reversat, Amitabh Verma, Rudolf Oldenbourg, Michael K Sixt, and Daniel Gerlich. “Cytokinesis in Vertebrate Cells Initiates by Contraction of an Equatorial Actomyosin Network Composed of Randomly Oriented Filaments.” <i>ELife</i>. eLife Sciences Publications, 2017. <a href=\"https://doi.org/10.7554/eLife.30867\">https://doi.org/10.7554/eLife.30867</a>.","apa":"Spira, F., Cuylen Haering, S., Mehta, S., Samwer, M., Reversat, A., Verma, A., … Gerlich, D. (2017). Cytokinesis in vertebrate cells initiates by contraction of an equatorial actomyosin network composed of randomly oriented filaments. <i>ELife</i>. eLife Sciences Publications. <a href=\"https://doi.org/10.7554/eLife.30867\">https://doi.org/10.7554/eLife.30867</a>","mla":"Spira, Felix, et al. “Cytokinesis in Vertebrate Cells Initiates by Contraction of an Equatorial Actomyosin Network Composed of Randomly Oriented Filaments.” <i>ELife</i>, vol. 6, e30867, eLife Sciences Publications, 2017, doi:<a href=\"https://doi.org/10.7554/eLife.30867\">10.7554/eLife.30867</a>."},"publication_identifier":{"issn":["2050084X"]},"abstract":[{"text":"The actomyosin ring generates force to ingress the cytokinetic cleavage furrow in animal cells, yet its filament organization and the mechanism of contractility is not well understood. We quantified actin filament order in human cells using fluorescence polarization microscopy and found that cleavage furrow ingression initiates by contraction of an equatorial actin network with randomly oriented filaments. The network subsequently gradually reoriented actin filaments along the cell equator. This strictly depended on myosin II activity, suggesting local network reorganization by mechanical forces. Cortical laser microsurgery revealed that during cytokinesis progression, mechanical tension increased substantially along the direction of the cell equator, while the network contracted laterally along the pole-to-pole axis without a detectable increase in tension. Our data suggest that an asymmetric increase in cortical tension promotes filament reorientation along the cytokinetic cleavage furrow, which might have implications for diverse other biological processes involving actomyosin rings.","lang":"eng"}],"scopus_import":1,"file_date_updated":"2020-07-14T12:47:10Z","type":"journal_article"},{"abstract":[{"lang":"eng","text":"Most phenotypes are determined by molecular systems composed of specifically interacting molecules. However, unlike for individual components, little is known about the distributions of mutational effects of molecular systems as a whole. We ask how the distribution of mutational effects of a transcriptional regulatory system differs from the distributions of its components, by first independently, and then simultaneously, mutating a transcription factor and the associated promoter it represses. We find that the system distribution exhibits increased phenotypic variation compared to individual component distributions - an effect arising from intermolecular epistasis between the transcription factor and its DNA-binding site. In large part, this epistasis can be qualitatively attributed to the structure of the transcriptional regulatory system and could therefore be a common feature in prokaryotes. Counter-intuitively, intermolecular epistasis can alleviate the constraints of individual components, thereby increasing phenotypic variation that selection could act on and facilitating adaptive evolution. "}],"scopus_import":1,"type":"journal_article","file_date_updated":"2020-07-14T12:47:10Z","publication_identifier":{"issn":["2050084X"]},"citation":{"ama":"Lagator M, Sarikas S, Acar H, Bollback JP, Guet CC. Regulatory network structure determines patterns of intermolecular epistasis. <i>eLife</i>. 2017;6. doi:<a href=\"https://doi.org/10.7554/eLife.28921\">10.7554/eLife.28921</a>","ista":"Lagator M, Sarikas S, Acar H, Bollback JP, Guet CC. 2017. Regulatory network structure determines patterns of intermolecular epistasis. eLife. 6, e28921.","short":"M. Lagator, S. Sarikas, H. Acar, J.P. Bollback, C.C. Guet, ELife 6 (2017).","ieee":"M. Lagator, S. Sarikas, H. Acar, J. P. Bollback, and C. C. Guet, “Regulatory network structure determines patterns of intermolecular epistasis,” <i>eLife</i>, vol. 6. eLife Sciences Publications, 2017.","chicago":"Lagator, Mato, Srdjan Sarikas, Hande Acar, Jonathan P Bollback, and Calin C Guet. “Regulatory Network Structure Determines Patterns of Intermolecular Epistasis.” <i>ELife</i>. eLife Sciences Publications, 2017. <a href=\"https://doi.org/10.7554/eLife.28921\">https://doi.org/10.7554/eLife.28921</a>.","apa":"Lagator, M., Sarikas, S., Acar, H., Bollback, J. P., &#38; Guet, C. C. (2017). Regulatory network structure determines patterns of intermolecular epistasis. <i>ELife</i>. eLife Sciences Publications. <a href=\"https://doi.org/10.7554/eLife.28921\">https://doi.org/10.7554/eLife.28921</a>","mla":"Lagator, Mato, et al. “Regulatory Network Structure Determines Patterns of Intermolecular Epistasis.” <i>ELife</i>, vol. 6, e28921, eLife Sciences Publications, 2017, doi:<a href=\"https://doi.org/10.7554/eLife.28921\">10.7554/eLife.28921</a>."},"quality_controlled":"1","_id":"570","publication_status":"published","project":[{"grant_number":"291734","call_identifier":"FP7","name":"International IST Postdoc Fellowship Programme","_id":"25681D80-B435-11E9-9278-68D0E5697425"},{"name":"Selective Barriers to Horizontal Gene Transfer","_id":"2578D616-B435-11E9-9278-68D0E5697425","call_identifier":"H2020","grant_number":"648440"}],"publisher":"eLife Sciences Publications","has_accepted_license":"1","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","author":[{"first_name":"Mato","id":"345D25EC-F248-11E8-B48F-1D18A9856A87","last_name":"Lagator","full_name":"Lagator, Mato"},{"id":"35F0286E-F248-11E8-B48F-1D18A9856A87","first_name":"Srdjan","last_name":"Sarikas","full_name":"Sarikas, Srdjan"},{"orcid":"0000-0003-1986-9753","last_name":"Acar","first_name":"Hande","id":"2DDF136A-F248-11E8-B48F-1D18A9856A87","full_name":"Acar, Hande"},{"full_name":"Bollback, Jonathan P","last_name":"Bollback","orcid":"0000-0002-4624-4612","first_name":"Jonathan P","id":"2C6FA9CC-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Guet, Calin C","first_name":"Calin C","id":"47F8433E-F248-11E8-B48F-1D18A9856A87","last_name":"Guet","orcid":"0000-0001-6220-2052"}],"title":"Regulatory network structure determines patterns of intermolecular epistasis","file":[{"file_id":"5096","content_type":"application/pdf","file_size":8453470,"creator":"system","relation":"main_file","checksum":"273ab17f33305e4eaafd911ff88e7c5b","access_level":"open_access","file_name":"IST-2017-918-v1+1_elife-28921-figures-v3.pdf","date_created":"2018-12-12T10:14:42Z","date_updated":"2020-07-14T12:47:10Z"},{"checksum":"b433f90576c7be597cd43367946f8e7f","access_level":"open_access","relation":"main_file","creator":"system","file_size":1953221,"file_id":"5097","content_type":"application/pdf","date_updated":"2020-07-14T12:47:10Z","date_created":"2018-12-12T10:14:43Z","file_name":"IST-2017-918-v1+2_elife-28921-v3.pdf"}],"publist_id":"7244","department":[{"_id":"CaGu"},{"_id":"JoBo"},{"_id":"NiBa"}],"pubrep_id":"918","language":[{"iso":"eng"}],"volume":6,"status":"public","day":"13","tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"date_created":"2018-12-11T11:47:14Z","ddc":["576"],"publication":"eLife","doi":"10.7554/eLife.28921","ec_funded":1,"oa_version":"Published Version","article_number":"e28921","date_published":"2017-11-13T00:00:00Z","month":"11","intvolume":"         6","oa":1,"date_updated":"2021-01-12T08:03:15Z","year":"2017"},{"quality_controlled":"1","_id":"571","abstract":[{"text":"Blood platelets are critical for hemostasis and thrombosis and play diverse roles during immune responses. Despite these versatile tasks in mammalian biology, their skills on a cellular level are deemed limited, mainly consisting in rolling, adhesion, and aggregate formation. Here, we identify an unappreciated asset of platelets and show that adherent platelets use adhesion receptors to mechanically probe the adhesive substrate in their local microenvironment. When actomyosin-dependent traction forces overcome substrate resistance, platelets migrate and pile up the adhesive substrate together with any bound particulate material. They use this ability to act as cellular scavengers, scanning the vascular surface for potential invaders and collecting deposited bacteria. Microbe collection by migrating platelets boosts the activity of professional phagocytes, exacerbating inflammatory tissue injury in sepsis. This assigns platelets a central role in innate immune responses and identifies them as potential targets to dampen inflammatory tissue damage in clinical scenarios of severe systemic infection. In addition to their role in thrombosis and hemostasis, platelets can also migrate to sites of infection to help trap bacteria and clear the vascular surface.","lang":"eng"}],"scopus_import":1,"type":"journal_article","publication_identifier":{"issn":["00928674"]},"citation":{"chicago":"Gärtner, Florian R, Zerkah Ahmad, Gerhild Rosenberger, Shuxia Fan, Leo Nicolai, Benjamin Busch, Gökce Yavuz, et al. “Migrating Platelets Are Mechano Scavengers That Collect and Bundle Bacteria.” <i>Cell Press</i>. Cell Press, 2017. <a href=\"https://doi.org/10.1016/j.cell.2017.11.001\">https://doi.org/10.1016/j.cell.2017.11.001</a>.","ista":"Gärtner FR, Ahmad Z, Rosenberger G, Fan S, Nicolai L, Busch B, Yavuz G, Luckner M, Ishikawa Ankerhold H, Hennel R, Benechet A, Lorenz M, Chandraratne S, Schubert I, Helmer S, Striednig B, Stark K, Janko M, Böttcher R, Verschoor A, Leon C, Gachet C, Gudermann T, Mederos Y Schnitzler M, Pincus Z, Iannacone M, Haas R, Wanner G, Lauber K, Sixt MK, Massberg S. 2017. Migrating platelets are mechano scavengers that collect and bundle bacteria. Cell Press. 171(6), 1368–1382.","short":"F.R. Gärtner, Z. Ahmad, G. Rosenberger, S. Fan, L. Nicolai, B. Busch, G. Yavuz, M. Luckner, H. Ishikawa Ankerhold, R. Hennel, A. Benechet, M. Lorenz, S. Chandraratne, I. Schubert, S. Helmer, B. Striednig, K. Stark, M. Janko, R. Böttcher, A. Verschoor, C. Leon, C. Gachet, T. Gudermann, M. Mederos Y Schnitzler, Z. Pincus, M. Iannacone, R. Haas, G. Wanner, K. Lauber, M.K. Sixt, S. Massberg, Cell Press 171 (2017) 1368–1382.","ieee":"F. R. Gärtner <i>et al.</i>, “Migrating platelets are mechano scavengers that collect and bundle bacteria,” <i>Cell Press</i>, vol. 171, no. 6. Cell Press, pp. 1368–1382, 2017.","ama":"Gärtner FR, Ahmad Z, Rosenberger G, et al. Migrating platelets are mechano scavengers that collect and bundle bacteria. <i>Cell Press</i>. 2017;171(6):1368-1382. doi:<a href=\"https://doi.org/10.1016/j.cell.2017.11.001\">10.1016/j.cell.2017.11.001</a>","mla":"Gärtner, Florian R., et al. “Migrating Platelets Are Mechano Scavengers That Collect and Bundle Bacteria.” <i>Cell Press</i>, vol. 171, no. 6, Cell Press, 2017, pp. 1368–82, doi:<a href=\"https://doi.org/10.1016/j.cell.2017.11.001\">10.1016/j.cell.2017.11.001</a>.","apa":"Gärtner, F. R., Ahmad, Z., Rosenberger, G., Fan, S., Nicolai, L., Busch, B., … Massberg, S. (2017). Migrating platelets are mechano scavengers that collect and bundle bacteria. <i>Cell Press</i>. Cell Press. <a href=\"https://doi.org/10.1016/j.cell.2017.11.001\">https://doi.org/10.1016/j.cell.2017.11.001</a>"},"publication_status":"published","project":[{"_id":"260AA4E2-B435-11E9-9278-68D0E5697425","name":"Mechanical Adaptation of Lamellipodial Actin Networks in Migrating Cells","call_identifier":"H2020","grant_number":"747687"}],"author":[{"full_name":"Gärtner, Florian R","orcid":"0000-0001-6120-3723","last_name":"Gärtner","id":"397A88EE-F248-11E8-B48F-1D18A9856A87","first_name":"Florian R"},{"last_name":"Ahmad","first_name":"Zerkah","full_name":"Ahmad, Zerkah"},{"first_name":"Gerhild","last_name":"Rosenberger","full_name":"Rosenberger, Gerhild"},{"full_name":"Fan, Shuxia","first_name":"Shuxia","last_name":"Fan"},{"first_name":"Leo","last_name":"Nicolai","full_name":"Nicolai, Leo"},{"last_name":"Busch","first_name":"Benjamin","full_name":"Busch, Benjamin"},{"first_name":"Gökce","last_name":"Yavuz","full_name":"Yavuz, Gökce"},{"full_name":"Luckner, Manja","first_name":"Manja","last_name":"Luckner"},{"full_name":"Ishikawa Ankerhold, Hellen","first_name":"Hellen","last_name":"Ishikawa Ankerhold"},{"full_name":"Hennel, Roman","last_name":"Hennel","first_name":"Roman"},{"first_name":"Alexandre","last_name":"Benechet","full_name":"Benechet, Alexandre"},{"full_name":"Lorenz, Michael","last_name":"Lorenz","first_name":"Michael"},{"full_name":"Chandraratne, Sue","first_name":"Sue","last_name":"Chandraratne"},{"last_name":"Schubert","first_name":"Irene","full_name":"Schubert, Irene"},{"full_name":"Helmer, Sebastian","last_name":"Helmer","first_name":"Sebastian"},{"full_name":"Striednig, Bianca","first_name":"Bianca","last_name":"Striednig"},{"first_name":"Konstantin","last_name":"Stark","full_name":"Stark, Konstantin"},{"full_name":"Janko, Marek","last_name":"Janko","first_name":"Marek"},{"last_name":"Böttcher","first_name":"Ralph","full_name":"Böttcher, Ralph"},{"full_name":"Verschoor, Admar","first_name":"Admar","last_name":"Verschoor"},{"first_name":"Catherine","last_name":"Leon","full_name":"Leon, Catherine"},{"full_name":"Gachet, Christian","first_name":"Christian","last_name":"Gachet"},{"full_name":"Gudermann, Thomas","last_name":"Gudermann","first_name":"Thomas"},{"full_name":"Mederos Y Schnitzler, Michael","last_name":"Mederos Y Schnitzler","first_name":"Michael"},{"first_name":"Zachary","last_name":"Pincus","full_name":"Pincus, Zachary"},{"full_name":"Iannacone, Matteo","last_name":"Iannacone","first_name":"Matteo"},{"first_name":"Rainer","last_name":"Haas","full_name":"Haas, Rainer"},{"full_name":"Wanner, Gerhard","first_name":"Gerhard","last_name":"Wanner"},{"first_name":"Kirsten","last_name":"Lauber","full_name":"Lauber, Kirsten"},{"orcid":"0000-0002-6620-9179","last_name":"Sixt","first_name":"Michael K","id":"41E9FBEA-F248-11E8-B48F-1D18A9856A87","full_name":"Sixt, Michael K"},{"last_name":"Massberg","first_name":"Steffen","full_name":"Massberg, Steffen"}],"title":"Migrating platelets are mechano scavengers that collect and bundle bacteria","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Cell Press","language":[{"iso":"eng"}],"department":[{"_id":"MiSi"}],"publist_id":"7243","status":"public","day":"30","date_created":"2018-12-11T11:47:15Z","volume":171,"oa_version":"None","ec_funded":1,"publication":"Cell Press","doi":"10.1016/j.cell.2017.11.001","issue":"6","date_updated":"2021-01-12T08:03:15Z","date_published":"2017-11-30T00:00:00Z","intvolume":"       171","month":"11","year":"2017","page":"1368 - 1382"},{"publication_status":"published","citation":{"ista":"Olatunji D, Geelen D, Verstraeten I. 2017. Control of endogenous auxin levels in plant root development. International Journal of Molecular Sciences. 18(12), 2587.","short":"D. Olatunji, D. Geelen, I. Verstraeten, International Journal of Molecular Sciences 18 (2017).","ieee":"D. Olatunji, D. Geelen, and I. Verstraeten, “Control of endogenous auxin levels in plant root development,” <i>International Journal of Molecular Sciences</i>, vol. 18, no. 12. MDPI, 2017.","ama":"Olatunji D, Geelen D, Verstraeten I. Control of endogenous auxin levels in plant root development. <i>International Journal of Molecular Sciences</i>. 2017;18(12). doi:<a href=\"https://doi.org/10.3390/ijms18122587\">10.3390/ijms18122587</a>","chicago":"Olatunji, Damilola, Danny Geelen, and Inge Verstraeten. “Control of Endogenous Auxin Levels in Plant Root Development.” <i>International Journal of Molecular Sciences</i>. MDPI, 2017. <a href=\"https://doi.org/10.3390/ijms18122587\">https://doi.org/10.3390/ijms18122587</a>.","apa":"Olatunji, D., Geelen, D., &#38; Verstraeten, I. (2017). Control of endogenous auxin levels in plant root development. <i>International Journal of Molecular Sciences</i>. MDPI. <a href=\"https://doi.org/10.3390/ijms18122587\">https://doi.org/10.3390/ijms18122587</a>","mla":"Olatunji, Damilola, et al. “Control of Endogenous Auxin Levels in Plant Root Development.” <i>International Journal of Molecular Sciences</i>, vol. 18, no. 12, 2587, MDPI, 2017, doi:<a href=\"https://doi.org/10.3390/ijms18122587\">10.3390/ijms18122587</a>."},"scopus_import":"1","abstract":[{"text":"In this review, we summarize the different biosynthesis-related pathways that contribute to the regulation of endogenous auxin in plants. We demonstrate that all known genes involved in auxin biosynthesis also have a role in root formation, from the initiation of a root meristem during embryogenesis to the generation of a functional root system with a primary root, secondary lateral root branches and adventitious roots. Furthermore, the versatile adaptation of root development in response to environmental challenges is mediated by both local and distant control of auxin biosynthesis. In conclusion, auxin homeostasis mediated by spatial and temporal regulation of auxin biosynthesis plays a central role in determining root architecture.","lang":"eng"}],"type":"journal_article","file_date_updated":"2020-07-14T12:47:10Z","_id":"572","quality_controlled":"1","article_processing_charge":"No","department":[{"_id":"JiFr"}],"publist_id":"7242","language":[{"iso":"eng"}],"pubrep_id":"917","has_accepted_license":"1","publisher":"MDPI","title":"Control of endogenous auxin levels in plant root development","author":[{"full_name":"Olatunji, Damilola","last_name":"Olatunji","first_name":"Damilola"},{"full_name":"Geelen, Danny","first_name":"Danny","last_name":"Geelen"},{"full_name":"Verstraeten, Inge","last_name":"Verstraeten","orcid":"0000-0001-7241-2328","id":"362BF7FE-F248-11E8-B48F-1D18A9856A87","first_name":"Inge"}],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","file":[{"file_id":"4718","content_type":"application/pdf","file_size":920962,"creator":"system","access_level":"open_access","relation":"main_file","checksum":"82d51f11e493f7eec02976d9a9a9805e","file_name":"IST-2017-917-v1+1_ijms-18-02587.pdf","date_created":"2018-12-12T10:08:55Z","date_updated":"2020-07-14T12:47:10Z"}],"publication":"International Journal of Molecular Sciences","doi":"10.3390/ijms18122587","oa_version":"Published Version","volume":18,"date_created":"2018-12-11T11:47:15Z","tmp":{"image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"ddc":["580"],"day":"01","status":"public","year":"2017","date_published":"2017-12-01T00:00:00Z","month":"12","intvolume":"        18","article_number":"2587","date_updated":"2021-01-12T08:03:16Z","oa":1,"issue":"12"},{"place":"Cham","publication_status":"published","_id":"5803","quality_controlled":"1","citation":{"ama":"Biswas R, Bhowmick P. Construction of persistent Voronoi diagram on 3D digital plane. In: <i>Combinatorial Image Analysis</i>. Vol 10256. Cham: Springer Nature; 2017:93-104. doi:<a href=\"https://doi.org/10.1007/978-3-319-59108-7_8\">10.1007/978-3-319-59108-7_8</a>","ista":"Biswas R, Bhowmick P. 2017.Construction of persistent Voronoi diagram on 3D digital plane. In: Combinatorial image analysis. LNCS, vol. 10256, 93–104.","short":"R. Biswas, P. Bhowmick, in:, Combinatorial Image Analysis, Springer Nature, Cham, 2017, pp. 93–104.","ieee":"R. Biswas and P. Bhowmick, “Construction of persistent Voronoi diagram on 3D digital plane,” in <i>Combinatorial image analysis</i>, vol. 10256, Cham: Springer Nature, 2017, pp. 93–104.","chicago":"Biswas, Ranita, and Partha Bhowmick. “Construction of Persistent Voronoi Diagram on 3D Digital Plane.” In <i>Combinatorial Image Analysis</i>, 10256:93–104. Cham: Springer Nature, 2017. <a href=\"https://doi.org/10.1007/978-3-319-59108-7_8\">https://doi.org/10.1007/978-3-319-59108-7_8</a>.","apa":"Biswas, R., &#38; Bhowmick, P. (2017). Construction of persistent Voronoi diagram on 3D digital plane. In <i>Combinatorial image analysis</i> (Vol. 10256, pp. 93–104). Cham: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-319-59108-7_8\">https://doi.org/10.1007/978-3-319-59108-7_8</a>","mla":"Biswas, Ranita, and Partha Bhowmick. “Construction of Persistent Voronoi Diagram on 3D Digital Plane.” <i>Combinatorial Image Analysis</i>, vol. 10256, Springer Nature, 2017, pp. 93–104, doi:<a href=\"https://doi.org/10.1007/978-3-319-59108-7_8\">10.1007/978-3-319-59108-7_8</a>."},"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["978-3-319-59107-0","978-3-319-59108-7"]},"extern":"1","abstract":[{"text":"Different distance metrics produce Voronoi diagrams with different properties. It is a well-known that on the (real) 2D plane or even on any 3D plane, a Voronoi diagram (VD) based on the Euclidean distance metric produces convex Voronoi regions. In this paper, we first show that this metric produces a persistent VD on the 2D digital plane, as it comprises digitally convex Voronoi regions and hence correctly approximates the corresponding VD on the 2D real plane. Next, we show that on a 3D digital plane D, the Euclidean metric spanning over its voxel set does not guarantee a digital VD which is persistent with the real-space VD. As a solution, we introduce a novel concept of functional-plane-convexity, which is ensured by the Euclidean metric spanning over the pedal set of D. Necessary proofs and some visual result have been provided to adjudge the merit and usefulness of the proposed concept.","lang":"eng"}],"type":"book_chapter","language":[{"iso":"eng"}],"article_processing_charge":"No","department":[{"_id":"HeEd"}],"user_id":"8b945eb4-e2f2-11eb-945a-df72226e66a9","author":[{"id":"3C2B033E-F248-11E8-B48F-1D18A9856A87","first_name":"Ranita","orcid":"0000-0002-5372-7890","last_name":"Biswas","full_name":"Biswas, Ranita"},{"last_name":"Bhowmick","first_name":"Partha","full_name":"Bhowmick, Partha"}],"title":"Construction of persistent Voronoi diagram on 3D digital plane","publisher":"Springer Nature","oa_version":"None","publication":"Combinatorial image analysis","doi":"10.1007/978-3-319-59108-7_8","date_created":"2019-01-08T20:42:56Z","status":"public","day":"17","volume":10256,"year":"2017","page":"93-104","conference":{"location":"Plovdiv, Bulgaria","name":"IWCIA: International Workshop on Combinatorial Image Analysis","start_date":"2017-06-19","end_date":"2017-06-21"},"date_updated":"2022-01-28T07:48:24Z","date_published":"2017-05-17T00:00:00Z","alternative_title":["LNCS"],"month":"05","intvolume":"     10256"},{"department":[{"_id":"MiLe"}],"language":[{"iso":"eng"}],"publisher":"American Physical Society","title":"Experimental evidence for quantum tunneling time","author":[{"full_name":"Camus, Nicolas","last_name":"Camus","first_name":"Nicolas"},{"full_name":"Yakaboylu, Enderalp","id":"38CB71F6-F248-11E8-B48F-1D18A9856A87","first_name":"Enderalp","last_name":"Yakaboylu","orcid":"0000-0001-5973-0874"},{"full_name":"Fechner, Lutz","last_name":"Fechner","first_name":"Lutz"},{"first_name":"Michael","last_name":"Klaiber","full_name":"Klaiber, Michael"},{"full_name":"Laux, Martin","first_name":"Martin","last_name":"Laux"},{"first_name":"Yonghao","last_name":"Mi","full_name":"Mi, Yonghao"},{"full_name":"Hatsagortsyan, Karen Z.","first_name":"Karen Z.","last_name":"Hatsagortsyan"},{"full_name":"Pfeifer, Thomas","first_name":"Thomas","last_name":"Pfeifer"},{"first_name":"Christoph H.","last_name":"Keitel","full_name":"Keitel, Christoph H."},{"full_name":"Moshammer, Robert","last_name":"Moshammer","first_name":"Robert"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publication_status":"published","scopus_import":1,"abstract":[{"text":"The first hundred attoseconds of the electron dynamics during strong field tunneling ionization are investigated. We quantify theoretically how the electron’s classical trajectories in the continuum emerge from the tunneling process and test the results with those achieved in parallel from attoclock measurements. An especially high sensitivity on the tunneling barrier is accomplished here by comparing the momentum distributions of two atomic species of slightly deviating atomic potentials (argon and krypton) being ionized under absolutely identical conditions with near-infrared laser pulses (1300 nm). The agreement between experiment and theory provides clear evidence for a nonzero tunneling time delay and a nonvanishing longitudinal momentum of the electron at the “tunnel exit.”","lang":"eng"}],"arxiv":1,"type":"journal_article","citation":{"ista":"Camus N, Yakaboylu E, Fechner L, Klaiber M, Laux M, Mi Y, Hatsagortsyan KZ, Pfeifer T, Keitel CH, Moshammer R. 2017. Experimental evidence for quantum tunneling time. Physical Review Letters. 119(2), 023201.","ieee":"N. Camus <i>et al.</i>, “Experimental evidence for quantum tunneling time,” <i>Physical Review Letters</i>, vol. 119, no. 2. American Physical Society, 2017.","short":"N. Camus, E. Yakaboylu, L. Fechner, M. Klaiber, M. Laux, Y. Mi, K.Z. Hatsagortsyan, T. Pfeifer, C.H. Keitel, R. Moshammer, Physical Review Letters 119 (2017).","ama":"Camus N, Yakaboylu E, Fechner L, et al. Experimental evidence for quantum tunneling time. <i>Physical Review Letters</i>. 2017;119(2). doi:<a href=\"https://doi.org/10.1103/PhysRevLett.119.023201\">10.1103/PhysRevLett.119.023201</a>","chicago":"Camus, Nicolas, Enderalp Yakaboylu, Lutz Fechner, Michael Klaiber, Martin Laux, Yonghao Mi, Karen Z. Hatsagortsyan, Thomas Pfeifer, Christoph H. Keitel, and Robert Moshammer. “Experimental Evidence for Quantum Tunneling Time.” <i>Physical Review Letters</i>. American Physical Society, 2017. <a href=\"https://doi.org/10.1103/PhysRevLett.119.023201\">https://doi.org/10.1103/PhysRevLett.119.023201</a>.","apa":"Camus, N., Yakaboylu, E., Fechner, L., Klaiber, M., Laux, M., Mi, Y., … Moshammer, R. (2017). Experimental evidence for quantum tunneling time. <i>Physical Review Letters</i>. American Physical Society. <a href=\"https://doi.org/10.1103/PhysRevLett.119.023201\">https://doi.org/10.1103/PhysRevLett.119.023201</a>","mla":"Camus, Nicolas, et al. “Experimental Evidence for Quantum Tunneling Time.” <i>Physical Review Letters</i>, vol. 119, no. 2, 023201, American Physical Society, 2017, doi:<a href=\"https://doi.org/10.1103/PhysRevLett.119.023201\">10.1103/PhysRevLett.119.023201</a>."},"publication_identifier":{"eissn":["1079-7114"],"issn":["0031-9007"]},"quality_controlled":"1","_id":"6013","external_id":{"arxiv":["1611.03701"]},"year":"2017","article_number":"023201","date_published":"2017-07-14T00:00:00Z","intvolume":"       119","month":"07","oa":1,"issue":"2","date_updated":"2023-02-23T11:13:36Z","publication":"Physical Review Letters","doi":"10.1103/PhysRevLett.119.023201","main_file_link":[{"url":"https://arxiv.org/abs/1611.03701","open_access":"1"}],"oa_version":"Preprint","related_material":{"record":[{"id":"313","relation":"earlier_version","status":"public"}]},"volume":119,"day":"14","status":"public","date_created":"2019-02-14T15:24:13Z"},{"publisher":"The Royal Society of Chemistry","user_id":"4435EBFC-F248-11E8-B48F-1D18A9856A87","author":[{"full_name":"Lemeshko, Mikhail","last_name":"Lemeshko","orcid":"0000-0002-6990-7802","first_name":"Mikhail","id":"37CB05FA-F248-11E8-B48F-1D18A9856A87"},{"first_name":"Richard","last_name":"Schmidt","full_name":"Schmidt, Richard"}],"title":"Molecular impurities interacting with a many-particle environment: From ultracold gases to helium nanodroplets","publist_id":"7201","department":[{"_id":"MiLe"}],"language":[{"iso":"eng"}],"publication_identifier":{"issn":["20413181"]},"citation":{"chicago":"Lemeshko, Mikhail, and Richard Schmidt. “Molecular Impurities Interacting with a Many-Particle Environment: From Ultracold Gases to Helium Nanodroplets.” In <i>Cold Chemistry: Molecular Scattering and Reactivity Near Absolute Zero </i>, edited by Oliver Dulieu and Andreas Osterwalder, 11:444–95. Theoretical and Computational Chemistry Series. The Royal Society of Chemistry, 2017. <a href=\"https://doi.org/10.1039/9781782626800-00444\">https://doi.org/10.1039/9781782626800-00444</a>.","ama":"Lemeshko M, Schmidt R. Molecular impurities interacting with a many-particle environment: From ultracold gases to helium nanodroplets. In: Dulieu O, Osterwalder A, eds. <i>Cold Chemistry: Molecular Scattering and Reactivity Near Absolute Zero </i>. Vol 11. Theoretical and Computational Chemistry Series. The Royal Society of Chemistry; 2017:444-495. doi:<a href=\"https://doi.org/10.1039/9781782626800-00444\">10.1039/9781782626800-00444</a>","ista":"Lemeshko M, Schmidt R. 2017.Molecular impurities interacting with a many-particle environment: From ultracold gases to helium nanodroplets. In: Cold Chemistry: Molecular Scattering and Reactivity Near Absolute Zero . Theoretical and Computational Chemistry Series, vol. 11, 444–495.","short":"M. Lemeshko, R. Schmidt, in:, O. Dulieu, A. Osterwalder (Eds.), Cold Chemistry: Molecular Scattering and Reactivity Near Absolute Zero , The Royal Society of Chemistry, 2017, pp. 444–495.","ieee":"M. Lemeshko and R. Schmidt, “Molecular impurities interacting with a many-particle environment: From ultracold gases to helium nanodroplets,” in <i>Cold Chemistry: Molecular Scattering and Reactivity Near Absolute Zero </i>, vol. 11, O. Dulieu and A. Osterwalder, Eds. The Royal Society of Chemistry, 2017, pp. 444–495.","mla":"Lemeshko, Mikhail, and Richard Schmidt. “Molecular Impurities Interacting with a Many-Particle Environment: From Ultracold Gases to Helium Nanodroplets.” <i>Cold Chemistry: Molecular Scattering and Reactivity Near Absolute Zero </i>, edited by Oliver Dulieu and Andreas Osterwalder, vol. 11, The Royal Society of Chemistry, 2017, pp. 444–95, doi:<a href=\"https://doi.org/10.1039/9781782626800-00444\">10.1039/9781782626800-00444</a>.","apa":"Lemeshko, M., &#38; Schmidt, R. (2017). Molecular impurities interacting with a many-particle environment: From ultracold gases to helium nanodroplets. In O. Dulieu &#38; A. Osterwalder (Eds.), <i>Cold Chemistry: Molecular Scattering and Reactivity Near Absolute Zero </i> (Vol. 11, pp. 444–495). The Royal Society of Chemistry. <a href=\"https://doi.org/10.1039/9781782626800-00444\">https://doi.org/10.1039/9781782626800-00444</a>"},"abstract":[{"lang":"eng","text":"In several settings of physics and chemistry one has to deal with molecules interacting with some kind of an external environment, be it a gas, a solution, or a crystal surface. Understanding molecular processes in the presence of such a many-particle bath is inherently challenging, and usually requires large-scale numerical computations. Here, we present an alternative approach to the problem, based on the notion of the angulon quasiparticle. We show that molecules rotating inside superfluid helium nanodroplets and Bose–Einstein condensates form angulons, and therefore can be described by straightforward solutions of a simple microscopic Hamiltonian. Casting the problem in the language of angulons allows us not only to greatly simplify it, but also to gain insights into the origins of the observed phenomena and to make predictions for future experimental studies."}],"scopus_import":1,"type":"book_chapter","_id":"604","editor":[{"last_name":"Dulieu","first_name":"Oliver","full_name":"Dulieu, Oliver"},{"last_name":"Osterwalder","first_name":"Andreas","full_name":"Osterwalder, Andreas"}],"quality_controlled":"1","publication_status":"published","alternative_title":["Theoretical and Computational Chemistry Series"],"date_published":"2017-12-14T00:00:00Z","intvolume":"        11","month":"12","date_updated":"2021-01-12T08:05:50Z","oa":1,"page":"444 - 495","series_title":"Theoretical and Computational Chemistry Series","year":"2017","volume":11,"date_created":"2018-12-11T11:47:27Z","status":"public","day":"14","publication":"Cold Chemistry: Molecular Scattering and Reactivity Near Absolute Zero ","doi":"10.1039/9781782626800-00444","main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1703.06753"}],"oa_version":"Submitted Version"},{"date_created":"2018-12-11T11:47:27Z","status":"public","day":"05","volume":10677,"ec_funded":1,"oa_version":"Submitted Version","doi":"10.1007/978-3-319-70500-2_3","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2016/536"}],"date_updated":"2021-01-12T08:05:53Z","oa":1,"alternative_title":["LNCS"],"date_published":"2017-11-05T00:00:00Z","month":"11","intvolume":"     10677","year":"2017","page":"56 - 81","conference":{"location":"Baltimore, MD, United States","name":"TCC: Theory of Cryptography Conference","end_date":"2017-11-15","start_date":"2017-11-12"},"_id":"605","editor":[{"full_name":"Kalai, Yael","last_name":"Kalai","first_name":"Yael"},{"full_name":"Reyzin, Leonid","first_name":"Leonid","last_name":"Reyzin"}],"quality_controlled":"1","citation":{"chicago":"Brody, Joshua, Stefan Dziembowski, Sebastian Faust, and Krzysztof Z Pietrzak. “Position Based Cryptography and Multiparty Communication Complexity.” edited by Yael Kalai and Leonid Reyzin, 10677:56–81. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-70500-2_3\">https://doi.org/10.1007/978-3-319-70500-2_3</a>.","ista":"Brody J, Dziembowski S, Faust S, Pietrzak KZ. 2017. Position based cryptography and multiparty communication complexity. TCC: Theory of Cryptography Conference, LNCS, vol. 10677, 56–81.","ieee":"J. Brody, S. Dziembowski, S. Faust, and K. Z. Pietrzak, “Position based cryptography and multiparty communication complexity,” presented at the TCC: Theory of Cryptography Conference, Baltimore, MD, United States, 2017, vol. 10677, pp. 56–81.","short":"J. Brody, S. Dziembowski, S. Faust, K.Z. Pietrzak, in:, Y. Kalai, L. Reyzin (Eds.), Springer, 2017, pp. 56–81.","ama":"Brody J, Dziembowski S, Faust S, Pietrzak KZ. Position based cryptography and multiparty communication complexity. In: Kalai Y, Reyzin L, eds. Vol 10677. Springer; 2017:56-81. doi:<a href=\"https://doi.org/10.1007/978-3-319-70500-2_3\">10.1007/978-3-319-70500-2_3</a>","mla":"Brody, Joshua, et al. <i>Position Based Cryptography and Multiparty Communication Complexity</i>. Edited by Yael Kalai and Leonid Reyzin, vol. 10677, Springer, 2017, pp. 56–81, doi:<a href=\"https://doi.org/10.1007/978-3-319-70500-2_3\">10.1007/978-3-319-70500-2_3</a>.","apa":"Brody, J., Dziembowski, S., Faust, S., &#38; Pietrzak, K. Z. (2017). Position based cryptography and multiparty communication complexity. In Y. Kalai &#38; L. Reyzin (Eds.) (Vol. 10677, pp. 56–81). Presented at the TCC: Theory of Cryptography Conference, Baltimore, MD, United States: Springer. <a href=\"https://doi.org/10.1007/978-3-319-70500-2_3\">https://doi.org/10.1007/978-3-319-70500-2_3</a>"},"publication_identifier":{"isbn":["978-331970499-9"]},"abstract":[{"text":"Position based cryptography (PBC), proposed in the seminal work of Chandran, Goyal, Moriarty, and Ostrovsky (SIAM J. Computing, 2014), aims at constructing cryptographic schemes in which the identity of the user is his geographic position. Chandran et al. construct PBC schemes for secure positioning and position-based key agreement in the bounded-storage model (Maurer, J. Cryptology, 1992). Apart from bounded memory, their security proofs need a strong additional restriction on the power of the adversary: he cannot compute joint functions of his inputs. Removing this assumption is left as an open problem. We show that an answer to this question would resolve a long standing open problem in multiparty communication complexity: finding a function that is hard to compute with low communication complexity in the simultaneous message model, but easy to compute in the fully adaptive model. On a more positive side: we also show some implications in the other direction, i.e.: we prove that lower bounds on the communication complexity of certain multiparty problems imply existence of PBC primitives. Using this result we then show two attractive ways to “bypass” our hardness result: the first uses the random oracle model, the second weakens the locality requirement in the bounded-storage model to online computability. The random oracle construction is arguably one of the simplest proposed so far in this area. Our results indicate that constructing improved provably secure protocols for PBC requires a better understanding of multiparty communication complexity. This is yet another example where negative results in one area (in our case: lower bounds in multiparty communication complexity) can be used to construct secure cryptographic schemes.","lang":"eng"}],"scopus_import":1,"type":"conference","project":[{"grant_number":"682815","call_identifier":"H2020","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","name":"Teaching Old Crypto New Tricks"}],"publication_status":"published","title":"Position based cryptography and multiparty communication complexity","user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","author":[{"first_name":"Joshua","last_name":"Brody","full_name":"Brody, Joshua"},{"full_name":"Dziembowski, Stefan","last_name":"Dziembowski","first_name":"Stefan"},{"full_name":"Faust, Sebastian","last_name":"Faust","first_name":"Sebastian"},{"full_name":"Pietrzak, Krzysztof Z","first_name":"Krzysztof Z","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9139-1654","last_name":"Pietrzak"}],"publisher":"Springer","language":[{"iso":"eng"}],"publist_id":"7200","department":[{"_id":"KrPi"}]},{"title":"Moderately hard functions: Definition, instantiations, and applications","author":[{"last_name":"Alwen","first_name":"Joel F","id":"2A8DFA8C-F248-11E8-B48F-1D18A9856A87","full_name":"Alwen, Joel F"},{"full_name":"Tackmann, Björn","last_name":"Tackmann","first_name":"Björn"}],"user_id":"3E5EF7F0-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","language":[{"iso":"eng"}],"department":[{"_id":"KrPi"}],"publist_id":"7196","editor":[{"last_name":"Kalai","first_name":"Yael","full_name":"Kalai, Yael"},{"full_name":"Reyzin, Leonid","last_name":"Reyzin","first_name":"Leonid"}],"_id":"609","quality_controlled":"1","publication_identifier":{"isbn":["978-331970499-9"]},"citation":{"apa":"Alwen, J. F., &#38; Tackmann, B. (2017). Moderately hard functions: Definition, instantiations, and applications. In Y. Kalai &#38; L. Reyzin (Eds.) (Vol. 10677, pp. 493–526). Presented at the TCC: Theory of Cryptography, Baltimore, MD, United States: Springer. <a href=\"https://doi.org/10.1007/978-3-319-70500-2_17\">https://doi.org/10.1007/978-3-319-70500-2_17</a>","mla":"Alwen, Joel F., and Björn Tackmann. <i>Moderately Hard Functions: Definition, Instantiations, and Applications</i>. Edited by Yael Kalai and Leonid Reyzin, vol. 10677, Springer, 2017, pp. 493–526, doi:<a href=\"https://doi.org/10.1007/978-3-319-70500-2_17\">10.1007/978-3-319-70500-2_17</a>.","ama":"Alwen JF, Tackmann B. Moderately hard functions: Definition, instantiations, and applications. In: Kalai Y, Reyzin L, eds. Vol 10677. Springer; 2017:493-526. doi:<a href=\"https://doi.org/10.1007/978-3-319-70500-2_17\">10.1007/978-3-319-70500-2_17</a>","ista":"Alwen JF, Tackmann B. 2017. Moderately hard functions: Definition, instantiations, and applications. TCC: Theory of Cryptography, LNCS, vol. 10677, 493–526.","ieee":"J. F. Alwen and B. Tackmann, “Moderately hard functions: Definition, instantiations, and applications,” presented at the TCC: Theory of Cryptography, Baltimore, MD, United States, 2017, vol. 10677, pp. 493–526.","short":"J.F. Alwen, B. Tackmann, in:, Y. Kalai, L. Reyzin (Eds.), Springer, 2017, pp. 493–526.","chicago":"Alwen, Joel F, and Björn Tackmann. “Moderately Hard Functions: Definition, Instantiations, and Applications.” edited by Yael Kalai and Leonid Reyzin, 10677:493–526. Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-70500-2_17\">https://doi.org/10.1007/978-3-319-70500-2_17</a>."},"type":"conference","scopus_import":1,"abstract":[{"lang":"eng","text":"Several cryptographic schemes and applications are based on functions that are both reasonably efficient to compute and moderately hard to invert, including client puzzles for Denial-of-Service protection, password protection via salted hashes, or recent proof-of-work blockchain systems. Despite their wide use, a definition of this concept has not yet been distilled and formalized explicitly. Instead, either the applications are proven directly based on the assumptions underlying the function, or some property of the function is proven, but the security of the application is argued only informally. The goal of this work is to provide a (universal) definition that decouples the efforts of designing new moderately hard functions and of building protocols based on them, serving as an interface between the two. On a technical level, beyond the mentioned definitions, we instantiate the model for four different notions of hardness. We extend the work of Alwen and Serbinenko (STOC 2015) by providing a general tool for proving security for the first notion of memory-hard functions that allows for provably secure applications. The tool allows us to recover all of the graph-theoretic techniques developed for proving security under the older, non-composable, notion of security used by Alwen and Serbinenko. As an application of our definition of moderately hard functions, we prove the security of two different schemes for proofs of effort (PoE). We also formalize and instantiate the concept of a non-interactive proof of effort (niPoE), in which the proof is not bound to a particular communication context but rather any bit-string chosen by the prover."}],"publication_status":"published","date_updated":"2021-01-12T08:06:04Z","oa":1,"intvolume":"     10677","month":"11","date_published":"2017-11-05T00:00:00Z","alternative_title":["LNCS"],"year":"2017","page":"493 - 526","conference":{"location":"Baltimore, MD, United States","start_date":"2017-11-12","end_date":"2017-11-15","name":"TCC: Theory of Cryptography"},"date_created":"2018-12-11T11:47:28Z","status":"public","day":"05","volume":10677,"oa_version":"Submitted Version","main_file_link":[{"url":"https://eprint.iacr.org/2017/945","open_access":"1"}],"doi":"10.1007/978-3-319-70500-2_17"}]
