[{"doi":"10.1007/978-3-662-47989-6_29","conference":{"start_date":"2015-08-16","name":"CRYPTO: International Cryptology Conference","end_date":"2015-08-20","location":"Santa Barbara, CA, USA"},"publication_status":"published","oa_version":"Submitted Version","date_published":"2015-08-01T00:00:00Z","scopus_import":1,"file_date_updated":"2020-07-14T12:45:08Z","ddc":["004"],"citation":{"mla":"Fuchsbauer, Georg, et al. <i>A Quasipolynomial Reduction for Generalized Selective Decryption on Trees</i>. Vol. 9215, Springer, 2015, pp. 601–20, doi:<a href=\"https://doi.org/10.1007/978-3-662-47989-6_29\">10.1007/978-3-662-47989-6_29</a>.","ista":"Fuchsbauer G, Jafargholi Z, Pietrzak KZ. 2015. A quasipolynomial reduction for generalized selective decryption on trees. CRYPTO: International Cryptology Conference, LNCS, vol. 9215, 601–620.","apa":"Fuchsbauer, G., Jafargholi, Z., &#38; Pietrzak, K. Z. (2015). A quasipolynomial reduction for generalized selective decryption on trees (Vol. 9215, pp. 601–620). Presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, USA: Springer. <a href=\"https://doi.org/10.1007/978-3-662-47989-6_29\">https://doi.org/10.1007/978-3-662-47989-6_29</a>","chicago":"Fuchsbauer, Georg, Zahra Jafargholi, and Krzysztof Z Pietrzak. “A Quasipolynomial Reduction for Generalized Selective Decryption on Trees,” 9215:601–20. Springer, 2015. <a href=\"https://doi.org/10.1007/978-3-662-47989-6_29\">https://doi.org/10.1007/978-3-662-47989-6_29</a>.","short":"G. Fuchsbauer, Z. Jafargholi, K.Z. Pietrzak, in:, Springer, 2015, pp. 601–620.","ama":"Fuchsbauer G, Jafargholi Z, Pietrzak KZ. A quasipolynomial reduction for generalized selective decryption on trees. In: Vol 9215. Springer; 2015:601-620. doi:<a href=\"https://doi.org/10.1007/978-3-662-47989-6_29\">10.1007/978-3-662-47989-6_29</a>","ieee":"G. Fuchsbauer, Z. Jafargholi, and K. Z. Pietrzak, “A quasipolynomial reduction for generalized selective decryption on trees,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, USA, 2015, vol. 9215, pp. 601–620."},"intvolume":"      9215","abstract":[{"text":"Generalized Selective Decryption (GSD), introduced by Panjwani [TCC’07], is a game for a symmetric encryption scheme Enc that captures the difficulty of proving adaptive security of certain protocols, most notably the Logical Key Hierarchy (LKH) multicast encryption protocol. In the GSD game there are n keys k1,..., kn, which the adversary may adaptively corrupt (learn); moreover, it can ask for encryptions Encki (kj) of keys under other keys. The adversary’s task is to distinguish keys (which it cannot trivially compute) from random. Proving the hardness of GSD assuming only IND-CPA security of Enc is surprisingly hard. Using “complexity leveraging” loses a factor exponential in n, which makes the proof practically meaningless. We can think of the GSD game as building a graph on n vertices, where we add an edge i → j when the adversary asks for an encryption of kj under ki. If restricted to graphs of depth ℓ, Panjwani gave a reduction that loses only a factor exponential in ℓ (not n). To date, this is the only non-trivial result known for GSD. In this paper we give almost-polynomial reductions for large classes of graphs. Most importantly, we prove the security of the GSD game restricted to trees losing only a quasi-polynomial factor n3 log n+5. Trees are an important special case capturing real-world protocols like the LKH protocol. Our new bound improves upon Panjwani’s on some LKH variants proposed in the literature where the underlying tree is not balanced. Our proof builds on ideas from the “nested hybrids” technique recently introduced by Fuchsbauer et al. [Asiacrypt’14] for proving the adaptive security of constrained PRFs.","lang":"eng"}],"date_updated":"2021-01-12T06:52:14Z","year":"2015","_id":"1648","status":"public","oa":1,"month":"08","ec_funded":1,"has_accepted_license":"1","date_created":"2018-12-11T11:53:14Z","page":"601 - 620","type":"conference","department":[{"_id":"KrPi"}],"language":[{"iso":"eng"}],"pubrep_id":"674","publist_id":"5502","volume":9215,"quality_controlled":"1","day":"01","tmp":{"short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"author":[{"id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87","last_name":"Fuchsbauer","first_name":"Georg","full_name":"Fuchsbauer, Georg"},{"full_name":"Jafargholi, Zahra","first_name":"Zahra","last_name":"Jafargholi"},{"full_name":"Pietrzak, Krzysztof Z","last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z"}],"project":[{"call_identifier":"FP7","name":"Provable Security for Physical Cryptography","_id":"258C570E-B435-11E9-9278-68D0E5697425","grant_number":"259668"}],"file":[{"access_level":"open_access","creator":"system","checksum":"99b76b3263d5082554d0a9cbdeca3a22","file_id":"5015","date_created":"2018-12-12T10:13:31Z","date_updated":"2020-07-14T12:45:08Z","file_name":"IST-2016-674-v1+1_389.pdf","file_size":505618,"relation":"main_file","content_type":"application/pdf"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","title":"A quasipolynomial reduction for generalized selective decryption on trees","alternative_title":["LNCS"]},{"oa_version":"Published Version","date_published":"2015-01-01T00:00:00Z","publication_status":"published","conference":{"end_date":"2015-09-25","location":"Vienna, Austria","start_date":"2015-09-21","name":"ESORICS: European Symposium on Research in Computer Security"},"doi":"10.1007/978-3-319-24174-6_16","citation":{"mla":"Benhamouda, Fabrice, et al. <i>Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings</i>. Vol. 9326, Springer, 2015, pp. 305–25, doi:<a href=\"https://doi.org/10.1007/978-3-319-24174-6_16\">10.1007/978-3-319-24174-6_16</a>.","ista":"Benhamouda F, Krenn S, Lyubashevsky V, Pietrzak KZ. 2015. Efficient zero-knowledge proofs for commitments from learning with errors over rings. 9326, 305–325.","apa":"Benhamouda, F., Krenn, S., Lyubashevsky, V., &#38; Pietrzak, K. Z. (2015). Efficient zero-knowledge proofs for commitments from learning with errors over rings. Presented at the ESORICS: European Symposium on Research in Computer Security, Vienna, Austria: Springer. <a href=\"https://doi.org/10.1007/978-3-319-24174-6_16\">https://doi.org/10.1007/978-3-319-24174-6_16</a>","chicago":"Benhamouda, Fabrice, Stephan Krenn, Vadim Lyubashevsky, and Krzysztof Z Pietrzak. “Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings.” Lecture Notes in Computer Science. Springer, 2015. <a href=\"https://doi.org/10.1007/978-3-319-24174-6_16\">https://doi.org/10.1007/978-3-319-24174-6_16</a>.","short":"F. Benhamouda, S. Krenn, V. Lyubashevsky, K.Z. Pietrzak, 9326 (2015) 305–325.","ieee":"F. Benhamouda, S. Krenn, V. Lyubashevsky, and K. Z. Pietrzak, “Efficient zero-knowledge proofs for commitments from learning with errors over rings,” vol. 9326. Springer, pp. 305–325, 2015.","ama":"Benhamouda F, Krenn S, Lyubashevsky V, Pietrzak KZ. Efficient zero-knowledge proofs for commitments from learning with errors over rings. 2015;9326:305-325. doi:<a href=\"https://doi.org/10.1007/978-3-319-24174-6_16\">10.1007/978-3-319-24174-6_16</a>"},"intvolume":"      9326","file_date_updated":"2020-07-14T12:45:08Z","scopus_import":1,"ddc":["000","004"],"_id":"1649","date_updated":"2021-01-12T06:52:14Z","abstract":[{"lang":"eng","text":"We extend a commitment scheme based on the learning with errors over rings (RLWE) problem, and present efficient companion zeroknowledge proofs of knowledge. Our scheme maps elements from the ring (or equivalently, n elements from "}],"year":"2015","month":"01","ec_funded":1,"status":"public","oa":1,"type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"KrPi"}],"has_accepted_license":"1","page":"305 - 325","date_created":"2018-12-11T11:53:15Z","volume":9326,"quality_controlled":"1","publist_id":"5501","pubrep_id":"678","project":[{"call_identifier":"FP7","name":"Provable Security for Physical Cryptography","_id":"258C570E-B435-11E9-9278-68D0E5697425","grant_number":"259668"}],"author":[{"last_name":"Benhamouda","first_name":"Fabrice","full_name":"Benhamouda, Fabrice"},{"last_name":"Krenn","first_name":"Stephan","full_name":"Krenn, Stephan"},{"full_name":"Lyubashevsky, Vadim","last_name":"Lyubashevsky","first_name":"Vadim"},{"full_name":"Pietrzak, Krzysztof Z","last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z"}],"file":[{"file_size":494239,"relation":"main_file","content_type":"application/pdf","date_created":"2018-12-12T10:11:28Z","date_updated":"2020-07-14T12:45:08Z","file_name":"IST-2016-678-v1+1_889.pdf","access_level":"open_access","checksum":"6eac4a485b2aa644b2d3f753ed0b280b","file_id":"4883","creator":"system"}],"day":"01","tmp":{"image":"/images/cc_by_nc.png","short":"CC BY-NC (4.0)","legal_code_url":"https://creativecommons.org/licenses/by-nc/4.0/legalcode","name":"Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0)"},"alternative_title":["LNCS"],"series_title":"Lecture Notes in Computer Science","license":"https://creativecommons.org/licenses/by-nc/4.0/","publisher":"Springer","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","title":"Efficient zero-knowledge proofs for commitments from learning with errors over rings"},{"_id":"1650","date_updated":"2021-01-12T06:52:15Z","abstract":[{"text":"We consider the task of deriving a key with high HILL entropy (i.e., being computationally indistinguishable from a key with high min-entropy) from an unpredictable source.\r\n\r\nPrevious to this work, the only known way to transform unpredictability into a key that was ϵ indistinguishable from having min-entropy was via pseudorandomness, for example by Goldreich-Levin (GL) hardcore bits. This approach has the inherent limitation that from a source with k bits of unpredictability entropy one can derive a key of length (and thus HILL entropy) at most k−2log(1/ϵ) bits. In many settings, e.g. when dealing with biometric data, such a 2log(1/ϵ) bit entropy loss in not an option. Our main technical contribution is a theorem that states that in the high entropy regime, unpredictability implies HILL entropy. Concretely, any variable K with |K|−d bits of unpredictability entropy has the same amount of so called metric entropy (against real-valued, deterministic distinguishers), which is known to imply the same amount of HILL entropy. The loss in circuit size in this argument is exponential in the entropy gap d, and thus this result only applies for small d (i.e., where the size of distinguishers considered is exponential in d).\r\n\r\nTo overcome the above restriction, we investigate if it’s possible to first “condense” unpredictability entropy and make the entropy gap small. We show that any source with k bits of unpredictability can be condensed into a source of length k with k−3 bits of unpredictability entropy. Our condenser simply “abuses&quot; the GL construction and derives a k bit key from a source with k bits of unpredicatibily. The original GL theorem implies nothing when extracting that many bits, but we show that in this regime, GL still behaves like a “condenser&quot; for unpredictability. This result comes with two caveats (1) the loss in circuit size is exponential in k and (2) we require that the source we start with has no HILL entropy (equivalently, one can efficiently check if a guess is correct). We leave it as an intriguing open problem to overcome these restrictions or to prove they’re inherent.","lang":"eng"}],"year":"2015","month":"06","ec_funded":1,"status":"public","oa":1,"oa_version":"Published Version","date_published":"2015-06-20T00:00:00Z","publication_status":"published","conference":{"end_date":"2015-07-10","location":"Kyoto, Japan","start_date":"2015-07-06","name":"ICALP: Automata, Languages and Programming"},"doi":"10.1007/978-3-662-47672-7_85","intvolume":"      9134","citation":{"ieee":"M. Skórski, A. Golovnev, and K. Z. Pietrzak, “Condensed unpredictability ,” presented at the ICALP: Automata, Languages and Programming, Kyoto, Japan, 2015, vol. 9134, pp. 1046–1057.","ama":"Skórski M, Golovnev A, Pietrzak KZ. Condensed unpredictability . In: Vol 9134. Springer; 2015:1046-1057. doi:<a href=\"https://doi.org/10.1007/978-3-662-47672-7_85\">10.1007/978-3-662-47672-7_85</a>","short":"M. Skórski, A. Golovnev, K.Z. Pietrzak, in:, Springer, 2015, pp. 1046–1057.","chicago":"Skórski, Maciej, Alexander Golovnev, and Krzysztof Z Pietrzak. “Condensed Unpredictability ,” 9134:1046–57. Springer, 2015. <a href=\"https://doi.org/10.1007/978-3-662-47672-7_85\">https://doi.org/10.1007/978-3-662-47672-7_85</a>.","ista":"Skórski M, Golovnev A, Pietrzak KZ. 2015. Condensed unpredictability . ICALP: Automata, Languages and Programming, LNCS, vol. 9134, 1046–1057.","mla":"Skórski, Maciej, et al. <i>Condensed Unpredictability </i>. Vol. 9134, Springer, 2015, pp. 1046–57, doi:<a href=\"https://doi.org/10.1007/978-3-662-47672-7_85\">10.1007/978-3-662-47672-7_85</a>.","apa":"Skórski, M., Golovnev, A., &#38; Pietrzak, K. Z. (2015). Condensed unpredictability  (Vol. 9134, pp. 1046–1057). Presented at the ICALP: Automata, Languages and Programming, Kyoto, Japan: Springer. <a href=\"https://doi.org/10.1007/978-3-662-47672-7_85\">https://doi.org/10.1007/978-3-662-47672-7_85</a>"},"file_date_updated":"2020-07-14T12:45:08Z","scopus_import":1,"ddc":["000","005"],"project":[{"call_identifier":"FP7","name":"Provable Security for Physical Cryptography","_id":"258C570E-B435-11E9-9278-68D0E5697425","grant_number":"259668"}],"author":[{"full_name":"Skórski, Maciej","last_name":"Skórski","first_name":"Maciej"},{"first_name":"Alexander","last_name":"Golovnev","full_name":"Golovnev, Alexander"},{"full_name":"Pietrzak, Krzysztof Z","first_name":"Krzysztof Z","orcid":"0000-0002-9139-1654","last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87"}],"file":[{"date_updated":"2020-07-14T12:45:08Z","file_name":"IST-2016-675-v1+1_384.pdf","date_created":"2018-12-12T10:08:32Z","creator":"system","file_id":"4693","checksum":"e808c7eecb631336fc9f9bf2e8d4ecae","access_level":"open_access","content_type":"application/pdf","relation":"main_file","file_size":525503}],"tmp":{"short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"day":"20","alternative_title":["LNCS"],"publisher":"Springer","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","title":"Condensed unpredictability ","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"KrPi"}],"has_accepted_license":"1","date_created":"2018-12-11T11:53:15Z","page":"1046 - 1057","quality_controlled":"1","volume":9134,"publist_id":"5500","pubrep_id":"675"},{"date_published":"2015-03-17T00:00:00Z","oa_version":"Published Version","publication_status":"published","conference":{"end_date":"2015-04-01","location":"Gaithersburg, MD, United States","start_date":"2015-03-30","name":"PKC: Public Key Crypography"},"doi":"10.1007/978-3-662-46447-2_5","intvolume":"      9020","citation":{"ama":"Baldimtsi F, Chase M, Fuchsbauer G, Kohlweiss M. Anonymous transferable e-cash. In: <i>Public-Key Cryptography - PKC 2015</i>. Vol 9020. Springer; 2015:101-124. doi:<a href=\"https://doi.org/10.1007/978-3-662-46447-2_5\">10.1007/978-3-662-46447-2_5</a>","ieee":"F. Baldimtsi, M. Chase, G. Fuchsbauer, and M. Kohlweiss, “Anonymous transferable e-cash,” in <i>Public-Key Cryptography - PKC 2015</i>, Gaithersburg, MD, United States, 2015, vol. 9020, pp. 101–124.","short":"F. Baldimtsi, M. Chase, G. Fuchsbauer, M. Kohlweiss, in:, Public-Key Cryptography - PKC 2015, Springer, 2015, pp. 101–124.","ista":"Baldimtsi F, Chase M, Fuchsbauer G, Kohlweiss M. 2015. Anonymous transferable e-cash. Public-Key Cryptography - PKC 2015. PKC: Public Key Crypography, LNCS, vol. 9020, 101–124.","apa":"Baldimtsi, F., Chase, M., Fuchsbauer, G., &#38; Kohlweiss, M. (2015). Anonymous transferable e-cash. In <i>Public-Key Cryptography - PKC 2015</i> (Vol. 9020, pp. 101–124). Gaithersburg, MD, United States: Springer. <a href=\"https://doi.org/10.1007/978-3-662-46447-2_5\">https://doi.org/10.1007/978-3-662-46447-2_5</a>","mla":"Baldimtsi, Foteini, et al. “Anonymous Transferable E-Cash.” <i>Public-Key Cryptography - PKC 2015</i>, vol. 9020, Springer, 2015, pp. 101–24, doi:<a href=\"https://doi.org/10.1007/978-3-662-46447-2_5\">10.1007/978-3-662-46447-2_5</a>.","chicago":"Baldimtsi, Foteini, Melissa Chase, Georg Fuchsbauer, and Markulf Kohlweiss. “Anonymous Transferable E-Cash.” In <i>Public-Key Cryptography - PKC 2015</i>, 9020:101–24. Springer, 2015. <a href=\"https://doi.org/10.1007/978-3-662-46447-2_5\">https://doi.org/10.1007/978-3-662-46447-2_5</a>."},"scopus_import":"1","main_file_link":[{"url":"https://doi.org/10.1007/978-3-662-46447-2_5","open_access":"1"}],"_id":"1651","year":"2015","date_updated":"2022-05-23T10:08:37Z","abstract":[{"text":"Cryptographic e-cash allows off-line electronic transactions between a bank, users and merchants in a secure and anonymous fashion. A plethora of e-cash constructions has been proposed in the literature; however, these traditional e-cash schemes only allow coins to be transferred once between users and merchants. Ideally, we would like users to be able to transfer coins between each other multiple times before deposit, as happens with physical cash. “Transferable” e-cash schemes are the solution to this problem. Unfortunately, the currently proposed schemes are either completely impractical or do not achieve the desirable anonymity properties without compromises, such as assuming the existence of a trusted “judge” who can trace all coins and users in the system. This paper presents the first efficient and fully anonymous transferable e-cash scheme without any trusted third parties. We start by revising the security and anonymity properties of transferable e-cash to capture issues that were previously overlooked. For our construction we use the recently proposed malleable signatures by Chase et al. to allow the secure and anonymous transfer of coins, combined with a new efficient double-spending detection mechanism. Finally, we discuss an instantiation of our construction.","lang":"eng"}],"ec_funded":1,"month":"03","oa":1,"publication_identifier":{"isbn":["978-3-662-46446-5"]},"status":"public","language":[{"iso":"eng"}],"department":[{"_id":"KrPi"}],"type":"conference","page":"101 - 124","date_created":"2018-12-11T11:53:15Z","publication":"Public-Key Cryptography - PKC 2015","quality_controlled":"1","volume":9020,"publist_id":"5499","article_processing_charge":"No","project":[{"call_identifier":"FP7","name":"Provable Security for Physical Cryptography","_id":"258C570E-B435-11E9-9278-68D0E5697425","grant_number":"259668"}],"author":[{"full_name":"Baldimtsi, Foteini","last_name":"Baldimtsi","first_name":"Foteini"},{"full_name":"Chase, Melissa","first_name":"Melissa","last_name":"Chase"},{"full_name":"Fuchsbauer, Georg","first_name":"Georg","id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87","last_name":"Fuchsbauer"},{"full_name":"Kohlweiss, Markulf","last_name":"Kohlweiss","first_name":"Markulf"}],"day":"17","acknowledgement":"Work done as an intern in Microsoft Research Redmond and as a student at Brown University, where supported by NSF grant 0964379. Supported by the European Research Council, ERC Starting Grant (259668-PSPC).","alternative_title":["LNCS"],"title":"Anonymous transferable e-cash","publisher":"Springer","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87"},{"language":[{"iso":"eng"}],"date_published":"2015-06-01T00:00:00Z","department":[{"_id":"KrPi"}],"type":"conference","oa_version":"Submitted Version","page":"595 - 603","date_created":"2018-12-11T11:53:16Z","publication":"Proceedings of the 47th annual ACM symposium on Theory of computing","publication_status":"published","conference":{"location":"Portland, OR, United States","end_date":"2015-06-17","name":"STOC: Symposium on the Theory of Computing","start_date":"2015-06-14"},"doi":"10.1145/2746539.2746622","citation":{"short":"J.F. Alwen, V. Serbinenko, in:, Proceedings of the 47th Annual ACM Symposium on Theory of Computing, ACM, 2015, pp. 595–603.","ieee":"J. F. Alwen and V. Serbinenko, “High parallel complexity graphs and memory-hard functions,” in <i>Proceedings of the 47th annual ACM symposium on Theory of computing</i>, Portland, OR, United States, 2015, pp. 595–603.","ama":"Alwen JF, Serbinenko V. High parallel complexity graphs and memory-hard functions. In: <i>Proceedings of the 47th Annual ACM Symposium on Theory of Computing</i>. ACM; 2015:595-603. doi:<a href=\"https://doi.org/10.1145/2746539.2746622\">10.1145/2746539.2746622</a>","apa":"Alwen, J. F., &#38; Serbinenko, V. (2015). High parallel complexity graphs and memory-hard functions. In <i>Proceedings of the 47th annual ACM symposium on Theory of computing</i> (pp. 595–603). Portland, OR, United States: ACM. <a href=\"https://doi.org/10.1145/2746539.2746622\">https://doi.org/10.1145/2746539.2746622</a>","ista":"Alwen JF, Serbinenko V. 2015. High parallel complexity graphs and memory-hard functions. Proceedings of the 47th annual ACM symposium on Theory of computing. STOC: Symposium on the Theory of Computing, 595–603.","mla":"Alwen, Joel F., and Vladimir Serbinenko. “High Parallel Complexity Graphs and Memory-Hard Functions.” <i>Proceedings of the 47th Annual ACM Symposium on Theory of Computing</i>, ACM, 2015, pp. 595–603, doi:<a href=\"https://doi.org/10.1145/2746539.2746622\">10.1145/2746539.2746622</a>.","chicago":"Alwen, Joel F, and Vladimir Serbinenko. “High Parallel Complexity Graphs and Memory-Hard Functions.” In <i>Proceedings of the 47th Annual ACM Symposium on Theory of Computing</i>, 595–603. ACM, 2015. <a href=\"https://doi.org/10.1145/2746539.2746622\">https://doi.org/10.1145/2746539.2746622</a>."},"quality_controlled":"1","scopus_import":1,"publist_id":"5498","main_file_link":[{"open_access":"1","url":"http://eprint.iacr.org/2014/238"}],"_id":"1652","project":[{"name":"Provable Security for Physical Cryptography","call_identifier":"FP7","_id":"258C570E-B435-11E9-9278-68D0E5697425","grant_number":"259668"}],"author":[{"last_name":"Alwen","id":"2A8DFA8C-F248-11E8-B48F-1D18A9856A87","first_name":"Joel F","full_name":"Alwen, Joel F"},{"full_name":"Serbinenko, Vladimir","last_name":"Serbinenko","first_name":"Vladimir"}],"day":"01","year":"2015","date_updated":"2021-01-12T06:52:16Z","abstract":[{"lang":"eng","text":"We develop new theoretical tools for proving lower-bounds on the (amortized) complexity of certain functions in models of parallel computation. We apply the tools to construct a class of functions with high amortized memory complexity in the parallel Random Oracle Model (pROM); a variant of the standard ROM allowing for batches of simultaneous queries. In particular we obtain a new, more robust, type of Memory-Hard Functions (MHF); a security primitive which has recently been gaining acceptance in practice as an effective means of countering brute-force attacks on security relevant functions. Along the way we also demonstrate an important shortcoming of previous definitions of MHFs and give a new definition addressing the problem. The tools we develop represent an adaptation of the powerful pebbling paradigm (initially introduced by Hewitt and Paterson [HP70] and Cook [Coo73]) to a simple and intuitive parallel setting. We define a simple pebbling game Gp over graphs which aims to abstract parallel computation in an intuitive way. As a conceptual contribution we define a measure of pebbling complexity for graphs called cumulative complexity (CC) and show how it overcomes a crucial shortcoming (in the parallel setting) exhibited by more traditional complexity measures used in the past. As a main technical contribution we give an explicit construction of a constant in-degree family of graphs whose CC in Gp approaches maximality to within a polylogarithmic factor for any graph of equal size (analogous to the graphs of Tarjan et. al. [PTC76, LT82] for sequential pebbling games). Finally, for a given graph G and related function fG, we derive a lower-bound on the amortized memory complexity of fG in the pROM in terms of the CC of G in the game Gp."}],"ec_funded":1,"month":"06","title":"High parallel complexity graphs and memory-hard functions","oa":1,"status":"public","publisher":"ACM","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87"},{"page":"85 - 109","date_created":"2018-12-11T11:53:17Z","has_accepted_license":"1","department":[{"_id":"KrPi"}],"language":[{"iso":"eng"}],"type":"conference","pubrep_id":"676","publist_id":"5496","quality_controlled":"1","volume":9453,"day":"30","file":[{"file_size":512071,"relation":"main_file","content_type":"application/pdf","date_created":"2018-12-12T10:09:09Z","file_name":"IST-2016-676-v1+1_881.pdf","date_updated":"2020-07-14T12:45:08Z","access_level":"open_access","checksum":"d1e53203db2d8573a560995ccdffac62","creator":"system","file_id":"4732"}],"author":[{"full_name":"Gazi, Peter","first_name":"Peter","last_name":"Gazi","id":"3E0BFE38-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Pietrzak, Krzysztof Z","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","last_name":"Pietrzak","first_name":"Krzysztof Z","orcid":"0000-0002-9139-1654"},{"last_name":"Tessaro","first_name":"Stefano","full_name":"Tessaro, Stefano"}],"project":[{"_id":"258C570E-B435-11E9-9278-68D0E5697425","grant_number":"259668","call_identifier":"FP7","name":"Provable Security for Physical Cryptography"}],"title":"Generic security of NMAC and HMAC with input whitening","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","series_title":"Lecture Notes in Computer Science","alternative_title":["LNCS"],"doi":"10.1007/978-3-662-48800-3_4","publication_status":"published","conference":{"end_date":"2015-12-03","location":"Auckland, New Zealand","start_date":"2015-11-29","name":"ASIACRYPT: Theory and Application of Cryptology and Information Security"},"date_published":"2015-12-30T00:00:00Z","oa_version":"Submitted Version","ddc":["004","005"],"file_date_updated":"2020-07-14T12:45:08Z","scopus_import":1,"intvolume":"      9453","citation":{"ieee":"P. Gazi, K. Z. Pietrzak, and S. Tessaro, “Generic security of NMAC and HMAC with input whitening,” vol. 9453. Springer, pp. 85–109, 2015.","ama":"Gazi P, Pietrzak KZ, Tessaro S. Generic security of NMAC and HMAC with input whitening. 2015;9453:85-109. doi:<a href=\"https://doi.org/10.1007/978-3-662-48800-3_4\">10.1007/978-3-662-48800-3_4</a>","short":"P. Gazi, K.Z. Pietrzak, S. Tessaro, 9453 (2015) 85–109.","chicago":"Gazi, Peter, Krzysztof Z Pietrzak, and Stefano Tessaro. “Generic Security of NMAC and HMAC with Input Whitening.” Lecture Notes in Computer Science. Springer, 2015. <a href=\"https://doi.org/10.1007/978-3-662-48800-3_4\">https://doi.org/10.1007/978-3-662-48800-3_4</a>.","apa":"Gazi, P., Pietrzak, K. Z., &#38; Tessaro, S. (2015). Generic security of NMAC and HMAC with input whitening. Presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Auckland, New Zealand: Springer. <a href=\"https://doi.org/10.1007/978-3-662-48800-3_4\">https://doi.org/10.1007/978-3-662-48800-3_4</a>","mla":"Gazi, Peter, et al. <i>Generic Security of NMAC and HMAC with Input Whitening</i>. Vol. 9453, Springer, 2015, pp. 85–109, doi:<a href=\"https://doi.org/10.1007/978-3-662-48800-3_4\">10.1007/978-3-662-48800-3_4</a>.","ista":"Gazi P, Pietrzak KZ, Tessaro S. 2015. Generic security of NMAC and HMAC with input whitening. 9453, 85–109."},"year":"2015","abstract":[{"text":"HMAC and its variant NMAC are the most popular approaches to deriving a MAC (and more generally, a PRF) from a cryptographic hash function. Despite nearly two decades of research, their exact security still remains far from understood in many different contexts. Indeed, recent works have re-surfaced interest for {\\em generic} attacks, i.e., attacks that treat the compression function of the underlying hash function as a black box.\r\n\r\nGeneric security can be proved in a model where the underlying compression function is modeled as a random function -- yet, to date, the question of proving tight, non-trivial bounds on the generic security of HMAC/NMAC even as a PRF remains a challenging open question.\r\n\r\nIn this paper, we ask the question of whether a small modification to HMAC and NMAC can allow us to exactly characterize the security of the resulting constructions, while only incurring little penalty with respect to efficiency. To this end, we present simple variants of NMAC and HMAC, for which we prove tight bounds on the generic PRF security, expressed in terms of numbers of construction and compression function queries necessary to break the construction. All of our constructions are obtained via a (near) {\\em black-box} modification of NMAC and HMAC, which can be interpreted as an initial step of key-dependent message pre-processing.\r\n\r\nWhile our focus is on PRF security, a further attractive feature of our new constructions is that they clearly defeat all recent generic attacks against properties such as state recovery and universal forgery. These exploit properties of the so-called ``functional graph'' which are not directly accessible in our new constructions. ","lang":"eng"}],"date_updated":"2021-01-12T06:52:16Z","_id":"1654","oa":1,"status":"public","ec_funded":1,"month":"12"},{"oa":1,"status":"public","ec_funded":1,"month":"10","year":"2015","abstract":[{"lang":"eng","text":"Quantifying behaviors of robots which were generated autonomously from task-independent objective functions is an important prerequisite for objective comparisons of algorithms and movements of animals. The temporal sequence of such a behavior can be considered as a time series and hence complexity measures developed for time series are natural candidates for its quantification. The predictive information and the excess entropy are such complexity measures. They measure the amount of information the past contains about the future and thus quantify the nonrandom structure in the temporal sequence. However, when using these measures for systems with continuous states one has to deal with the fact that their values will depend on the resolution with which the systems states are observed. For deterministic systems both measures will diverge with increasing resolution. We therefore propose a new decomposition of the excess entropy in resolution dependent and resolution independent parts and discuss how they depend on the dimensionality of the dynamics, correlations and the noise level. For the practical estimation we propose to use estimates based on the correlation integral instead of the direct estimation of the mutual information based on next neighbor statistics because the latter allows less control of the scale dependencies. Using our algorithm we are able to show how autonomous learning generates behavior of increasing complexity with increasing learning duration."}],"issue":"10","date_updated":"2023-10-17T11:42:00Z","_id":"1655","ddc":["000"],"file_date_updated":"2020-07-14T12:45:08Z","scopus_import":"1","intvolume":"        17","citation":{"short":"G.S. Martius, E. Olbrich, Entropy 17 (2015) 7266–7297.","ieee":"G. S. Martius and E. Olbrich, “Quantifying emergent behavior of autonomous robots,” <i>Entropy</i>, vol. 17, no. 10. MDPI, pp. 7266–7297, 2015.","ama":"Martius GS, Olbrich E. Quantifying emergent behavior of autonomous robots. <i>Entropy</i>. 2015;17(10):7266-7297. doi:<a href=\"https://doi.org/10.3390/e17107266\">10.3390/e17107266</a>","chicago":"Martius, Georg S, and Eckehard Olbrich. “Quantifying Emergent Behavior of Autonomous Robots.” <i>Entropy</i>. MDPI, 2015. <a href=\"https://doi.org/10.3390/e17107266\">https://doi.org/10.3390/e17107266</a>.","mla":"Martius, Georg S., and Eckehard Olbrich. “Quantifying Emergent Behavior of Autonomous Robots.” <i>Entropy</i>, vol. 17, no. 10, MDPI, 2015, pp. 7266–97, doi:<a href=\"https://doi.org/10.3390/e17107266\">10.3390/e17107266</a>.","apa":"Martius, G. S., &#38; Olbrich, E. (2015). Quantifying emergent behavior of autonomous robots. <i>Entropy</i>. MDPI. <a href=\"https://doi.org/10.3390/e17107266\">https://doi.org/10.3390/e17107266</a>","ista":"Martius GS, Olbrich E. 2015. Quantifying emergent behavior of autonomous robots. Entropy. 17(10), 7266–7297."},"doi":"10.3390/e17107266","publication_status":"published","date_published":"2015-10-23T00:00:00Z","oa_version":"Published Version","title":"Quantifying emergent behavior of autonomous robots","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"MDPI","day":"23","tmp":{"short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"acknowledgement":"This work was supported by the DFG priority program 1527 (Autonomous Learning) and by the European Community’s Seventh Framework Programme (FP7/2007-2013) under grant agreement no. 318723 (MatheMACS) and from the People Programme (Marie Curie Actions) of the European Union’s Seventh Framework Programme (FP7/2007-2013) under REA grant agreement no. 291734.","file":[{"content_type":"application/pdf","relation":"main_file","file_size":6455007,"file_id":"4943","checksum":"945d99631a96e0315acb26dc8541dcf9","creator":"system","access_level":"open_access","date_updated":"2020-07-14T12:45:08Z","file_name":"IST-2016-464-v1+1_entropy-17-07266.pdf","date_created":"2018-12-12T10:12:25Z"}],"author":[{"full_name":"Martius, Georg S","first_name":"Georg S","id":"3A276B68-F248-11E8-B48F-1D18A9856A87","last_name":"Martius"},{"first_name":"Eckehard","last_name":"Olbrich","full_name":"Olbrich, Eckehard"}],"project":[{"call_identifier":"FP7","name":"International IST Postdoc Fellowship Programme","_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734"}],"pubrep_id":"464","article_processing_charge":"No","publist_id":"5495","quality_controlled":"1","volume":17,"publication":"Entropy","page":"7266 - 7297","date_created":"2018-12-11T11:53:17Z","has_accepted_license":"1","department":[{"_id":"ChLa"},{"_id":"GaTk"}],"language":[{"iso":"eng"}],"type":"journal_article"},{"citation":{"short":"K. Chatterjee, T.A. Henzinger, J. Otop, in:, Proceedings - Symposium on Logic in Computer Science, IEEE, 2015.","ama":"Chatterjee K, Henzinger TA, Otop J. Nested weighted automata. In: <i>Proceedings - Symposium on Logic in Computer Science</i>. Vol 2015-July. IEEE; 2015. doi:<a href=\"https://doi.org/10.1109/LICS.2015.72\">10.1109/LICS.2015.72</a>","ieee":"K. Chatterjee, T. A. Henzinger, and J. Otop, “Nested weighted automata,” in <i>Proceedings - Symposium on Logic in Computer Science</i>, Kyoto, Japan, 2015, vol. 2015–July.","chicago":"Chatterjee, Krishnendu, Thomas A Henzinger, and Jan Otop. “Nested Weighted Automata.” In <i>Proceedings - Symposium on Logic in Computer Science</i>, Vol. 2015–July. IEEE, 2015. <a href=\"https://doi.org/10.1109/LICS.2015.72\">https://doi.org/10.1109/LICS.2015.72</a>.","ista":"Chatterjee K, Henzinger TA, Otop J. 2015. Nested weighted automata. Proceedings - Symposium on Logic in Computer Science. LICS: Logic in Computer Science vol. 2015–July, 7174926.","mla":"Chatterjee, Krishnendu, et al. “Nested Weighted Automata.” <i>Proceedings - Symposium on Logic in Computer Science</i>, vol. 2015–July, 7174926, IEEE, 2015, doi:<a href=\"https://doi.org/10.1109/LICS.2015.72\">10.1109/LICS.2015.72</a>.","apa":"Chatterjee, K., Henzinger, T. A., &#38; Otop, J. (2015). Nested weighted automata. In <i>Proceedings - Symposium on Logic in Computer Science</i> (Vol. 2015–July). Kyoto, Japan: IEEE. <a href=\"https://doi.org/10.1109/LICS.2015.72\">https://doi.org/10.1109/LICS.2015.72</a>"},"scopus_import":1,"oa_version":"None","date_published":"2015-07-31T00:00:00Z","doi":"10.1109/LICS.2015.72","conference":{"start_date":"2015-07-06","name":"LICS: Logic in Computer Science","end_date":"2015-07-10","location":"Kyoto, Japan"},"publication_status":"published","month":"07","ec_funded":1,"status":"public","article_number":"7174926","_id":"1656","arxiv":1,"abstract":[{"text":"Recently there has been a significant effort to handle quantitative properties in formal verification and synthesis. While weighted automata over finite and infinite words provide a natural and flexible framework to express quantitative properties, perhaps surprisingly, some basic system properties such as average response time cannot be expressed using weighted automata, nor in any other know decidable formalism. In this work, we introduce nested weighted automata as a natural extension of weighted automata which makes it possible to express important quantitative properties such as average response time. In nested weighted automata, a master automaton spins off and collects results from weighted slave automata, each of which computes a quantity along a finite portion of an infinite word. Nested weighted automata can be viewed as the quantitative analogue of monitor automata, which are used in run-time verification. We establish an almost complete decidability picture for the basic decision problems about nested weighted automata, and illustrate their applicability in several domains. In particular, nested weighted automata can be used to decide average response time properties.","lang":"eng"}],"date_updated":"2023-02-23T12:26:19Z","year":"2015","quality_controlled":"1","volume":"2015-July","external_id":{"arxiv":["1606.03598"]},"related_material":{"record":[{"id":"467","status":"public","relation":"later_version"},{"id":"5415","relation":"earlier_version","status":"public"},{"id":"5436","status":"public","relation":"earlier_version"}]},"publist_id":"5494","type":"conference","department":[{"_id":"KrCh"},{"_id":"ToHe"}],"language":[{"iso":"eng"}],"publication":"Proceedings - Symposium on Logic in Computer Science","date_created":"2018-12-11T11:53:17Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"IEEE","title":"Nested weighted automata","author":[{"full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-4561-241X","first_name":"Krishnendu"},{"full_name":"Henzinger, Thomas A","last_name":"Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","orcid":"0000−0002−2985−7724","first_name":"Thomas A"},{"first_name":"Jan","id":"2FC5DA74-F248-11E8-B48F-1D18A9856A87","last_name":"Otop","full_name":"Otop, Jan"}],"project":[{"name":"Quantitative Reactive Modeling","call_identifier":"FP7","grant_number":"267989","_id":"25EE3708-B435-11E9-9278-68D0E5697425"},{"_id":"25832EC2-B435-11E9-9278-68D0E5697425","grant_number":"S 11407_N23","name":"Rigorous Systems Engineering","call_identifier":"FWF"},{"call_identifier":"FWF","name":"The Wittgenstein Prize","_id":"25F42A32-B435-11E9-9278-68D0E5697425","grant_number":"Z211"},{"name":"Modern Graph Algorithmic Techniques in Formal Verification","call_identifier":"FWF","_id":"2584A770-B435-11E9-9278-68D0E5697425","grant_number":"P 23499-N23"},{"_id":"2581B60A-B435-11E9-9278-68D0E5697425","grant_number":"279307","name":"Quantitative Graph Games: Theory and Applications","call_identifier":"FP7"},{"_id":"2587B514-B435-11E9-9278-68D0E5697425","name":"Microsoft Research Faculty Fellowship"}],"acknowledgement":"This research was funded in part by the European Research Council (ERC) under grant agreement 267989 (QUAREM), by the Austrian Science Fund (FWF) projects S11402-N23 (RiSE), Z211-N23 (Wittgenstein Award), FWF Grant No P23499- N23, FWF NFN Grant No S11407-N23 (RiSE), ERC Start grant (279307: Graph Games), and Microsoft faculty fellows award.\r\nA Technical Report of the paper is available at: \r\nhttps://repository.ist.ac.at/331/\r\n","day":"31"},{"date_updated":"2023-02-23T12:26:16Z","abstract":[{"lang":"eng","text":"We consider Markov decision processes (MDPs) with multiple limit-average (or mean-payoff) objectives. There exist two different views: (i) ~the expectation semantics, where the goal is to optimize the expected mean-payoff objective, and (ii) ~the satisfaction semantics, where the goal is to maximize the probability of runs such that the mean-payoff value stays above a given vector. We consider optimization with respect to both objectives at once, thus unifying the existing semantics. Precisely, the goal is to optimize the expectation while ensuring the satisfaction constraint. Our problem captures the notion of optimization with respect to strategies that are risk-averse (i.e., Ensure certain probabilistic guarantee). Our main results are as follows: First, we present algorithms for the decision problems, which are always polynomial in the size of the MDP. We also show that an approximation of the Pareto curve can be computed in time polynomial in the size of the MDP, and the approximation factor, but exponential in the number of dimensions. Second, we present a complete characterization of the strategy complexity (in terms of memory bounds and randomization) required to solve our problem. "}],"year":"2015","_id":"1657","status":"public","month":"07","ec_funded":1,"publication_status":"published","conference":{"name":"LICS: Logic in Computer Science","start_date":"2015-07-06","location":"Kyoto, Japan","end_date":"2015-07-10"},"doi":"10.1109/LICS.2015.32","oa_version":"None","date_published":"2015-07-01T00:00:00Z","scopus_import":1,"citation":{"chicago":"Chatterjee, Krishnendu, Zuzana Komárková, and Jan Kretinsky. “Unifying Two Views on Multiple Mean-Payoff Objectives in Markov Decision Processes.” LICS. IEEE, 2015. <a href=\"https://doi.org/10.1109/LICS.2015.32\">https://doi.org/10.1109/LICS.2015.32</a>.","mla":"Chatterjee, Krishnendu, et al. <i>Unifying Two Views on Multiple Mean-Payoff Objectives in Markov Decision Processes</i>. IEEE, 2015, pp. 244–56, doi:<a href=\"https://doi.org/10.1109/LICS.2015.32\">10.1109/LICS.2015.32</a>.","apa":"Chatterjee, K., Komárková, Z., &#38; Kretinsky, J. (2015). Unifying two views on multiple mean-payoff objectives in Markov decision processes. Presented at the LICS: Logic in Computer Science, Kyoto, Japan: IEEE. <a href=\"https://doi.org/10.1109/LICS.2015.32\">https://doi.org/10.1109/LICS.2015.32</a>","ista":"Chatterjee K, Komárková Z, Kretinsky J. 2015. Unifying two views on multiple mean-payoff objectives in Markov decision processes. , 244–256.","ieee":"K. Chatterjee, Z. Komárková, and J. Kretinsky, “Unifying two views on multiple mean-payoff objectives in Markov decision processes.” IEEE, pp. 244–256, 2015.","ama":"Chatterjee K, Komárková Z, Kretinsky J. Unifying two views on multiple mean-payoff objectives in Markov decision processes. 2015:244-256. doi:<a href=\"https://doi.org/10.1109/LICS.2015.32\">10.1109/LICS.2015.32</a>","short":"K. Chatterjee, Z. Komárková, J. Kretinsky, (2015) 244–256."},"acknowledgement":"A Technical Report of this paper is available at:  https://repository.ist.ac.at/327\r\n","day":"01","project":[{"name":"Modern Graph Algorithmic Techniques in Formal Verification","call_identifier":"FWF","_id":"2584A770-B435-11E9-9278-68D0E5697425","grant_number":"P 23499-N23"},{"grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","name":"Rigorous Systems Engineering","call_identifier":"FWF"},{"_id":"25F42A32-B435-11E9-9278-68D0E5697425","grant_number":"Z211","call_identifier":"FWF","name":"The Wittgenstein Prize"},{"call_identifier":"FP7","name":"Quantitative Graph Games: Theory and Applications","grant_number":"279307","_id":"2581B60A-B435-11E9-9278-68D0E5697425"},{"call_identifier":"FP7","name":"Quantitative Reactive Modeling","_id":"25EE3708-B435-11E9-9278-68D0E5697425","grant_number":"267989"},{"_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734","call_identifier":"FP7","name":"International IST Postdoc Fellowship Programme"}],"author":[{"full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","first_name":"Krishnendu","orcid":"0000-0002-4561-241X"},{"full_name":"Komárková, Zuzana","first_name":"Zuzana","last_name":"Komárková"},{"last_name":"Kretinsky","id":"44CEF464-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8122-2881","first_name":"Jan","full_name":"Kretinsky, Jan"}],"publisher":"IEEE","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","title":"Unifying two views on multiple mean-payoff objectives in Markov decision processes","alternative_title":["LICS"],"series_title":"LICS","date_created":"2018-12-11T11:53:18Z","page":"244 - 256","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"KrCh"},{"_id":"ToHe"}],"publist_id":"5493","quality_controlled":"1","related_material":{"record":[{"status":"public","relation":"later_version","id":"466"},{"relation":"earlier_version","status":"public","id":"5429"},{"relation":"earlier_version","status":"public","id":"5435"}]}},{"alternative_title":["LNCS"],"series_title":"Lecture Notes in Computer Science","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","title":"Adaptive moment closure for parameter inference of biochemical reaction networks","author":[{"first_name":"Sergiy","orcid":"0000-0002-0686-0365","last_name":"Bogomolov","id":"369D9A44-F248-11E8-B48F-1D18A9856A87","full_name":"Bogomolov, Sergiy"},{"orcid":"0000−0002−2985−7724","first_name":"Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger","full_name":"Henzinger, Thomas A"},{"last_name":"Podelski","first_name":"Andreas","full_name":"Podelski, Andreas"},{"first_name":"Jakob","orcid":"0000-0003-1615-3282","last_name":"Ruess","id":"4A245D00-F248-11E8-B48F-1D18A9856A87","full_name":"Ruess, Jakob"},{"first_name":"Christian","last_name":"Schilling","full_name":"Schilling, Christian"}],"project":[{"name":"Quantitative Reactive Modeling","call_identifier":"FP7","_id":"25EE3708-B435-11E9-9278-68D0E5697425","grant_number":"267989"},{"call_identifier":"FWF","name":"The Wittgenstein Prize","grant_number":"Z211","_id":"25F42A32-B435-11E9-9278-68D0E5697425"},{"call_identifier":"FWF","name":"Rigorous Systems Engineering","_id":"25832EC2-B435-11E9-9278-68D0E5697425","grant_number":"S 11407_N23"},{"name":"International IST Postdoc Fellowship Programme","call_identifier":"FP7","grant_number":"291734","_id":"25681D80-B435-11E9-9278-68D0E5697425"}],"day":"01","volume":9308,"quality_controlled":"1","related_material":{"record":[{"id":"1148","relation":"later_version","status":"public"}]},"publist_id":"5492","type":"conference","department":[{"_id":"ToHe"},{"_id":"GaTk"}],"language":[{"iso":"eng"}],"page":"77 - 89","date_created":"2018-12-11T11:53:18Z","month":"09","ec_funded":1,"status":"public","_id":"1658","abstract":[{"lang":"eng","text":"Continuous-time Markov chain (CTMC) models have become a central tool for understanding the dynamics of complex reaction networks and the importance of stochasticity in the underlying biochemical processes. When such models are employed to answer questions in applications, in order to ensure that the model provides a sufficiently accurate representation of the real system, it is of vital importance that the model parameters are inferred from real measured data. This, however, is often a formidable task and all of the existing methods fail in one case or the other, usually because the underlying CTMC model is high-dimensional and computationally difficult to analyze. The parameter inference methods that tend to scale best in the dimension of the CTMC are based on so-called moment closure approximations. However, there exists a large number of different moment closure approximations and it is typically hard to say a priori which of the approximations is the most suitable for the inference procedure. Here, we propose a moment-based parameter inference method that automatically chooses the most appropriate moment closure method. Accordingly, contrary to existing methods, the user is not required to be experienced in moment closure techniques. In addition to that, our method adaptively changes the approximation during the parameter inference to ensure that always the best approximation is used, even in cases where different approximations are best in different regions of the parameter space."}],"date_updated":"2023-02-21T16:17:24Z","year":"2015","intvolume":"      9308","citation":{"chicago":"Bogomolov, Sergiy, Thomas A Henzinger, Andreas Podelski, Jakob Ruess, and Christian Schilling. “Adaptive Moment Closure for Parameter Inference of Biochemical Reaction Networks.” Lecture Notes in Computer Science. Springer, 2015. <a href=\"https://doi.org/10.1007/978-3-319-23401-4_8\">https://doi.org/10.1007/978-3-319-23401-4_8</a>.","apa":"Bogomolov, S., Henzinger, T. A., Podelski, A., Ruess, J., &#38; Schilling, C. (2015). Adaptive moment closure for parameter inference of biochemical reaction networks. Presented at the CMSB: Computational Methods in Systems Biology, Nantes, France: Springer. <a href=\"https://doi.org/10.1007/978-3-319-23401-4_8\">https://doi.org/10.1007/978-3-319-23401-4_8</a>","mla":"Bogomolov, Sergiy, et al. <i>Adaptive Moment Closure for Parameter Inference of Biochemical Reaction Networks</i>. Vol. 9308, Springer, 2015, pp. 77–89, doi:<a href=\"https://doi.org/10.1007/978-3-319-23401-4_8\">10.1007/978-3-319-23401-4_8</a>.","ista":"Bogomolov S, Henzinger TA, Podelski A, Ruess J, Schilling C. 2015. Adaptive moment closure for parameter inference of biochemical reaction networks. 9308, 77–89.","short":"S. Bogomolov, T.A. Henzinger, A. Podelski, J. Ruess, C. Schilling, 9308 (2015) 77–89.","ieee":"S. Bogomolov, T. A. Henzinger, A. Podelski, J. Ruess, and C. Schilling, “Adaptive moment closure for parameter inference of biochemical reaction networks,” vol. 9308. Springer, pp. 77–89, 2015.","ama":"Bogomolov S, Henzinger TA, Podelski A, Ruess J, Schilling C. Adaptive moment closure for parameter inference of biochemical reaction networks. 2015;9308:77-89. doi:<a href=\"https://doi.org/10.1007/978-3-319-23401-4_8\">10.1007/978-3-319-23401-4_8</a>"},"scopus_import":1,"oa_version":"None","date_published":"2015-09-01T00:00:00Z","doi":"10.1007/978-3-319-23401-4_8","publication_status":"published","conference":{"location":"Nantes, France","end_date":"2015-09-18","name":"CMSB: Computational Methods in Systems Biology","start_date":"2015-09-16"}},{"article_processing_charge":"No","publist_id":"5491","quality_controlled":"1","related_material":{"record":[{"id":"5439","status":"public","relation":"earlier_version"}]},"has_accepted_license":"1","publication":"LICS","page":"750 - 761","date_created":"2018-12-11T11:53:19Z","type":"conference","department":[{"_id":"ToHe"}],"language":[{"iso":"eng"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"IEEE","title":"The target discounted-sum problem","series_title":"Logic in Computer Science","acknowledgement":"A technical report of the article is available at: https://research-explorer.app.ist.ac.at/record/5439","day":"01","author":[{"first_name":"Udi","last_name":"Boker","id":"31E297B6-F248-11E8-B48F-1D18A9856A87","full_name":"Boker, Udi"},{"last_name":"Henzinger","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","orcid":"0000−0002−2985−7724","full_name":"Henzinger, Thomas A"},{"full_name":"Otop, Jan","id":"2FC5DA74-F248-11E8-B48F-1D18A9856A87","last_name":"Otop","first_name":"Jan"}],"project":[{"call_identifier":"FP7","name":"Quantitative Reactive Modeling","_id":"25EE3708-B435-11E9-9278-68D0E5697425","grant_number":"267989"},{"grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Rigorous Systems Engineering"},{"name":"The Wittgenstein Prize","call_identifier":"FWF","_id":"25F42A32-B435-11E9-9278-68D0E5697425","grant_number":"Z211"}],"file":[{"date_updated":"2020-07-14T12:45:10Z","file_name":"2015_LICS_Boker.pdf","date_created":"2020-05-15T08:53:29Z","checksum":"6abebca9c1a620e9e103a8f9222befac","file_id":"7852","creator":"dernst","access_level":"open_access","content_type":"application/pdf","relation":"main_file","file_size":340215}],"scopus_import":1,"file_date_updated":"2020-07-14T12:45:10Z","ddc":["000"],"citation":{"ista":"Boker U, Henzinger TA, Otop J. 2015. The target discounted-sum problem. LICS. LICS: Logic in Computer ScienceLogic in Computer Science, 750–761.","apa":"Boker, U., Henzinger, T. A., &#38; Otop, J. (2015). The target discounted-sum problem. In <i>LICS</i> (pp. 750–761). Kyoto, Japan: IEEE. <a href=\"https://doi.org/10.1109/LICS.2015.74\">https://doi.org/10.1109/LICS.2015.74</a>","mla":"Boker, Udi, et al. “The Target Discounted-Sum Problem.” <i>LICS</i>, IEEE, 2015, pp. 750–61, doi:<a href=\"https://doi.org/10.1109/LICS.2015.74\">10.1109/LICS.2015.74</a>.","chicago":"Boker, Udi, Thomas A Henzinger, and Jan Otop. “The Target Discounted-Sum Problem.” In <i>LICS</i>, 750–61. Logic in Computer Science. IEEE, 2015. <a href=\"https://doi.org/10.1109/LICS.2015.74\">https://doi.org/10.1109/LICS.2015.74</a>.","ieee":"U. Boker, T. A. Henzinger, and J. Otop, “The target discounted-sum problem,” in <i>LICS</i>, Kyoto, Japan, 2015, pp. 750–761.","ama":"Boker U, Henzinger TA, Otop J. The target discounted-sum problem. In: <i>LICS</i>. Logic in Computer Science. IEEE; 2015:750-761. doi:<a href=\"https://doi.org/10.1109/LICS.2015.74\">10.1109/LICS.2015.74</a>","short":"U. Boker, T.A. Henzinger, J. Otop, in:, LICS, IEEE, 2015, pp. 750–761."},"doi":"10.1109/LICS.2015.74","conference":{"end_date":"2015-07-10","location":"Kyoto, Japan","start_date":"2015-007-06","name":"LICS: Logic in Computer Science"},"publication_status":"published","oa_version":"Submitted Version","date_published":"2015-07-01T00:00:00Z","status":"public","oa":1,"publication_identifier":{"issn":["1043-6871 "],"eisbn":["978-1-4799-8875-4 "]},"month":"07","ec_funded":1,"abstract":[{"lang":"eng","text":"The target discounted-sum problem is the following: Given a rational discount factor 0 &lt; λ &lt; 1 and three rational values a, b, and t, does there exist a finite or an infinite sequence w ε(a, b)∗ or w ε(a, b)w, such that Σ|w| i=0 w(i)λi equals t? The problem turns out to relate to many fields of mathematics and computer science, and its decidability question is surprisingly hard to solve. We solve the finite version of the problem, and show the hardness of the infinite version, linking it to various areas and open problems in mathematics and computer science: β-expansions, discounted-sum automata, piecewise affine maps, and generalizations of the Cantor set. We provide some partial results to the infinite version, among which are solutions to its restriction to eventually-periodic sequences and to the cases that λ λ 1/2 or λ = 1/n, for every n ε N. We use our results for solving some open problems on discounted-sum automata, among which are the exact-value problem for nondeterministic automata over finite words and the universality and inclusion problems for functional automata."}],"date_updated":"2023-02-23T12:26:27Z","year":"2015","_id":"1659"},{"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"IEEE","status":"public","oa":1,"title":"Long-run average behaviour of probabilistic vector addition systems","alternative_title":["LICS"],"month":"07","ec_funded":1,"abstract":[{"text":"We study the pattern frequency vector for runs in probabilistic Vector Addition Systems with States (pVASS). Intuitively, each configuration of a given pVASS is assigned one of finitely many patterns, and every run can thus be seen as an infinite sequence of these patterns. The pattern frequency vector assigns to each run the limit of pattern frequencies computed for longer and longer prefixes of the run. If the limit does not exist, then the vector is undefined. We show that for one-counter pVASS, the pattern frequency vector is defined and takes one of finitely many values for almost all runs. Further, these values and their associated probabilities can be approximated up to an arbitrarily small relative error in polynomial time. For stable two-counter pVASS, we show the same result, but we do not provide any upper complexity bound. As a byproduct of our study, we discover counterexamples falsifying some classical results about stochastic Petri nets published in the 80s.","lang":"eng"}],"date_updated":"2021-01-12T06:52:20Z","year":"2015","day":"01","author":[{"full_name":"Brázdil, Tomáš","first_name":"Tomáš","last_name":"Brázdil"},{"full_name":"Kiefer, Stefan","last_name":"Kiefer","first_name":"Stefan"},{"full_name":"Kučera, Antonín","last_name":"Kučera","first_name":"Antonín"},{"full_name":"Novotny, Petr","id":"3CC3B868-F248-11E8-B48F-1D18A9856A87","last_name":"Novotny","first_name":"Petr"}],"project":[{"grant_number":"291734","_id":"25681D80-B435-11E9-9278-68D0E5697425","name":"International IST Postdoc Fellowship Programme","call_identifier":"FP7"}],"_id":"1660","main_file_link":[{"open_access":"1","url":"http://arxiv.org/abs/1505.02655"}],"publist_id":"5490","scopus_import":1,"citation":{"ieee":"T. Brázdil, S. Kiefer, A. Kučera, and P. Novotný, “Long-run average behaviour of probabilistic vector addition systems,” presented at the LICS: Logic in Computer Science, Kyoto, Japan, 2015, pp. 44–55.","ama":"Brázdil T, Kiefer S, Kučera A, Novotný P. Long-run average behaviour of probabilistic vector addition systems. In: IEEE; 2015:44-55. doi:<a href=\"https://doi.org/10.1109/LICS.2015.15\">10.1109/LICS.2015.15</a>","short":"T. Brázdil, S. Kiefer, A. Kučera, P. Novotný, in:, IEEE, 2015, pp. 44–55.","chicago":"Brázdil, Tomáš, Stefan Kiefer, Antonín Kučera, and Petr Novotný. “Long-Run Average Behaviour of Probabilistic Vector Addition Systems,” 44–55. IEEE, 2015. <a href=\"https://doi.org/10.1109/LICS.2015.15\">https://doi.org/10.1109/LICS.2015.15</a>.","mla":"Brázdil, Tomáš, et al. <i>Long-Run Average Behaviour of Probabilistic Vector Addition Systems</i>. IEEE, 2015, pp. 44–55, doi:<a href=\"https://doi.org/10.1109/LICS.2015.15\">10.1109/LICS.2015.15</a>.","apa":"Brázdil, T., Kiefer, S., Kučera, A., &#38; Novotný, P. (2015). Long-run average behaviour of probabilistic vector addition systems (pp. 44–55). Presented at the LICS: Logic in Computer Science, Kyoto, Japan: IEEE. <a href=\"https://doi.org/10.1109/LICS.2015.15\">https://doi.org/10.1109/LICS.2015.15</a>","ista":"Brázdil T, Kiefer S, Kučera A, Novotný P. 2015. Long-run average behaviour of probabilistic vector addition systems. LICS: Logic in Computer Science, LICS, , 44–55."},"quality_controlled":"1","doi":"10.1109/LICS.2015.15","publication_status":"published","conference":{"end_date":"2015-07-10","location":"Kyoto, Japan","start_date":"2015-07-06","name":"LICS: Logic in Computer Science"},"date_created":"2018-12-11T11:53:19Z","page":"44 - 55","oa_version":"Preprint","type":"conference","date_published":"2015-07-01T00:00:00Z","department":[{"_id":"KrCh"}],"language":[{"iso":"eng"}]},{"publisher":"IEEE","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","title":"Improved algorithms for one-pair and k-pair Streett objectives","acknowledgement":"K. C. is supported by the Austrian Science Fund (FWF): P23499-N23 and S11407-N23 (RiSE), an ERC Start Grant (279307: Graph Games), and a Microsoft Faculty Fellows Award. M. H. is supported by the Austrian Science Fund (FWF): P23499-N23 and the Vienna Science and Technology Fund (WWTF) grant ICT10-002. V. L. is supported by the Vienna Science and Technology Fund (WWTF) grant ICT10-002. The research leading to these results has received funding from the European Research Council under the European Union’s Seventh Framework Programme (FP/2007-2013) / ERC Grant Agreement no. 340506.","day":"01","project":[{"_id":"2584A770-B435-11E9-9278-68D0E5697425","grant_number":"P 23499-N23","name":"Modern Graph Algorithmic Techniques in Formal Verification","call_identifier":"FWF"},{"_id":"25832EC2-B435-11E9-9278-68D0E5697425","grant_number":"S 11407_N23","name":"Rigorous Systems Engineering","call_identifier":"FWF"},{"_id":"2581B60A-B435-11E9-9278-68D0E5697425","grant_number":"279307","call_identifier":"FP7","name":"Quantitative Graph Games: Theory and Applications"}],"author":[{"full_name":"Chatterjee, Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","last_name":"Chatterjee","first_name":"Krishnendu","orcid":"0000-0002-4561-241X"},{"first_name":"Monika H","orcid":"0000-0002-5008-6530","last_name":"Henzinger","id":"540c9bbd-f2de-11ec-812d-d04a5be85630","full_name":"Henzinger, Monika H"},{"full_name":"Loitzenbauer, Veronika","first_name":"Veronika","last_name":"Loitzenbauer"}],"publist_id":"5489","article_processing_charge":"No","volume":"2015-July","quality_controlled":"1","related_material":{"record":[{"status":"public","relation":"later_version","id":"464"}]},"date_created":"2018-12-11T11:53:19Z","publication":"Proceedings - Symposium on Logic in Computer Science","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"KrCh"}],"status":"public","oa":1,"month":"07","ec_funded":1,"date_updated":"2025-06-02T08:53:41Z","abstract":[{"text":"The computation of the winning set for one-pair Streett objectives and for k-pair Streett objectives in (standard) graphs as well as in game graphs are central problems in computer-aided verification, with application to the verification of closed systems with strong fairness conditions, the verification of open systems, checking interface compatibility, well-formed ness of specifications, and the synthesis of reactive systems. We give faster algorithms for the computation of the winning set for (1) one-pair Streett objectives (aka parity-3 problem) in game graphs and (2) for k-pair Streett objectives in graphs. For both problems this represents the first improvement in asymptotic running time in 15 years.","lang":"eng"}],"year":"2015","article_number":"7174888","_id":"1661","main_file_link":[{"url":"https://eprints.cs.univie.ac.at/4368/","open_access":"1"}],"scopus_import":"1","citation":{"mla":"Chatterjee, Krishnendu, et al. “Improved Algorithms for One-Pair and k-Pair Streett Objectives.” <i>Proceedings - Symposium on Logic in Computer Science</i>, vol. 2015–July, 7174888, IEEE, 2015, doi:<a href=\"https://doi.org/10.1109/LICS.2015.34\">10.1109/LICS.2015.34</a>.","apa":"Chatterjee, K., Henzinger, M. H., &#38; Loitzenbauer, V. (2015). Improved algorithms for one-pair and k-pair Streett objectives. In <i>Proceedings - Symposium on Logic in Computer Science</i> (Vol. 2015–July). Kyoto, Japan: IEEE. <a href=\"https://doi.org/10.1109/LICS.2015.34\">https://doi.org/10.1109/LICS.2015.34</a>","ista":"Chatterjee K, Henzinger MH, Loitzenbauer V. 2015. Improved algorithms for one-pair and k-pair Streett objectives. Proceedings - Symposium on Logic in Computer Science. LICS: Logic in Computer Science vol. 2015–July, 7174888.","chicago":"Chatterjee, Krishnendu, Monika H Henzinger, and Veronika Loitzenbauer. “Improved Algorithms for One-Pair and k-Pair Streett Objectives.” In <i>Proceedings - Symposium on Logic in Computer Science</i>, Vol. 2015–July. IEEE, 2015. <a href=\"https://doi.org/10.1109/LICS.2015.34\">https://doi.org/10.1109/LICS.2015.34</a>.","short":"K. Chatterjee, M.H. Henzinger, V. Loitzenbauer, in:, Proceedings - Symposium on Logic in Computer Science, IEEE, 2015.","ieee":"K. Chatterjee, M. H. Henzinger, and V. Loitzenbauer, “Improved algorithms for one-pair and k-pair Streett objectives,” in <i>Proceedings - Symposium on Logic in Computer Science</i>, Kyoto, Japan, 2015, vol. 2015–July.","ama":"Chatterjee K, Henzinger MH, Loitzenbauer V. Improved algorithms for one-pair and k-pair Streett objectives. In: <i>Proceedings - Symposium on Logic in Computer Science</i>. Vol 2015-July. IEEE; 2015. doi:<a href=\"https://doi.org/10.1109/LICS.2015.34\">10.1109/LICS.2015.34</a>"},"publication_status":"published","conference":{"end_date":"2015-07-10","location":"Kyoto, Japan","start_date":"2015-07-06","name":"LICS: Logic in Computer Science"},"doi":"10.1109/LICS.2015.34","oa_version":"Submitted Version","date_published":"2015-07-01T00:00:00Z"},{"tmp":{"name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)","legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","short":"CC BY-NC-ND (4.0)","image":"/images/cc_by_nc_nd.png"},"day":"01","file":[{"access_level":"local","file_id":"5321","checksum":"4ee690b6444b7a43523237f0941457d1","creator":"system","date_created":"2018-12-12T10:18:03Z","date_updated":"2020-07-14T12:45:10Z","file_name":"IST-2016-578-v1+1_CLS-D-15-00072R1_.pdf","file_size":1735337,"relation":"main_file","content_type":"application/pdf"}],"author":[{"full_name":"Kovács, Krisztián","first_name":"Krisztián","id":"2AB5821E-F248-11E8-B48F-1D18A9856A87","last_name":"Kovács"},{"full_name":"Steinmann, Myriam","last_name":"Steinmann","first_name":"Myriam"},{"full_name":"Halfon, Olivier","first_name":"Olivier","last_name":"Halfon"},{"last_name":"Magistretti","first_name":"Pierre","full_name":"Magistretti, Pierre"},{"full_name":"Cardinaux, Jean","last_name":"Cardinaux","first_name":"Jean"}],"project":[{"name":"International IST Postdoc Fellowship Programme","call_identifier":"FP7","_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734"}],"title":"Complex regulation of CREB-binding protein by homeodomain-interacting protein kinase 2","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Elsevier","publication":"Cellular Signalling","page":"2252 - 2260","date_created":"2018-12-11T11:53:20Z","has_accepted_license":"1","department":[{"_id":"JoCs"}],"language":[{"iso":"eng"}],"type":"journal_article","pubrep_id":"578","publist_id":"5487","volume":27,"quality_controlled":"1","year":"2015","issue":"11","abstract":[{"text":"CREB-binding protein (CBP) and p300 are transcriptional coactivators involved in numerous biological processes that affect cell growth, transformation, differentiation, and development. In this study, we provide evidence of the involvement of homeodomain-interacting protein kinase 2 (HIPK2) in the regulation of CBP activity. We show that HIPK2 interacts with and phosphorylates several regions of CBP. We demonstrate that serines 2361, 2363, 2371, 2376, and 2381 are responsible for the HIPK2-induced mobility shift of CBP C-terminal activation domain. Moreover, we show that HIPK2 strongly potentiates the transcriptional activity of CBP. However, our data suggest that HIPK2 activates CBP mainly by counteracting the repressive action of cell cycle regulatory domain 1 (CRD1), located between amino acids 977 and 1076, independently of CBP phosphorylation. Our findings thus highlight a complex regulation of CBP activity by HIPK2, which might be relevant for the control of specific sets of target genes involved in cellular proliferation, differentiation and apoptosis.","lang":"eng"}],"date_updated":"2021-01-12T06:52:22Z","_id":"1663","status":"public","ec_funded":1,"month":"11","doi":"10.1016/j.cellsig.2015.08.001","publication_status":"published","date_published":"2015-11-01T00:00:00Z","oa_version":"Published Version","ddc":["570"],"file_date_updated":"2020-07-14T12:45:10Z","scopus_import":1,"intvolume":"        27","citation":{"chicago":"Kovács, Krisztián, Myriam Steinmann, Olivier Halfon, Pierre Magistretti, and Jean Cardinaux. “Complex Regulation of CREB-Binding Protein by Homeodomain-Interacting Protein Kinase 2.” <i>Cellular Signalling</i>. Elsevier, 2015. <a href=\"https://doi.org/10.1016/j.cellsig.2015.08.001\">https://doi.org/10.1016/j.cellsig.2015.08.001</a>.","apa":"Kovács, K., Steinmann, M., Halfon, O., Magistretti, P., &#38; Cardinaux, J. (2015). Complex regulation of CREB-binding protein by homeodomain-interacting protein kinase 2. <i>Cellular Signalling</i>. Elsevier. <a href=\"https://doi.org/10.1016/j.cellsig.2015.08.001\">https://doi.org/10.1016/j.cellsig.2015.08.001</a>","ista":"Kovács K, Steinmann M, Halfon O, Magistretti P, Cardinaux J. 2015. Complex regulation of CREB-binding protein by homeodomain-interacting protein kinase 2. Cellular Signalling. 27(11), 2252–2260.","mla":"Kovács, Krisztián, et al. “Complex Regulation of CREB-Binding Protein by Homeodomain-Interacting Protein Kinase 2.” <i>Cellular Signalling</i>, vol. 27, no. 11, Elsevier, 2015, pp. 2252–60, doi:<a href=\"https://doi.org/10.1016/j.cellsig.2015.08.001\">10.1016/j.cellsig.2015.08.001</a>.","ieee":"K. Kovács, M. Steinmann, O. Halfon, P. Magistretti, and J. Cardinaux, “Complex regulation of CREB-binding protein by homeodomain-interacting protein kinase 2,” <i>Cellular Signalling</i>, vol. 27, no. 11. Elsevier, pp. 2252–2260, 2015.","ama":"Kovács K, Steinmann M, Halfon O, Magistretti P, Cardinaux J. Complex regulation of CREB-binding protein by homeodomain-interacting protein kinase 2. <i>Cellular Signalling</i>. 2015;27(11):2252-2260. doi:<a href=\"https://doi.org/10.1016/j.cellsig.2015.08.001\">10.1016/j.cellsig.2015.08.001</a>","short":"K. Kovács, M. Steinmann, O. Halfon, P. Magistretti, J. Cardinaux, Cellular Signalling 27 (2015) 2252–2260."}},{"volume":526,"quality_controlled":"1","publist_id":"5485","type":"journal_article","department":[{"_id":"BjHo"}],"language":[{"iso":"eng"}],"publication":"Nature","date_created":"2018-12-11T11:53:20Z","page":"550 - 553","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Nature Publishing Group","title":"The rise of fully turbulent flow","author":[{"full_name":"Barkley, Dwight","first_name":"Dwight","last_name":"Barkley"},{"first_name":"Baofang","last_name":"Song","full_name":"Song, Baofang"},{"full_name":"Vasudevan, Mukund","first_name":"Mukund","id":"3C5A959A-F248-11E8-B48F-1D18A9856A87","last_name":"Vasudevan"},{"full_name":"Lemoult, Grégoire M","first_name":"Grégoire M","id":"4787FE80-F248-11E8-B48F-1D18A9856A87","last_name":"Lemoult"},{"first_name":"Marc","last_name":"Avila","full_name":"Avila, Marc"},{"id":"3A374330-F248-11E8-B48F-1D18A9856A87","last_name":"Hof","first_name":"Björn","orcid":"0000-0003-2057-2754","full_name":"Hof, Björn"}],"project":[{"call_identifier":"FP7","name":"Decoding the complexity of turbulence at its origin","grant_number":"306589","_id":"25152F3A-B435-11E9-9278-68D0E5697425"}],"acknowledgement":"We acknowledge the Deutsche Forschungsgemeinschaft (Project No. FOR 1182), and the European Research Council under the European Union’s Seventh Framework Programme (FP/2007-2013)/ERC Grant Agreement 306589 for financial support. B.S. acknowledges financial support from the Chinese State Scholarship Fund under grant number 2010629145. B.S. acknowledges support from the International Max Planck Research School for the Physics of Biological and Complex Systems and the Göttingen Graduate School for Neurosciences and Molecular Biosciences. We acknowledge computing resources from GWDG (Gesellschaft für wissenschaftliche Datenverarbeitung Göttingen) and the Jülich Supercomputing Centre (grant HGU16) where the simulations were performed.","day":"21","citation":{"ista":"Barkley D, Song B, Vasudevan M, Lemoult GM, Avila M, Hof B. 2015. The rise of fully turbulent flow. Nature. 526(7574), 550–553.","mla":"Barkley, Dwight, et al. “The Rise of Fully Turbulent Flow.” <i>Nature</i>, vol. 526, no. 7574, Nature Publishing Group, 2015, pp. 550–53, doi:<a href=\"https://doi.org/10.1038/nature15701\">10.1038/nature15701</a>.","apa":"Barkley, D., Song, B., Vasudevan, M., Lemoult, G. M., Avila, M., &#38; Hof, B. (2015). The rise of fully turbulent flow. <i>Nature</i>. Nature Publishing Group. <a href=\"https://doi.org/10.1038/nature15701\">https://doi.org/10.1038/nature15701</a>","chicago":"Barkley, Dwight, Baofang Song, Mukund Vasudevan, Grégoire M Lemoult, Marc Avila, and Björn Hof. “The Rise of Fully Turbulent Flow.” <i>Nature</i>. Nature Publishing Group, 2015. <a href=\"https://doi.org/10.1038/nature15701\">https://doi.org/10.1038/nature15701</a>.","short":"D. Barkley, B. Song, M. Vasudevan, G.M. Lemoult, M. Avila, B. Hof, Nature 526 (2015) 550–553.","ama":"Barkley D, Song B, Vasudevan M, Lemoult GM, Avila M, Hof B. The rise of fully turbulent flow. <i>Nature</i>. 2015;526(7574):550-553. doi:<a href=\"https://doi.org/10.1038/nature15701\">10.1038/nature15701</a>","ieee":"D. Barkley, B. Song, M. Vasudevan, G. M. Lemoult, M. Avila, and B. Hof, “The rise of fully turbulent flow,” <i>Nature</i>, vol. 526, no. 7574. Nature Publishing Group, pp. 550–553, 2015."},"intvolume":"       526","main_file_link":[{"url":"http://arxiv.org/abs/1510.09143","open_access":"1"}],"scopus_import":1,"oa_version":"Preprint","date_published":"2015-10-21T00:00:00Z","doi":"10.1038/nature15701","publication_status":"published","month":"10","ec_funded":1,"status":"public","oa":1,"_id":"1664","abstract":[{"text":"Over a century of research into the origin of turbulence in wall-bounded shear flows has resulted in a puzzling picture in which turbulence appears in a variety of different states competing with laminar background flow. At moderate flow speeds, turbulence is confined to localized patches; it is only at higher speeds that the entire flow becomes turbulent. The origin of the different states encountered during this transition, the front dynamics of the turbulent regions and the transformation to full turbulence have yet to be explained. By combining experiments, theory and computer simulations, here we uncover a bifurcation scenario that explains the transformation to fully turbulent pipe flow and describe the front dynamics of the different states encountered in the process. Key to resolving this problem is the interpretation of the flow as a bistable system with nonlinear propagation (advection) of turbulent fronts. These findings bridge the gap between our understanding of the onset of turbulence and fully turbulent flows.","lang":"eng"}],"issue":"7574","date_updated":"2021-01-12T06:52:22Z","year":"2015"},{"ec_funded":1,"month":"10","oa":1,"status":"public","_id":"1665","year":"2015","issue":"7574","abstract":[{"text":"Which genetic alterations drive tumorigenesis and how they evolve over the course of disease and therapy are central questions in cancer biology. Here we identify 44 recurrently mutated genes and 11 recurrent somatic copy number variations through whole-exome sequencing of 538 chronic lymphocytic leukaemia (CLL) and matched germline DNA samples, 278 of which were collected in a prospective clinical trial. These include previously unrecognized putative cancer drivers (RPS15, IKZF3), and collectively identify RNA processing and export, MYC activity, and MAPK signalling as central pathways involved in CLL. Clonality analysis of this large data set further enabled reconstruction of temporal relationships between driver events. Direct comparison between matched pre-treatment and relapse samples from 59 patients demonstrated highly frequent clonal evolution. Thus, large sequencing data sets of clinically informative samples enable the discovery of novel genes associated with cancer, the network of relationships between the driver events, and their impact on disease relapse and clinical outcome.","lang":"eng"}],"date_updated":"2021-01-12T06:52:23Z","intvolume":"       526","citation":{"ama":"Landau D, Tausch E, Taylor Weiner A, et al. Mutations driving CLL and their evolution in progression and relapse. <i>Nature</i>. 2015;526(7574):525-530. doi:<a href=\"https://doi.org/10.1038/nature15395\">10.1038/nature15395</a>","ieee":"D. Landau <i>et al.</i>, “Mutations driving CLL and their evolution in progression and relapse,” <i>Nature</i>, vol. 526, no. 7574. Nature Publishing Group, pp. 525–530, 2015.","short":"D. Landau, E. Tausch, A. Taylor Weiner, C. Stewart, J. Reiter, J. Bahlo, S. Kluth, I. Božić, M. Lawrence, S. Böttcher, S. Carter, K. Cibulskis, D. Mertens, C. Sougnez, M. Rosenberg, J. Hess, J. Edelmann, S. Kless, M. Kneba, M. Ritgen, A. Fink, K. Fischer, S. Gabriel, E. Lander, M. Nowak, H. Döhner, M. Hallek, D. Neuberg, G. Getz, S. Stilgenbauer, C. Wu, Nature 526 (2015) 525–530.","chicago":"Landau, Dan, Eugen Tausch, Amaro Taylor Weiner, Chip Stewart, Johannes Reiter, Jasmin Bahlo, Sandra Kluth, et al. “Mutations Driving CLL and Their Evolution in Progression and Relapse.” <i>Nature</i>. Nature Publishing Group, 2015. <a href=\"https://doi.org/10.1038/nature15395\">https://doi.org/10.1038/nature15395</a>.","mla":"Landau, Dan, et al. “Mutations Driving CLL and Their Evolution in Progression and Relapse.” <i>Nature</i>, vol. 526, no. 7574, Nature Publishing Group, 2015, pp. 525–30, doi:<a href=\"https://doi.org/10.1038/nature15395\">10.1038/nature15395</a>.","apa":"Landau, D., Tausch, E., Taylor Weiner, A., Stewart, C., Reiter, J., Bahlo, J., … Wu, C. (2015). Mutations driving CLL and their evolution in progression and relapse. <i>Nature</i>. Nature Publishing Group. <a href=\"https://doi.org/10.1038/nature15395\">https://doi.org/10.1038/nature15395</a>","ista":"Landau D, Tausch E, Taylor Weiner A, Stewart C, Reiter J, Bahlo J, Kluth S, Božić I, Lawrence M, Böttcher S, Carter S, Cibulskis K, Mertens D, Sougnez C, Rosenberg M, Hess J, Edelmann J, Kless S, Kneba M, Ritgen M, Fink A, Fischer K, Gabriel S, Lander E, Nowak M, Döhner H, Hallek M, Neuberg D, Getz G, Stilgenbauer S, Wu C. 2015. Mutations driving CLL and their evolution in progression and relapse. Nature. 526(7574), 525–530."},"scopus_import":1,"main_file_link":[{"url":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4815041/","open_access":"1"}],"date_published":"2015-10-22T00:00:00Z","oa_version":"Submitted Version","doi":"10.1038/nature15395","publication_status":"published","title":"Mutations driving CLL and their evolution in progression and relapse","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Nature Publishing Group","author":[{"first_name":"Dan","last_name":"Landau","full_name":"Landau, Dan"},{"full_name":"Tausch, Eugen","last_name":"Tausch","first_name":"Eugen"},{"first_name":"Amaro","last_name":"Taylor Weiner","full_name":"Taylor Weiner, Amaro"},{"full_name":"Stewart, Chip","first_name":"Chip","last_name":"Stewart"},{"orcid":"0000-0002-0170-7353","first_name":"Johannes","id":"4A918E98-F248-11E8-B48F-1D18A9856A87","last_name":"Reiter","full_name":"Reiter, Johannes"},{"first_name":"Jasmin","last_name":"Bahlo","full_name":"Bahlo, Jasmin"},{"last_name":"Kluth","first_name":"Sandra","full_name":"Kluth, Sandra"},{"full_name":"Božić, Ivana","first_name":"Ivana","last_name":"Božić"},{"full_name":"Lawrence, Michael","last_name":"Lawrence","first_name":"Michael"},{"first_name":"Sebastian","last_name":"Böttcher","full_name":"Böttcher, Sebastian"},{"full_name":"Carter, Scott","first_name":"Scott","last_name":"Carter"},{"full_name":"Cibulskis, Kristian","first_name":"Kristian","last_name":"Cibulskis"},{"full_name":"Mertens, Daniel","first_name":"Daniel","last_name":"Mertens"},{"first_name":"Carrie","last_name":"Sougnez","full_name":"Sougnez, Carrie"},{"full_name":"Rosenberg, Mara","first_name":"Mara","last_name":"Rosenberg"},{"last_name":"Hess","first_name":"Julian","full_name":"Hess, Julian"},{"full_name":"Edelmann, Jennifer","first_name":"Jennifer","last_name":"Edelmann"},{"full_name":"Kless, Sabrina","first_name":"Sabrina","last_name":"Kless"},{"first_name":"Michael","last_name":"Kneba","full_name":"Kneba, Michael"},{"first_name":"Matthias","last_name":"Ritgen","full_name":"Ritgen, Matthias"},{"first_name":"Anna","last_name":"Fink","full_name":"Fink, Anna"},{"first_name":"Kirsten","last_name":"Fischer","full_name":"Fischer, Kirsten"},{"last_name":"Gabriel","first_name":"Stacey","full_name":"Gabriel, Stacey"},{"first_name":"Eric","last_name":"Lander","full_name":"Lander, Eric"},{"first_name":"Martin","last_name":"Nowak","full_name":"Nowak, Martin"},{"last_name":"Döhner","first_name":"Hartmut","full_name":"Döhner, Hartmut"},{"last_name":"Hallek","first_name":"Michael","full_name":"Hallek, Michael"},{"last_name":"Neuberg","first_name":"Donna","full_name":"Neuberg, Donna"},{"full_name":"Getz, Gad","first_name":"Gad","last_name":"Getz"},{"full_name":"Stilgenbauer, Stephan","first_name":"Stephan","last_name":"Stilgenbauer"},{"full_name":"Wu, Catherine","last_name":"Wu","first_name":"Catherine"}],"project":[{"name":"Quantitative Graph Games: Theory and Applications","call_identifier":"FP7","grant_number":"279307","_id":"2581B60A-B435-11E9-9278-68D0E5697425"},{"name":"Modern Graph Algorithmic Techniques in Formal Verification","call_identifier":"FWF","grant_number":"P 23499-N23","_id":"2584A770-B435-11E9-9278-68D0E5697425"},{"grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Rigorous Systems Engineering"}],"day":"22","pmid":1,"volume":526,"quality_controlled":"1","external_id":{"pmid":["26466571"]},"article_processing_charge":"No","article_type":"original","publist_id":"5484","department":[{"_id":"KrCh"}],"language":[{"iso":"eng"}],"type":"journal_article","publication":"Nature","date_created":"2018-12-11T11:53:21Z","page":"525 - 530"},{"intvolume":"        11","citation":{"short":"M. Tugrul, T. Paixao, N.H. Barton, G. Tkačik, PLoS Genetics 11 (2015).","ama":"Tugrul M, Paixao T, Barton NH, Tkačik G. Dynamics of transcription factor binding site evolution. <i>PLoS Genetics</i>. 2015;11(11). doi:<a href=\"https://doi.org/10.1371/journal.pgen.1005639\">10.1371/journal.pgen.1005639</a>","ieee":"M. Tugrul, T. Paixao, N. H. Barton, and G. Tkačik, “Dynamics of transcription factor binding site evolution,” <i>PLoS Genetics</i>, vol. 11, no. 11. Public Library of Science, 2015.","apa":"Tugrul, M., Paixao, T., Barton, N. H., &#38; Tkačik, G. (2015). Dynamics of transcription factor binding site evolution. <i>PLoS Genetics</i>. Public Library of Science. <a href=\"https://doi.org/10.1371/journal.pgen.1005639\">https://doi.org/10.1371/journal.pgen.1005639</a>","mla":"Tugrul, Murat, et al. “Dynamics of Transcription Factor Binding Site Evolution.” <i>PLoS Genetics</i>, vol. 11, no. 11, Public Library of Science, 2015, doi:<a href=\"https://doi.org/10.1371/journal.pgen.1005639\">10.1371/journal.pgen.1005639</a>.","ista":"Tugrul M, Paixao T, Barton NH, Tkačik G. 2015. Dynamics of transcription factor binding site evolution. PLoS Genetics. 11(11).","chicago":"Tugrul, Murat, Tiago Paixao, Nicholas H Barton, and Gašper Tkačik. “Dynamics of Transcription Factor Binding Site Evolution.” <i>PLoS Genetics</i>. Public Library of Science, 2015. <a href=\"https://doi.org/10.1371/journal.pgen.1005639\">https://doi.org/10.1371/journal.pgen.1005639</a>."},"scopus_import":1,"file_date_updated":"2020-07-14T12:45:10Z","ddc":["576"],"oa_version":"Published Version","date_published":"2015-11-06T00:00:00Z","doi":"10.1371/journal.pgen.1005639","publication_status":"published","month":"11","ec_funded":1,"status":"public","oa":1,"_id":"1666","issue":"11","abstract":[{"text":"Evolution of gene regulation is crucial for our understanding of the phenotypic differences between species, populations and individuals. Sequence-specific binding of transcription factors to the regulatory regions on the DNA is a key regulatory mechanism that determines gene expression and hence heritable phenotypic variation. We use a biophysical model for directional selection on gene expression to estimate the rates of gain and loss of transcription factor binding sites (TFBS) in finite populations under both point and insertion/deletion mutations. Our results show that these rates are typically slow for a single TFBS in an isolated DNA region, unless the selection is extremely strong. These rates decrease drastically with increasing TFBS length or increasingly specific protein-DNA interactions, making the evolution of sites longer than ∼ 10 bp unlikely on typical eukaryotic speciation timescales. Similarly, evolution converges to the stationary distribution of binding sequences very slowly, making the equilibrium assumption questionable. The availability of longer regulatory sequences in which multiple binding sites can evolve simultaneously, the presence of “pre-sites” or partially decayed old sites in the initial sequence, and biophysical cooperativity between transcription factors, can all facilitate gain of TFBS and reconcile theoretical calculations with timescales inferred from comparative genomics.","lang":"eng"}],"date_updated":"2023-09-07T11:53:49Z","year":"2015","quality_controlled":"1","volume":11,"related_material":{"record":[{"relation":"research_data","status":"public","id":"9712"},{"relation":"dissertation_contains","status":"public","id":"1131"}]},"pubrep_id":"463","publist_id":"5483","type":"journal_article","department":[{"_id":"NiBa"},{"_id":"CaGu"},{"_id":"GaTk"}],"language":[{"iso":"eng"}],"has_accepted_license":"1","publication":"PLoS Genetics","date_created":"2018-12-11T11:53:21Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Public Library of Science","title":"Dynamics of transcription factor binding site evolution","author":[{"full_name":"Tugrul, Murat","orcid":"0000-0002-8523-0758","first_name":"Murat","last_name":"Tugrul","id":"37C323C6-F248-11E8-B48F-1D18A9856A87"},{"orcid":"0000-0003-2361-3953","first_name":"Tiago","last_name":"Paixao","id":"2C5658E6-F248-11E8-B48F-1D18A9856A87","full_name":"Paixao, Tiago"},{"full_name":"Barton, Nicholas H","first_name":"Nicholas H","orcid":"0000-0002-8548-5240","id":"4880FE40-F248-11E8-B48F-1D18A9856A87","last_name":"Barton"},{"full_name":"Tkacik, Gasper","id":"3D494DCA-F248-11E8-B48F-1D18A9856A87","last_name":"Tkacik","first_name":"Gasper","orcid":"0000-0002-6699-1455"}],"project":[{"grant_number":"250152","_id":"25B07788-B435-11E9-9278-68D0E5697425","name":"Limits to selection in biology and in evolutionary computation","call_identifier":"FP7"}],"file":[{"file_size":2580778,"relation":"main_file","content_type":"application/pdf","date_created":"2018-12-12T10:07:58Z","date_updated":"2020-07-14T12:45:10Z","file_name":"IST-2016-463-v1+1_journal.pgen.1005639.pdf","access_level":"open_access","checksum":"a4e72fca5ccf40ddacf4d08c8e46b554","file_id":"4657","creator":"system"}],"day":"06","tmp":{"short":"CC BY (4.0)","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"}},{"title":"Optimizing performance of continuous-time stochastic systems using timeout synthesis","publisher":"Springer","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","series_title":"Lecture Notes in Computer Science","alternative_title":["LNCS"],"day":"22","acknowledgement":"The research leading to these results has received funding from the People Programme (Marie Curie Actions) of the European Union’s Seventh Framework Programme (FP7/2007-2013) under REA grant agreement n∘ [291734]. This work is partly supported by the German Research Council (DFG) as part of the Transregional Collaborative Research Center AVACS (SFB/TR 14), by the EU 7th Framework Programme under grant agreement no. 295261 (MEALS) and 318490 (SENSATION), by the Czech Science Foundation, grant No. 15-17564S, and by the CAS/SAFEA International Partnership Program for Creative Research Teams.","project":[{"_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734","name":"International IST Postdoc Fellowship Programme","call_identifier":"FP7"}],"author":[{"full_name":"Brázdil, Tomáš","last_name":"Brázdil","first_name":"Tomáš"},{"full_name":"Korenčiak, L'Uboš","first_name":"L'Uboš","last_name":"Korenčiak"},{"first_name":"Jan","last_name":"Krčál","full_name":"Krčál, Jan"},{"full_name":"Novotny, Petr","id":"3CC3B868-F248-11E8-B48F-1D18A9856A87","last_name":"Novotny","first_name":"Petr"},{"full_name":"Řehák, Vojtěch","last_name":"Řehák","first_name":"Vojtěch"}],"publist_id":"5482","quality_controlled":"1","volume":9259,"page":"141 - 159","date_created":"2018-12-11T11:53:22Z","language":[{"iso":"eng"}],"department":[{"_id":"KrCh"}],"type":"conference","oa":1,"status":"public","ec_funded":1,"month":"08","year":"2015","date_updated":"2021-01-12T06:52:24Z","abstract":[{"lang":"eng","text":"We consider parametric version of fixed-delay continuoustime Markov chains (or equivalently deterministic and stochastic Petri nets, DSPN) where fixed-delay transitions are specified by parameters, rather than concrete values. Our goal is to synthesize values of these parameters that, for a given cost function, minimise expected total cost incurred before reaching a given set of target states. We show that under mild assumptions, optimal values of parameters can be effectively approximated using translation to a Markov decision process (MDP) whose actions correspond to discretized values of these parameters. To this end we identify and overcome several interesting phenomena arising in systems with fixed delays."}],"_id":"1667","main_file_link":[{"url":"http://arxiv.org/abs/1407.4777","open_access":"1"}],"scopus_import":1,"intvolume":"      9259","citation":{"ieee":"T. Brázdil, L. Korenčiak, J. Krčál, P. Novotný, and V. Řehák, “Optimizing performance of continuous-time stochastic systems using timeout synthesis,” vol. 9259. Springer, pp. 141–159, 2015.","ama":"Brázdil T, Korenčiak L, Krčál J, Novotný P, Řehák V. Optimizing performance of continuous-time stochastic systems using timeout synthesis. 2015;9259:141-159. doi:<a href=\"https://doi.org/10.1007/978-3-319-22264-6_10\">10.1007/978-3-319-22264-6_10</a>","short":"T. Brázdil, L. Korenčiak, J. Krčál, P. Novotný, V. Řehák, 9259 (2015) 141–159.","mla":"Brázdil, Tomáš, et al. <i>Optimizing Performance of Continuous-Time Stochastic Systems Using Timeout Synthesis</i>. Vol. 9259, Springer, 2015, pp. 141–59, doi:<a href=\"https://doi.org/10.1007/978-3-319-22264-6_10\">10.1007/978-3-319-22264-6_10</a>.","ista":"Brázdil T, Korenčiak L, Krčál J, Novotný P, Řehák V. 2015. Optimizing performance of continuous-time stochastic systems using timeout synthesis. 9259, 141–159.","apa":"Brázdil, T., Korenčiak, L., Krčál, J., Novotný, P., &#38; Řehák, V. (2015). Optimizing performance of continuous-time stochastic systems using timeout synthesis. Presented at the QEST: Quantitative Evaluation of Systems, Madrid, Spain: Springer. <a href=\"https://doi.org/10.1007/978-3-319-22264-6_10\">https://doi.org/10.1007/978-3-319-22264-6_10</a>","chicago":"Brázdil, Tomáš, L’Uboš Korenčiak, Jan Krčál, Petr Novotný, and Vojtěch Řehák. “Optimizing Performance of Continuous-Time Stochastic Systems Using Timeout Synthesis.” Lecture Notes in Computer Science. Springer, 2015. <a href=\"https://doi.org/10.1007/978-3-319-22264-6_10\">https://doi.org/10.1007/978-3-319-22264-6_10</a>."},"conference":{"location":"Madrid, Spain","end_date":"2015-09-03","name":"QEST: Quantitative Evaluation of Systems","start_date":"2015-09-01"},"publication_status":"published","doi":"10.1007/978-3-319-22264-6_10","date_published":"2015-08-22T00:00:00Z","oa_version":"Preprint"},{"_id":"1668","abstract":[{"lang":"eng","text":"We revisit the security (as a pseudorandom permutation) of cascading-based constructions for block-cipher key-length extension. Previous works typically considered the extreme case where the adversary is given the entire codebook of the construction, the only complexity measure being the number qe of queries to the underlying ideal block cipher, representing adversary’s secret-key-independent computation. Here, we initiate a systematic study of the more natural case of an adversary restricted to adaptively learning a number qc of plaintext/ciphertext pairs that is less than the entire codebook. For any such qc, we aim to determine the highest number of block-cipher queries qe the adversary can issue without being able to successfully distinguish the construction (under a secret key) from a random permutation.\r\nMore concretely, we show the following results for key-length extension schemes using a block cipher with n-bit blocks and κ-bit keys:\r\nPlain cascades of length ℓ=2r+1 are secure whenever qcqre≪2r(κ+n), qc≪2κ and qe≪22κ. The bound for r=1 also applies to two-key triple encryption (as used within Triple DES).\r\nThe r-round XOR-cascade is secure as long as qcqre≪2r(κ+n), matching an attack by Gaži (CRYPTO 2013).\r\nWe fully characterize the security of Gaži and Tessaro’s two-call "}],"date_updated":"2020-08-11T10:09:26Z","year":"2015","month":"08","ec_funded":1,"status":"public","oa":1,"oa_version":"Submitted Version","date_published":"2015-08-12T00:00:00Z","doi":"10.1007/978-3-662-48116-5_16","publication_status":"published","conference":{"location":"Istanbul, Turkey","end_date":"2015-03-11","name":"FSE: Fast Software Encryption","start_date":"2015-03-08"},"intvolume":"      9054","citation":{"chicago":"Gazi, Peter, Jooyoung Lee, Yannick Seurin, John Steinberger, and Stefano Tessaro. “Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes.” Lecture Notes in Computer Science. Springer, 2015. <a href=\"https://doi.org/10.1007/978-3-662-48116-5_16\">https://doi.org/10.1007/978-3-662-48116-5_16</a>.","ista":"Gazi P, Lee J, Seurin Y, Steinberger J, Tessaro S. 2015. Relaxing full-codebook security: A refined analysis of key-length extension schemes. 9054, 319–341.","apa":"Gazi, P., Lee, J., Seurin, Y., Steinberger, J., &#38; Tessaro, S. (2015). Relaxing full-codebook security: A refined analysis of key-length extension schemes. Presented at the FSE: Fast Software Encryption, Istanbul, Turkey: Springer. <a href=\"https://doi.org/10.1007/978-3-662-48116-5_16\">https://doi.org/10.1007/978-3-662-48116-5_16</a>","mla":"Gazi, Peter, et al. <i>Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes</i>. Vol. 9054, Springer, 2015, pp. 319–41, doi:<a href=\"https://doi.org/10.1007/978-3-662-48116-5_16\">10.1007/978-3-662-48116-5_16</a>.","short":"P. Gazi, J. Lee, Y. Seurin, J. Steinberger, S. Tessaro, 9054 (2015) 319–341.","ama":"Gazi P, Lee J, Seurin Y, Steinberger J, Tessaro S. Relaxing full-codebook security: A refined analysis of key-length extension schemes. 2015;9054:319-341. doi:<a href=\"https://doi.org/10.1007/978-3-662-48116-5_16\">10.1007/978-3-662-48116-5_16</a>","ieee":"P. Gazi, J. Lee, Y. Seurin, J. Steinberger, and S. Tessaro, “Relaxing full-codebook security: A refined analysis of key-length extension schemes,” vol. 9054. Springer, pp. 319–341, 2015."},"scopus_import":1,"main_file_link":[{"url":"http://eprint.iacr.org/2015/397","open_access":"1"}],"author":[{"full_name":"Gazi, Peter","first_name":"Peter","id":"3E0BFE38-F248-11E8-B48F-1D18A9856A87","last_name":"Gazi"},{"last_name":"Lee","first_name":"Jooyoung","full_name":"Lee, Jooyoung"},{"full_name":"Seurin, Yannick","first_name":"Yannick","last_name":"Seurin"},{"last_name":"Steinberger","first_name":"John","full_name":"Steinberger, John"},{"first_name":"Stefano","last_name":"Tessaro","full_name":"Tessaro, Stefano"}],"project":[{"_id":"258C570E-B435-11E9-9278-68D0E5697425","grant_number":"259668","call_identifier":"FP7","name":"Provable Security for Physical Cryptography"}],"day":"12","alternative_title":["LNCS"],"series_title":"Lecture Notes in Computer Science","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","title":"Relaxing full-codebook security: A refined analysis of key-length extension schemes","type":"conference","department":[{"_id":"KrPi"}],"language":[{"iso":"eng"}],"page":"319 - 341","date_created":"2018-12-11T11:53:22Z","quality_controlled":"1","volume":9054,"publist_id":"5481"},{"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","publisher":"Springer","title":"The chain rule for HILL pseudoentropy, revisited","alternative_title":["LNCS"],"series_title":"Lecture Notes in Computer Science","day":"15","author":[{"last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","first_name":"Krzysztof Z","orcid":"0000-0002-9139-1654","full_name":"Pietrzak, Krzysztof Z"},{"last_name":"Skórski","first_name":"Maciej","full_name":"Skórski, Maciej"}],"project":[{"call_identifier":"FP7","name":"Provable Security for Physical Cryptography","_id":"258C570E-B435-11E9-9278-68D0E5697425","grant_number":"259668"}],"file":[{"content_type":"application/pdf","relation":"main_file","file_size":443340,"checksum":"8cd4215b83efba720e8cf27c23ff4781","creator":"system","file_id":"5351","access_level":"open_access","file_name":"IST-2016-669-v1+1_599.pdf","date_updated":"2020-07-14T12:45:11Z","date_created":"2018-12-12T10:18:29Z"}],"pubrep_id":"669","publist_id":"5480","quality_controlled":"1","volume":9230,"has_accepted_license":"1","page":"81 - 98","date_created":"2018-12-11T11:53:22Z","type":"conference","department":[{"_id":"KrPi"}],"language":[{"iso":"eng"}],"status":"public","oa":1,"month":"08","ec_funded":1,"abstract":[{"lang":"eng","text":"Computational notions of entropy (a.k.a. pseudoentropy) have found many applications, including leakage-resilient cryptography, deterministic encryption or memory delegation. The most important tools to argue about pseudoentropy are chain rules, which quantify by how much (in terms of quantity and quality) the pseudoentropy of a given random variable X decreases when conditioned on some other variable Z (think for example of X as a secret key and Z as information leaked by a side-channel). In this paper we give a very simple and modular proof of the chain rule for HILL pseudoentropy, improving best known parameters. Our version allows for increasing the acceptable length of leakage in applications up to a constant factor compared to the best previous bounds. As a contribution of independent interest, we provide a comprehensive study of all known versions of the chain rule, comparing their worst-case strength and limitations."}],"date_updated":"2021-01-12T06:52:24Z","year":"2015","_id":"1669","file_date_updated":"2020-07-14T12:45:11Z","scopus_import":1,"ddc":["005"],"citation":{"mla":"Pietrzak, Krzysztof Z., and Maciej Skórski. <i>The Chain Rule for HILL Pseudoentropy, Revisited</i>. Vol. 9230, Springer, 2015, pp. 81–98, doi:<a href=\"https://doi.org/10.1007/978-3-319-22174-8_5\">10.1007/978-3-319-22174-8_5</a>.","apa":"Pietrzak, K. Z., &#38; Skórski, M. (2015). The chain rule for HILL pseudoentropy, revisited. Presented at the LATINCRYPT: Cryptology and Information Security in Latin America, Guadalajara, Mexico: Springer. <a href=\"https://doi.org/10.1007/978-3-319-22174-8_5\">https://doi.org/10.1007/978-3-319-22174-8_5</a>","ista":"Pietrzak KZ, Skórski M. 2015. The chain rule for HILL pseudoentropy, revisited. 9230, 81–98.","chicago":"Pietrzak, Krzysztof Z, and Maciej Skórski. “The Chain Rule for HILL Pseudoentropy, Revisited.” Lecture Notes in Computer Science. Springer, 2015. <a href=\"https://doi.org/10.1007/978-3-319-22174-8_5\">https://doi.org/10.1007/978-3-319-22174-8_5</a>.","ama":"Pietrzak KZ, Skórski M. The chain rule for HILL pseudoentropy, revisited. 2015;9230:81-98. doi:<a href=\"https://doi.org/10.1007/978-3-319-22174-8_5\">10.1007/978-3-319-22174-8_5</a>","ieee":"K. Z. Pietrzak and M. Skórski, “The chain rule for HILL pseudoentropy, revisited,” vol. 9230. Springer, pp. 81–98, 2015.","short":"K.Z. Pietrzak, M. Skórski, 9230 (2015) 81–98."},"intvolume":"      9230","doi":"10.1007/978-3-319-22174-8_5","publication_status":"published","conference":{"start_date":"2015-08-23","name":"LATINCRYPT: Cryptology and Information Security in Latin America","end_date":"2015-08-26","location":"Guadalajara, Mexico"},"oa_version":"Submitted Version","date_published":"2015-08-15T00:00:00Z"}]
