[{"department":[{"_id":"KrPi"}],"date_created":"2020-09-06T22:01:13Z","external_id":{"isi":["001299210200021"]},"date_updated":"2026-04-16T09:32:27Z","publication_identifier":{"eissn":["1611-3349"],"isbn":["9783030453732"],"issn":["0302-9743"]},"intvolume":"     12110","quality_controlled":"1","language":[{"iso":"eng"}],"main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2020/337"}],"publication":"23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography","ec_funded":1,"type":"conference","page":"623-651","day":"15","doi":"10.1007/978-3-030-45374-9_21","publisher":"Springer Nature","volume":12110,"citation":{"short":"N. Genise, D. Micciancio, C. Peikert, M. Walter, in:, 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, Springer Nature, 2020, pp. 623–651.","ieee":"N. Genise, D. Micciancio, C. Peikert, and M. Walter, “Improved discrete Gaussian and subgaussian analysis for lattice cryptography,” in <i>23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography</i>, Edinburgh, United Kingdom, 2020, vol. 12110, pp. 623–651.","mla":"Genise, Nicholas, et al. “Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography.” <i>23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography</i>, vol. 12110, Springer Nature, 2020, pp. 623–51, doi:<a href=\"https://doi.org/10.1007/978-3-030-45374-9_21\">10.1007/978-3-030-45374-9_21</a>.","ista":"Genise N, Micciancio D, Peikert C, Walter M. 2020. Improved discrete Gaussian and subgaussian analysis for lattice cryptography. 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography. PKC: Public-Key Cryptography, LNCS, vol. 12110, 623–651.","apa":"Genise, N., Micciancio, D., Peikert, C., &#38; Walter, M. (2020). Improved discrete Gaussian and subgaussian analysis for lattice cryptography. In <i>23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography</i> (Vol. 12110, pp. 623–651). Edinburgh, United Kingdom: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-45374-9_21\">https://doi.org/10.1007/978-3-030-45374-9_21</a>","ama":"Genise N, Micciancio D, Peikert C, Walter M. Improved discrete Gaussian and subgaussian analysis for lattice cryptography. In: <i>23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography</i>. Vol 12110. Springer Nature; 2020:623-651. doi:<a href=\"https://doi.org/10.1007/978-3-030-45374-9_21\">10.1007/978-3-030-45374-9_21</a>","chicago":"Genise, Nicholas, Daniele Micciancio, Chris Peikert, and Michael Walter. “Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography.” In <i>23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography</i>, 12110:623–51. Springer Nature, 2020. <a href=\"https://doi.org/10.1007/978-3-030-45374-9_21\">https://doi.org/10.1007/978-3-030-45374-9_21</a>."},"oa":1,"isi":1,"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","author":[{"first_name":"Nicholas","full_name":"Genise, Nicholas","last_name":"Genise"},{"last_name":"Micciancio","first_name":"Daniele","full_name":"Micciancio, Daniele"},{"last_name":"Peikert","full_name":"Peikert, Chris","first_name":"Chris"},{"orcid":"0000-0003-3186-2482","last_name":"Walter","first_name":"Michael","full_name":"Walter, Michael","id":"488F98B0-F248-11E8-B48F-1D18A9856A87"}],"project":[{"grant_number":"682815","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","call_identifier":"H2020","name":"Teaching Old Crypto New Tricks"}],"publication_status":"published","conference":{"end_date":"2020-05-07","name":"PKC: Public-Key Cryptography","start_date":"2020-05-04","location":"Edinburgh, United Kingdom"},"status":"public","abstract":[{"lang":"eng","text":"Discrete Gaussian distributions over lattices are central to lattice-based cryptography, and to the computational and mathematical aspects of lattices more broadly. The literature contains a wealth of useful theorems about the behavior of discrete Gaussians under convolutions and related operations. Yet despite their structural similarities, most of these theorems are formally incomparable, and their proofs tend to be monolithic and written nearly “from scratch,” making them unnecessarily hard to verify, understand, and extend.\r\nIn this work we present a modular framework for analyzing linear operations on discrete Gaussian distributions. The framework abstracts away the particulars of Gaussians, and usually reduces proofs to the choice of appropriate linear transformations and elementary linear algebra. To showcase the approach, we establish several general properties of discrete Gaussians, and show how to obtain all prior convolution theorems (along with some new ones) as straightforward corollaries. As another application, we describe a self-reduction for Learning With Errors (LWE) that uses a fixed number of samples to generate an unlimited number of additional ones (having somewhat larger error). The distinguishing features of our reduction are its simple analysis in our framework, and its exclusive use of discrete Gaussians without any loss in parameters relative to a prior mixed discrete-and-continuous approach.\r\nAs a contribution of independent interest, for subgaussian random matrices we prove a singular value concentration bound with explicitly stated constants, and we give tighter heuristics for specific distributions that are commonly used for generating lattice trapdoors. These bounds yield improvements in the concrete bit-security estimates for trapdoor lattice cryptosystems."}],"scopus_import":"1","date_published":"2020-05-15T00:00:00Z","month":"05","alternative_title":["LNCS"],"article_processing_charge":"No","title":"Improved discrete Gaussian and subgaussian analysis for lattice cryptography","oa_version":"Preprint","year":"2020","_id":"8339"},{"title":"Delayed authentication: Preventing replay and relay attacks in private contact tracing","year":"2020","_id":"8987","oa_version":"Preprint","month":"12","article_processing_charge":"No","conference":{"start_date":"2020-12-13","end_date":"2020-12-16","name":"INDOCRYPT: International Conference on Cryptology in India","location":"Bangalore, India"},"date_published":"2020-12-08T00:00:00Z","abstract":[{"text":"Currently several projects aim at designing and implementing protocols for privacy preserving automated contact tracing to help fight the current pandemic. Those proposal are quite similar, and in their most basic form basically propose an app for mobile phones which broadcasts frequently changing pseudorandom identifiers via (low energy) Bluetooth, and at the same time, the app stores IDs broadcast by phones in its proximity. Only if a user is tested positive, they upload either the beacons they did broadcast (which is the case in decentralized proposals as DP-3T, east and west coast PACT or Covid watch) or received (as in Popp-PT or ROBERT) during the last two weeks or so.\r\n\r\nVaudenay [eprint 2020/399] observes that this basic scheme (he considers the DP-3T proposal) succumbs to relay and even replay attacks, and proposes more complex interactive schemes which prevent those attacks without giving up too many privacy aspects. Unfortunately interaction is problematic for this application for efficiency and security reasons. The countermeasures that have been suggested so far are either not practical or give up on key privacy aspects. We propose a simple non-interactive variant of the basic protocol that\r\n(security) Provably prevents replay and (if location data is available) relay attacks.\r\n(privacy) The data of all parties (even jointly) reveals no information on the location or time where encounters happened.\r\n(efficiency) The broadcasted message can fit into 128 bits and uses only basic crypto (commitments and secret key authentication).\r\n\r\nTowards this end we introduce the concept of “delayed authentication”, which basically is a message authentication code where verification can be done in two steps, where the first doesn’t require the key, and the second doesn’t require the message.","lang":"eng"}],"scopus_import":"1","status":"public","isi":1,"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","oa":1,"project":[{"_id":"258AA5B2-B435-11E9-9278-68D0E5697425","grant_number":"682815","call_identifier":"H2020","name":"Teaching Old Crypto New Tricks"}],"publication_status":"published","author":[{"orcid":"0000-0002-9139-1654","last_name":"Pietrzak","first_name":"Krzysztof Z","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","full_name":"Pietrzak, Krzysztof Z"}],"page":"3-15","day":"08","publisher":"Springer Nature","doi":"10.1007/978-3-030-65277-7_1","ec_funded":1,"type":"conference","citation":{"mla":"Pietrzak, Krzysztof Z. “Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing.” <i>Progress in Cryptology</i>, vol. 12578, Springer Nature, 2020, pp. 3–15, doi:<a href=\"https://doi.org/10.1007/978-3-030-65277-7_1\">10.1007/978-3-030-65277-7_1</a>.","apa":"Pietrzak, K. Z. (2020). Delayed authentication: Preventing replay and relay attacks in private contact tracing. In <i>Progress in Cryptology</i> (Vol. 12578, pp. 3–15). Bangalore, India: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-65277-7_1\">https://doi.org/10.1007/978-3-030-65277-7_1</a>","ista":"Pietrzak KZ. 2020. Delayed authentication: Preventing replay and relay attacks in private contact tracing. Progress in Cryptology. INDOCRYPT: International Conference on Cryptology in IndiaLNCS vol. 12578, 3–15.","ieee":"K. Z. Pietrzak, “Delayed authentication: Preventing replay and relay attacks in private contact tracing,” in <i>Progress in Cryptology</i>, Bangalore, India, 2020, vol. 12578, pp. 3–15.","short":"K.Z. Pietrzak, in:, Progress in Cryptology, Springer Nature, 2020, pp. 3–15.","chicago":"Pietrzak, Krzysztof Z. “Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing.” In <i>Progress in Cryptology</i>, 12578:3–15. LNCS. Springer Nature, 2020. <a href=\"https://doi.org/10.1007/978-3-030-65277-7_1\">https://doi.org/10.1007/978-3-030-65277-7_1</a>.","ama":"Pietrzak KZ. Delayed authentication: Preventing replay and relay attacks in private contact tracing. In: <i>Progress in Cryptology</i>. Vol 12578. LNCS. Springer Nature; 2020:3-15. doi:<a href=\"https://doi.org/10.1007/978-3-030-65277-7_1\">10.1007/978-3-030-65277-7_1</a>"},"volume":12578,"main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2020/418"}],"publication":"Progress in Cryptology","date_updated":"2026-04-16T09:33:26Z","external_id":{"isi":["000927592800001"]},"intvolume":"     12578","language":[{"iso":"eng"}],"quality_controlled":"1","publication_identifier":{"isbn":["9783030652760"],"issn":["0302-9743"],"eissn":["1611-3349"]},"date_created":"2021-01-03T23:01:23Z","series_title":"LNCS","department":[{"_id":"KrPi"}]},{"title":"Reverse firewalls for actively secure MPCs","oa_version":"Preprint","_id":"8322","year":"2020","month":"08","article_processing_charge":"No","alternative_title":["LNCS"],"acknowledgement":"We would like to thank the anonymous reviewers for their helpful comments and suggestions. The work was initiated while the first author was in IIT Madras, India. Part of this work was done while the author was visiting the University of Warsaw. This project has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (682815 - TOCNeT) and from the Foundation for Polish Science under grant TEAM/2016-1/4 founded within the UE 2014–2020 Smart Growth Operational Program. The last author was supported by the Independent Research Fund Denmark project BETHE and the Concordium Blockchain Research Center, Aarhus University, Denmark.","conference":{"location":"Santa Barbara, CA, United States","start_date":"2020-08-17","end_date":"2020-08-21","name":"CRYPTO: Annual International Cryptology Conference"},"status":"public","scopus_import":"1","date_published":"2020-08-10T00:00:00Z","abstract":[{"lang":"eng","text":"Reverse firewalls were introduced at Eurocrypt 2015 by Miro-nov and Stephens-Davidowitz, as a method for protecting cryptographic protocols against attacks on the devices of the honest parties. In a nutshell: a reverse firewall is placed outside of a device and its goal is to “sanitize” the messages sent by it, in such a way that a malicious device cannot leak its secrets to the outside world. It is typically assumed that the cryptographic devices are attacked in a “functionality-preserving way” (i.e. informally speaking, the functionality of the protocol remains unchanged under this attacks). In their paper, Mironov and Stephens-Davidowitz construct a protocol for passively-secure two-party computations with firewalls, leaving extension of this result to stronger models as an open question.\r\nIn this paper, we address this problem by constructing a protocol for secure computation with firewalls that has two main advantages over the original protocol from Eurocrypt 2015. Firstly, it is a multiparty computation protocol (i.e. it works for an arbitrary number n of the parties, and not just for 2). Secondly, it is secure in much stronger corruption settings, namely in the active corruption model. More precisely: we consider an adversary that can fully corrupt up to 𝑛−1 parties, while the remaining parties are corrupt in a functionality-preserving way.\r\nOur core techniques are: malleable commitments and malleable non-interactive zero-knowledge, which in particular allow us to create a novel protocol for multiparty augmented coin-tossing into the well with reverse firewalls (that is based on a protocol of Lindell from Crypto 2001)."}],"oa":1,"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","isi":1,"author":[{"last_name":"Chakraborty","first_name":"Suvradip","full_name":"Chakraborty, Suvradip","id":"B9CD0494-D033-11E9-B219-A439E6697425"},{"first_name":"Stefan","full_name":"Dziembowski, Stefan","last_name":"Dziembowski"},{"first_name":"Jesper Buus","full_name":"Nielsen, Jesper Buus","last_name":"Nielsen"}],"publication_status":"published","project":[{"_id":"258AA5B2-B435-11E9-9278-68D0E5697425","grant_number":"682815","name":"Teaching Old Crypto New Tricks","call_identifier":"H2020"}],"type":"conference","ec_funded":1,"day":"10","publisher":"Springer Nature","doi":"10.1007/978-3-030-56880-1_26","page":"732-762","volume":12171,"citation":{"ama":"Chakraborty S, Dziembowski S, Nielsen JB. Reverse firewalls for actively secure MPCs. In: <i>Advances in Cryptology – CRYPTO 2020</i>. Vol 12171. Springer Nature; 2020:732-762. doi:<a href=\"https://doi.org/10.1007/978-3-030-56880-1_26\">10.1007/978-3-030-56880-1_26</a>","chicago":"Chakraborty, Suvradip, Stefan Dziembowski, and Jesper Buus Nielsen. “Reverse Firewalls for Actively Secure MPCs.” In <i>Advances in Cryptology – CRYPTO 2020</i>, 12171:732–62. Springer Nature, 2020. <a href=\"https://doi.org/10.1007/978-3-030-56880-1_26\">https://doi.org/10.1007/978-3-030-56880-1_26</a>.","short":"S. Chakraborty, S. Dziembowski, J.B. Nielsen, in:, Advances in Cryptology – CRYPTO 2020, Springer Nature, 2020, pp. 732–762.","mla":"Chakraborty, Suvradip, et al. “Reverse Firewalls for Actively Secure MPCs.” <i>Advances in Cryptology – CRYPTO 2020</i>, vol. 12171, Springer Nature, 2020, pp. 732–62, doi:<a href=\"https://doi.org/10.1007/978-3-030-56880-1_26\">10.1007/978-3-030-56880-1_26</a>.","ista":"Chakraborty S, Dziembowski S, Nielsen JB. 2020. Reverse firewalls for actively secure MPCs. Advances in Cryptology – CRYPTO 2020. CRYPTO: Annual International Cryptology Conference, LNCS, vol. 12171, 732–762.","apa":"Chakraborty, S., Dziembowski, S., &#38; Nielsen, J. B. (2020). Reverse firewalls for actively secure MPCs. In <i>Advances in Cryptology – CRYPTO 2020</i> (Vol. 12171, pp. 732–762). Santa Barbara, CA, United States: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-56880-1_26\">https://doi.org/10.1007/978-3-030-56880-1_26</a>","ieee":"S. Chakraborty, S. Dziembowski, and J. B. Nielsen, “Reverse firewalls for actively secure MPCs,” in <i>Advances in Cryptology – CRYPTO 2020</i>, Santa Barbara, CA, United States, 2020, vol. 12171, pp. 732–762."},"main_file_link":[{"url":"https://eprint.iacr.org/2019/1317","open_access":"1"}],"publication":"Advances in Cryptology – CRYPTO 2020","external_id":{"isi":["001415325700026"]},"date_updated":"2026-04-16T09:31:34Z","publication_identifier":{"isbn":["9783030568795"],"issn":["0302-9743"],"eissn":["1611-3349"]},"language":[{"iso":"eng"}],"quality_controlled":"1","intvolume":"     12171","department":[{"_id":"KrPi"}],"date_created":"2020-08-30T22:01:12Z"},{"date_created":"2020-08-02T22:00:59Z","department":[{"_id":"ToHe"}],"date_updated":"2026-04-16T09:29:42Z","external_id":{"isi":["000884318000002"]},"intvolume":"     12166","quality_controlled":"1","language":[{"iso":"eng"}],"publication_identifier":{"eissn":["1611-3349"],"isbn":["9783030510732"],"issn":["0302-9743"]},"main_file_link":[{"open_access":"1","url":"https://doi.org/10.1007/978-3-030-51074-9_2"}],"publication":"Automated Reasoning","page":"13-31","day":"24","publisher":"Springer Nature","doi":"10.1007/978-3-030-51074-9_2","type":"conference","citation":{"ama":"Baranowski M, He S, Lechner M, Nguyen TS, Rakamarić Z. An SMT theory of fixed-point arithmetic. In: <i>Automated Reasoning</i>. Vol 12166. Springer Nature; 2020:13-31. doi:<a href=\"https://doi.org/10.1007/978-3-030-51074-9_2\">10.1007/978-3-030-51074-9_2</a>","chicago":"Baranowski, Marek, Shaobo He, Mathias Lechner, Thanh Son Nguyen, and Zvonimir Rakamarić. “An SMT Theory of Fixed-Point Arithmetic.” In <i>Automated Reasoning</i>, 12166:13–31. Springer Nature, 2020. <a href=\"https://doi.org/10.1007/978-3-030-51074-9_2\">https://doi.org/10.1007/978-3-030-51074-9_2</a>.","short":"M. Baranowski, S. He, M. Lechner, T.S. Nguyen, Z. Rakamarić, in:, Automated Reasoning, Springer Nature, 2020, pp. 13–31.","ieee":"M. Baranowski, S. He, M. Lechner, T. S. Nguyen, and Z. Rakamarić, “An SMT theory of fixed-point arithmetic,” in <i>Automated Reasoning</i>, Paris, France, 2020, vol. 12166, pp. 13–31.","ista":"Baranowski M, He S, Lechner M, Nguyen TS, Rakamarić Z. 2020. An SMT theory of fixed-point arithmetic. Automated Reasoning. IJCAR: International Joint Conference on Automated Reasoning, LNCS, vol. 12166, 13–31.","apa":"Baranowski, M., He, S., Lechner, M., Nguyen, T. S., &#38; Rakamarić, Z. (2020). An SMT theory of fixed-point arithmetic. In <i>Automated Reasoning</i> (Vol. 12166, pp. 13–31). Paris, France: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-51074-9_2\">https://doi.org/10.1007/978-3-030-51074-9_2</a>","mla":"Baranowski, Marek, et al. “An SMT Theory of Fixed-Point Arithmetic.” <i>Automated Reasoning</i>, vol. 12166, Springer Nature, 2020, pp. 13–31, doi:<a href=\"https://doi.org/10.1007/978-3-030-51074-9_2\">10.1007/978-3-030-51074-9_2</a>."},"volume":12166,"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","isi":1,"oa":1,"project":[{"grant_number":"Z211","_id":"25F42A32-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Formal methods for the design and analysis of complex systems"}],"publication_status":"published","author":[{"first_name":"Marek","full_name":"Baranowski, Marek","last_name":"Baranowski"},{"full_name":"He, Shaobo","first_name":"Shaobo","last_name":"He"},{"last_name":"Lechner","full_name":"Lechner, Mathias","id":"3DC22916-F248-11E8-B48F-1D18A9856A87","first_name":"Mathias"},{"first_name":"Thanh Son","full_name":"Nguyen, Thanh Son","last_name":"Nguyen"},{"last_name":"Rakamarić","first_name":"Zvonimir","full_name":"Rakamarić, Zvonimir"}],"conference":{"location":"Paris, France","start_date":"2020-07-01","name":"IJCAR: International Joint Conference on Automated Reasoning","end_date":"2020-07-04"},"abstract":[{"lang":"eng","text":"Fixed-point arithmetic is a popular alternative to floating-point arithmetic on embedded systems. Existing work on the verification of fixed-point programs relies on custom formalizations of fixed-point arithmetic, which makes it hard to compare the described techniques or reuse the implementations. In this paper, we address this issue by proposing and formalizing an SMT theory of fixed-point arithmetic. We present an intuitive yet comprehensive syntax of the fixed-point theory, and provide formal semantics for it based on rational arithmetic. We also describe two decision procedures for this theory: one based on the theory of bit-vectors and the other on the theory of reals. We implement the two decision procedures, and evaluate our implementations using existing mature SMT solvers on a benchmark suite we created. Finally, we perform a case study of using the theory we propose to verify properties of quantized neural networks."}],"scopus_import":"1","date_published":"2020-06-24T00:00:00Z","status":"public","month":"06","alternative_title":["LNCS"],"article_processing_charge":"No","title":"An SMT theory of fixed-point arithmetic","year":"2020","_id":"8194","oa_version":"Published Version"},{"article_processing_charge":"No","alternative_title":["LNCS"],"month":"04","oa_version":"Published Version","_id":"7808","year":"2020","title":"How many bits does it take to quantize your neural network?","license":"https://creativecommons.org/licenses/by/4.0/","author":[{"orcid":"0000-0001-8180-0904","last_name":"Giacobbe","first_name":"Mirco","full_name":"Giacobbe, Mirco","id":"3444EA5E-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Henzinger","orcid":"0000-0002-2985-7724","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","full_name":"Henzinger, Thomas A","first_name":"Thomas A"},{"last_name":"Lechner","id":"3DC22916-F248-11E8-B48F-1D18A9856A87","full_name":"Lechner, Mathias","first_name":"Mathias"}],"publication_status":"published","project":[{"grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","name":"Rigorous Systems Engineering","call_identifier":"FWF"},{"call_identifier":"FWF","name":"Formal methods for the design and analysis of complex systems","_id":"25F42A32-B435-11E9-9278-68D0E5697425","grant_number":"Z211"}],"oa":1,"isi":1,"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","file":[{"checksum":"f19905a42891fe5ce93d69143fa3f6fb","file_name":"2020_TACAS_Giacobbe.pdf","date_updated":"2020-07-14T12:48:03Z","content_type":"application/pdf","date_created":"2020-05-26T12:48:15Z","creator":"dernst","access_level":"open_access","file_id":"7893","relation":"main_file","file_size":2744030}],"status":"public","abstract":[{"text":"Quantization converts neural networks into low-bit fixed-point computations which can be carried out by efficient integer-only hardware, and is standard practice for the deployment of neural networks on real-time embedded devices. However, like their real-numbered counterpart, quantized networks are not immune to malicious misclassification caused by adversarial attacks. We investigate how quantization affects a network’s robustness to adversarial attacks, which is a formal verification question. We show that neither robustness nor non-robustness are monotonic with changing the number of bits for the representation and, also, neither are preserved by quantization from a real-numbered network. For this reason, we introduce a verification method for quantized neural networks which, using SMT solving over bit-vectors, accounts for their exact, bit-precise semantics. We built a tool and analyzed the effect of quantization on a classifier for the MNIST dataset. We demonstrate that, compared to our method, existing methods for the analysis of real-numbered networks often derive false conclusions about their quantizations, both when determining robustness and when detecting attacks, and that existing methods for quantized networks often miss attacks. Furthermore, we applied our method beyond robustness, showing how the number of bits in quantization enlarges the gender bias of a predictor for students’ grades.","lang":"eng"}],"scopus_import":"1","date_published":"2020-04-17T00:00:00Z","ddc":["000"],"conference":{"location":"Dublin, Ireland","start_date":"2020-04-25","end_date":"2020-04-30","name":"TACAS: Tools and Algorithms for the Construction and Analysis of Systems"},"publication":"International Conference on Tools and Algorithms for the Construction and Analysis of Systems","volume":12079,"citation":{"short":"M. Giacobbe, T.A. Henzinger, M. Lechner, in:, International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Springer Nature, 2020, pp. 79–97.","ieee":"M. Giacobbe, T. A. Henzinger, and M. Lechner, “How many bits does it take to quantize your neural network?,” in <i>International Conference on Tools and Algorithms for the Construction and Analysis of Systems</i>, Dublin, Ireland, 2020, vol. 12079, pp. 79–97.","mla":"Giacobbe, Mirco, et al. “How Many Bits Does It Take to Quantize Your Neural Network?” <i>International Conference on Tools and Algorithms for the Construction and Analysis of Systems</i>, vol. 12079, Springer Nature, 2020, pp. 79–97, doi:<a href=\"https://doi.org/10.1007/978-3-030-45237-7_5\">10.1007/978-3-030-45237-7_5</a>.","apa":"Giacobbe, M., Henzinger, T. A., &#38; Lechner, M. (2020). How many bits does it take to quantize your neural network? In <i>International Conference on Tools and Algorithms for the Construction and Analysis of Systems</i> (Vol. 12079, pp. 79–97). Dublin, Ireland: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-45237-7_5\">https://doi.org/10.1007/978-3-030-45237-7_5</a>","ista":"Giacobbe M, Henzinger TA, Lechner M. 2020. How many bits does it take to quantize your neural network? International Conference on Tools and Algorithms for the Construction and Analysis of Systems. TACAS: Tools and Algorithms for the Construction and Analysis of Systems, LNCS, vol. 12079, 79–97.","ama":"Giacobbe M, Henzinger TA, Lechner M. How many bits does it take to quantize your neural network? In: <i>International Conference on Tools and Algorithms for the Construction and Analysis of Systems</i>. Vol 12079. Springer Nature; 2020:79-97. doi:<a href=\"https://doi.org/10.1007/978-3-030-45237-7_5\">10.1007/978-3-030-45237-7_5</a>","chicago":"Giacobbe, Mirco, Thomas A Henzinger, and Mathias Lechner. “How Many Bits Does It Take to Quantize Your Neural Network?” In <i>International Conference on Tools and Algorithms for the Construction and Analysis of Systems</i>, 12079:79–97. Springer Nature, 2020. <a href=\"https://doi.org/10.1007/978-3-030-45237-7_5\">https://doi.org/10.1007/978-3-030-45237-7_5</a>."},"type":"conference","related_material":{"record":[{"status":"public","relation":"dissertation_contains","id":"11362"}]},"day":"17","publisher":"Springer Nature","doi":"10.1007/978-3-030-45237-7_5","page":"79-97","department":[{"_id":"ToHe"}],"file_date_updated":"2020-07-14T12:48:03Z","date_created":"2020-05-10T22:00:49Z","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"publication_identifier":{"eissn":["1611-3349"],"issn":["0302-9743"],"isbn":["9783030452360"]},"language":[{"iso":"eng"}],"quality_controlled":"1","intvolume":"     12079","corr_author":"1","external_id":{"isi":["001288734300005"]},"has_accepted_license":"1","date_updated":"2026-04-16T09:46:07Z"},{"article_number":"e103358","department":[{"_id":"GaNo"}],"date_created":"2020-03-15T23:00:55Z","file_date_updated":"2020-07-14T12:48:00Z","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","image":"/images/cc_by_nc_nd.png","name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)","short":"CC BY-NC-ND (4.0)"},"publication_identifier":{"issn":["0261-4189"],"eissn":["1460-2075"]},"intvolume":"        39","quality_controlled":"1","language":[{"iso":"eng"}],"external_id":{"pmid":["32118314"],"isi":["000517335000001"]},"date_updated":"2026-04-16T09:35:48Z","has_accepted_license":"1","publication":"EMBO Journal","volume":39,"citation":{"ama":"Weinert S, Gimber N, Deuschel D, et al. Uncoupling endosomal CLC chloride/proton exchange causes severe neurodegeneration. <i>EMBO Journal</i>. 2020;39. doi:<a href=\"https://doi.org/10.15252/embj.2019103358\">10.15252/embj.2019103358</a>","chicago":"Weinert, Stefanie, Niclas Gimber, Dorothea Deuschel, Till Stuhlmann, Dmytro Puchkov, Zohreh Farsi, Carmen F. Ludwig, et al. “Uncoupling Endosomal CLC Chloride/Proton Exchange Causes Severe Neurodegeneration.” <i>EMBO Journal</i>. EMBO Press, 2020. <a href=\"https://doi.org/10.15252/embj.2019103358\">https://doi.org/10.15252/embj.2019103358</a>.","short":"S. Weinert, N. Gimber, D. Deuschel, T. Stuhlmann, D. Puchkov, Z. Farsi, C.F. Ludwig, G. Novarino, K.I. López-Cayuqueo, R. Planells-Cases, T.J. Jentsch, EMBO Journal 39 (2020).","ieee":"S. Weinert <i>et al.</i>, “Uncoupling endosomal CLC chloride/proton exchange causes severe neurodegeneration,” <i>EMBO Journal</i>, vol. 39. EMBO Press, 2020.","ista":"Weinert S, Gimber N, Deuschel D, Stuhlmann T, Puchkov D, Farsi Z, Ludwig CF, Novarino G, López-Cayuqueo KI, Planells-Cases R, Jentsch TJ. 2020. Uncoupling endosomal CLC chloride/proton exchange causes severe neurodegeneration. EMBO Journal. 39, e103358.","apa":"Weinert, S., Gimber, N., Deuschel, D., Stuhlmann, T., Puchkov, D., Farsi, Z., … Jentsch, T. J. (2020). Uncoupling endosomal CLC chloride/proton exchange causes severe neurodegeneration. <i>EMBO Journal</i>. EMBO Press. <a href=\"https://doi.org/10.15252/embj.2019103358\">https://doi.org/10.15252/embj.2019103358</a>","mla":"Weinert, Stefanie, et al. “Uncoupling Endosomal CLC Chloride/Proton Exchange Causes Severe Neurodegeneration.” <i>EMBO Journal</i>, vol. 39, e103358, EMBO Press, 2020, doi:<a href=\"https://doi.org/10.15252/embj.2019103358\">10.15252/embj.2019103358</a>."},"type":"journal_article","doi":"10.15252/embj.2019103358","day":"02","publisher":"EMBO Press","author":[{"last_name":"Weinert","first_name":"Stefanie","full_name":"Weinert, Stefanie"},{"last_name":"Gimber","first_name":"Niclas","full_name":"Gimber, Niclas"},{"first_name":"Dorothea","full_name":"Deuschel, Dorothea","last_name":"Deuschel"},{"full_name":"Stuhlmann, Till","first_name":"Till","last_name":"Stuhlmann"},{"last_name":"Puchkov","first_name":"Dmytro","full_name":"Puchkov, Dmytro"},{"last_name":"Farsi","first_name":"Zohreh","full_name":"Farsi, Zohreh"},{"last_name":"Ludwig","first_name":"Carmen F.","full_name":"Ludwig, Carmen F."},{"full_name":"Novarino, Gaia","id":"3E57A680-F248-11E8-B48F-1D18A9856A87","first_name":"Gaia","orcid":"0000-0002-7673-7178","last_name":"Novarino"},{"full_name":"López-Cayuqueo, Karen I.","first_name":"Karen I.","last_name":"López-Cayuqueo"},{"last_name":"Planells-Cases","first_name":"Rosa","full_name":"Planells-Cases, Rosa"},{"full_name":"Jentsch, Thomas J.","first_name":"Thomas J.","last_name":"Jentsch"}],"license":"https://creativecommons.org/licenses/by-nc-nd/4.0/","publication_status":"published","article_type":"original","oa":1,"file":[{"checksum":"82750a7a93e3740decbce8474004111a","file_name":"2020_EMBO_Weinert.pdf","date_updated":"2020-07-14T12:48:00Z","content_type":"application/pdf","creator":"dernst","date_created":"2020-03-23T13:51:11Z","access_level":"open_access","file_id":"7615","relation":"main_file","file_size":12243278}],"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","isi":1,"status":"public","date_published":"2020-03-02T00:00:00Z","scopus_import":"1","abstract":[{"lang":"eng","text":"CLC chloride/proton exchangers may support acidification of endolysosomes and raise their luminal Cl− concentration. Disruption of endosomal ClC‐3 causes severe neurodegeneration. To assess the importance of ClC‐3 Cl−/H+ exchange, we now generate Clcn3unc/unc mice in which ClC‐3 is converted into a Cl− channel. Unlike Clcn3−/− mice, Clcn3unc/unc mice appear normal owing to compensation by ClC‐4 with which ClC‐3 forms heteromers. ClC‐4 protein levels are strongly reduced in Clcn3−/−, but not in Clcn3unc/unc mice because ClC‐3unc binds and stabilizes ClC‐4 like wild‐type ClC‐3. Although mice lacking ClC‐4 appear healthy, its absence in Clcn3unc/unc/Clcn4−/− mice entails even stronger neurodegeneration than observed in Clcn3−/− mice. A fraction of ClC‐3 is found on synaptic vesicles, but miniature postsynaptic currents and synaptic vesicle acidification are not affected in Clcn3unc/unc or Clcn3−/− mice before neurodegeneration sets in. Both, Cl−/H+‐exchange activity and the stabilizing effect on ClC‐4, are central to the biological function of ClC‐3."}],"acknowledgement":"We thank T. Stauber and T. Breiderhoff for cloning expression constructs; K. Räbel, S. Hohensee, and C. Backhaus for technical assistance; R. Jahn (MPIbpc, Göttingen) for providing the equipment required for SV purification; and A\r\nWoehler (MDC, Berlin) for assistance with SV imaging. Supported, in part, by grants from the Deutsche Forschungsgemeinschaft (JE164/9-2, SFB740 TP C5, FOR 2625 (JE164/14-1), NeuroCure Cluster of Excellence), the European Research Council Advanced Grant CYTOVOLION (ERC 294435) and the Prix Louis-Jeantet de Médecine to TJJ, and Peter and Traudl Engelhorn fellowship to ZF.","ddc":["570"],"article_processing_charge":"No","month":"03","pmid":1,"oa_version":"Published Version","year":"2020","_id":"7586","title":"Uncoupling endosomal CLC chloride/proton exchange causes severe neurodegeneration"},{"main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2019/364"}],"publication":"Advances in Cryptology – EUROCRYPT 2020","page":"475-506","doi":"10.1007/978-3-030-45727-3_16","day":"01","publisher":"Springer Nature","type":"conference","ec_funded":1,"citation":{"ieee":"B. Auerbach, F. Giacon, and E. Kiltz, “Everybody’s a target: Scalability in public-key encryption,” in <i>Advances in Cryptology – EUROCRYPT 2020</i>, 2020, vol. 12107, pp. 475–506.","ista":"Auerbach B, Giacon F, Kiltz E. 2020. Everybody’s a target: Scalability in public-key encryption. Advances in Cryptology – EUROCRYPT 2020. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 12107, 475–506.","mla":"Auerbach, Benedikt, et al. “Everybody’s a Target: Scalability in Public-Key Encryption.” <i>Advances in Cryptology – EUROCRYPT 2020</i>, vol. 12107, Springer Nature, 2020, pp. 475–506, doi:<a href=\"https://doi.org/10.1007/978-3-030-45727-3_16\">10.1007/978-3-030-45727-3_16</a>.","apa":"Auerbach, B., Giacon, F., &#38; Kiltz, E. (2020). Everybody’s a target: Scalability in public-key encryption. In <i>Advances in Cryptology – EUROCRYPT 2020</i> (Vol. 12107, pp. 475–506). Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-45727-3_16\">https://doi.org/10.1007/978-3-030-45727-3_16</a>","short":"B. Auerbach, F. Giacon, E. Kiltz, in:, Advances in Cryptology – EUROCRYPT 2020, Springer Nature, 2020, pp. 475–506.","chicago":"Auerbach, Benedikt, Federico Giacon, and Eike Kiltz. “Everybody’s a Target: Scalability in Public-Key Encryption.” In <i>Advances in Cryptology – EUROCRYPT 2020</i>, 12107:475–506. Springer Nature, 2020. <a href=\"https://doi.org/10.1007/978-3-030-45727-3_16\">https://doi.org/10.1007/978-3-030-45727-3_16</a>.","ama":"Auerbach B, Giacon F, Kiltz E. Everybody’s a target: Scalability in public-key encryption. In: <i>Advances in Cryptology – EUROCRYPT 2020</i>. Vol 12107. Springer Nature; 2020:475-506. doi:<a href=\"https://doi.org/10.1007/978-3-030-45727-3_16\">10.1007/978-3-030-45727-3_16</a>"},"volume":12107,"date_created":"2020-06-15T07:13:37Z","department":[{"_id":"KrPi"}],"date_updated":"2026-04-16T10:21:02Z","external_id":{"isi":["000828688000016"]},"intvolume":"     12107","quality_controlled":"1","language":[{"iso":"eng"}],"publication_identifier":{"eissn":["1611-3349"],"issn":["0302-9743"],"eisbn":["9783030457273"],"isbn":["9783030457266"]},"month":"05","article_processing_charge":"No","alternative_title":["LNCS"],"title":"Everybody’s a target: Scalability in public-key encryption","year":"2020","_id":"7966","oa_version":"Submitted Version","user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","isi":1,"oa":1,"project":[{"name":"Teaching Old Crypto New Tricks","call_identifier":"H2020","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","grant_number":"682815"}],"publication_status":"published","author":[{"first_name":"Benedikt","id":"D33D2B18-E445-11E9-ABB7-15F4E5697425","full_name":"Auerbach, Benedikt","last_name":"Auerbach","orcid":"0000-0002-7553-6606"},{"last_name":"Giacon","full_name":"Giacon, Federico","first_name":"Federico"},{"last_name":"Kiltz","first_name":"Eike","full_name":"Kiltz, Eike"}],"conference":{"end_date":"2020-05-15","name":"EUROCRYPT: Theory and Applications of Cryptographic Techniques","start_date":"2020-05-11"},"scopus_import":"1","date_published":"2020-05-01T00:00:00Z","abstract":[{"lang":"eng","text":"For 1≤m≤n, we consider a natural m-out-of-n multi-instance scenario for a public-key encryption (PKE) scheme. An adversary, given n independent instances of PKE, wins if he breaks at least m out of the n instances. In this work, we are interested in the scaling factor of PKE schemes, SF, which measures how well the difficulty of breaking m out of the n instances scales in m. That is, a scaling factor SF=ℓ indicates that breaking m out of n instances is at least ℓ times more difficult than breaking one single instance. A PKE scheme with small scaling factor hence provides an ideal target for mass surveillance. In fact, the Logjam attack (CCS 2015) implicitly exploited, among other things, an almost constant scaling factor of ElGamal over finite fields (with shared group parameters).\r\n\r\nFor Hashed ElGamal over elliptic curves, we use the generic group model to argue that the scaling factor depends on the scheme's granularity. In low granularity, meaning each public key contains its independent group parameter, the scheme has optimal scaling factor SF=m; In medium and high granularity, meaning all public keys share the same group parameter, the scheme still has a reasonable scaling factor SF=√m. Our findings underline that instantiating ElGamal over elliptic curves should be preferred to finite fields in a multi-instance scenario.\r\n\r\nAs our main technical contribution, we derive new generic-group lower bounds of Ω(√(mp)) on the difficulty of solving both the m-out-of-n Gap Discrete Logarithm and the m-out-of-n Gap Computational Diffie-Hellman problem over groups of prime order p, extending a recent result by Yun (EUROCRYPT 2015). We establish the lower bound by studying the hardness of a related computational problem which we call the search-by-hypersurface problem."}],"status":"public"},{"file_date_updated":"2020-10-15T14:28:06Z","date_created":"2020-10-07T15:05:37Z","department":[{"_id":"ToHe"}],"intvolume":"     12399","language":[{"iso":"eng"}],"quality_controlled":"1","publication_identifier":{"isbn":["9783030605070"],"eisbn":["9783030605087"],"issn":["0302-9743"],"eissn":["1611-3349"]},"date_updated":"2026-04-16T10:22:01Z","has_accepted_license":"1","external_id":{"isi":["000728160600001"]},"publication":"Runtime Verification","citation":{"ista":"Henzinger TA, Sarac NE. 2020. Monitorability under assumptions. Runtime Verification. RV: Runtime Verification, LNCS, vol. 12399, 3–18.","mla":"Henzinger, Thomas A., and Naci E. Sarac. “Monitorability under Assumptions.” <i>Runtime Verification</i>, vol. 12399, Springer Nature, 2020, pp. 3–18, doi:<a href=\"https://doi.org/10.1007/978-3-030-60508-7_1\">10.1007/978-3-030-60508-7_1</a>.","apa":"Henzinger, T. A., &#38; Sarac, N. E. (2020). Monitorability under assumptions. In <i>Runtime Verification</i> (Vol. 12399, pp. 3–18). Los Angeles, CA, United States: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-60508-7_1\">https://doi.org/10.1007/978-3-030-60508-7_1</a>","ieee":"T. A. Henzinger and N. E. Sarac, “Monitorability under assumptions,” in <i>Runtime Verification</i>, Los Angeles, CA, United States, 2020, vol. 12399, pp. 3–18.","short":"T.A. Henzinger, N.E. Sarac, in:, Runtime Verification, Springer Nature, 2020, pp. 3–18.","chicago":"Henzinger, Thomas A, and Naci E Sarac. “Monitorability under Assumptions.” In <i>Runtime Verification</i>, 12399:3–18. Springer Nature, 2020. <a href=\"https://doi.org/10.1007/978-3-030-60508-7_1\">https://doi.org/10.1007/978-3-030-60508-7_1</a>.","ama":"Henzinger TA, Sarac NE. Monitorability under assumptions. In: <i>Runtime Verification</i>. Vol 12399. Springer Nature; 2020:3-18. doi:<a href=\"https://doi.org/10.1007/978-3-030-60508-7_1\">10.1007/978-3-030-60508-7_1</a>"},"volume":12399,"page":"3-18","day":"02","doi":"10.1007/978-3-030-60508-7_1","publisher":"Springer Nature","type":"conference","project":[{"name":"Formal methods for the design and analysis of complex systems","call_identifier":"FWF","_id":"25F42A32-B435-11E9-9278-68D0E5697425","grant_number":"Z211"}],"publication_status":"published","author":[{"first_name":"Thomas A","full_name":"Henzinger, Thomas A","id":"40876CD8-F248-11E8-B48F-1D18A9856A87","last_name":"Henzinger","orcid":"0000-0002-2985-7724"},{"first_name":"Naci E","full_name":"Sarac, Naci E","id":"8C6B42F8-C8E6-11E9-A03A-F2DCE5697425","last_name":"Sarac"}],"file":[{"date_updated":"2020-10-15T14:28:06Z","file_name":"monitorability.pdf","checksum":"00661f9b7034f52e18bf24fa552b8194","success":1,"relation":"main_file","file_size":478148,"file_id":"8665","access_level":"open_access","creator":"esarac","date_created":"2020-10-15T14:28:06Z","content_type":"application/pdf"}],"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","isi":1,"oa":1,"abstract":[{"lang":"eng","text":"We introduce the monitoring of trace properties under assumptions. An assumption limits the space of possible traces that the monitor may encounter. An assumption may result from knowledge about the system that is being monitored, about the environment, or about another, connected monitor. We define monitorability under assumptions and study its theoretical properties. In particular, we show that for every assumption A, the boolean combinations of properties that are safe or co-safe relative to A are monitorable under A. We give several examples and constructions on how an assumption can make a non-monitorable property monitorable, and how an assumption can make a monitorable property monitorable with fewer resources, such as integer registers."}],"scopus_import":"1","date_published":"2020-10-02T00:00:00Z","status":"public","conference":{"end_date":"2020-10-09","name":"RV: Runtime Verification","start_date":"2020-10-06","location":"Los Angeles, CA, United States"},"acknowledgement":"This research was supported in part by the Austrian Science Fund (FWF) under grant Z211-N23 (Wittgenstein Award).","ddc":["000"],"alternative_title":["LNCS"],"article_processing_charge":"No","month":"10","year":"2020","_id":"8623","oa_version":"Submitted Version","title":"Monitorability under assumptions"},{"department":[{"_id":"UlWa"}],"date_created":"2020-11-06T08:45:03Z","publication_identifier":{"issn":["0302-9743"],"isbn":["9783030604394"],"eisbn":["9783030604400"],"eissn":["1611-3349"]},"intvolume":"     12301","quality_controlled":"1","language":[{"iso":"eng"}],"external_id":{"isi":["001299688100026"]},"date_updated":"2026-04-16T10:22:35Z","publication":"Graph-Theoretic Concepts in Computer Science","volume":12301,"citation":{"mla":"Arroyo Guevara, Alan M., et al. “Inserting One Edge into a Simple Drawing Is Hard.” <i>Graph-Theoretic Concepts in Computer Science</i>, vol. 12301, Springer Nature, 2020, pp. 325–38, doi:<a href=\"https://doi.org/10.1007/978-3-030-60440-0_26\">10.1007/978-3-030-60440-0_26</a>.","ista":"Arroyo Guevara AM, Klute F, Parada I, Seidel R, Vogtenhuber B, Wiedera T. 2020. Inserting one edge into a simple drawing is hard. Graph-Theoretic Concepts in Computer Science. WG: Workshop on Graph-Theoretic Concepts in Computer Science, LNCS, vol. 12301, 325–338.","apa":"Arroyo Guevara, A. M., Klute, F., Parada, I., Seidel, R., Vogtenhuber, B., &#38; Wiedera, T. (2020). Inserting one edge into a simple drawing is hard. In <i>Graph-Theoretic Concepts in Computer Science</i> (Vol. 12301, pp. 325–338). Leeds, United Kingdom: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-60440-0_26\">https://doi.org/10.1007/978-3-030-60440-0_26</a>","ieee":"A. M. Arroyo Guevara, F. Klute, I. Parada, R. Seidel, B. Vogtenhuber, and T. Wiedera, “Inserting one edge into a simple drawing is hard,” in <i>Graph-Theoretic Concepts in Computer Science</i>, Leeds, United Kingdom, 2020, vol. 12301, pp. 325–338.","short":"A.M. Arroyo Guevara, F. Klute, I. Parada, R. Seidel, B. Vogtenhuber, T. Wiedera, in:, Graph-Theoretic Concepts in Computer Science, Springer Nature, 2020, pp. 325–338.","chicago":"Arroyo Guevara, Alan M, Fabian Klute, Irene Parada, Raimund Seidel, Birgit Vogtenhuber, and Tilo Wiedera. “Inserting One Edge into a Simple Drawing Is Hard.” In <i>Graph-Theoretic Concepts in Computer Science</i>, 12301:325–38. Springer Nature, 2020. <a href=\"https://doi.org/10.1007/978-3-030-60440-0_26\">https://doi.org/10.1007/978-3-030-60440-0_26</a>.","ama":"Arroyo Guevara AM, Klute F, Parada I, Seidel R, Vogtenhuber B, Wiedera T. Inserting one edge into a simple drawing is hard. In: <i>Graph-Theoretic Concepts in Computer Science</i>. Vol 12301. Springer Nature; 2020:325-338. doi:<a href=\"https://doi.org/10.1007/978-3-030-60440-0_26\">10.1007/978-3-030-60440-0_26</a>"},"type":"conference","ec_funded":1,"page":"325-338","day":"09","doi":"10.1007/978-3-030-60440-0_26","publisher":"Springer Nature","author":[{"orcid":"0000-0003-2401-8670","last_name":"Arroyo Guevara","full_name":"Arroyo Guevara, Alan M","id":"3207FDC6-F248-11E8-B48F-1D18A9856A87","first_name":"Alan M"},{"last_name":"Klute","first_name":"Fabian","full_name":"Klute, Fabian"},{"last_name":"Parada","full_name":"Parada, Irene","first_name":"Irene"},{"last_name":"Seidel","full_name":"Seidel, Raimund","first_name":"Raimund"},{"last_name":"Vogtenhuber","full_name":"Vogtenhuber, Birgit","first_name":"Birgit"},{"last_name":"Wiedera","first_name":"Tilo","full_name":"Wiedera, Tilo"}],"project":[{"call_identifier":"H2020","name":"ISTplus - Postdoctoral Fellowships","grant_number":"754411","_id":"260C2330-B435-11E9-9278-68D0E5697425"}],"publication_status":"published","user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","isi":1,"status":"public","scopus_import":"1","abstract":[{"lang":"eng","text":"A simple drawing D(G) of a graph G is one where each pair of edges share at most one point: either a common endpoint or a proper crossing. An edge e in the complement of G can be inserted into D(G) if there exists a simple drawing of   G+e  extending D(G). As a result of Levi’s Enlargement Lemma, if a drawing is rectilinear (pseudolinear), that is, the edges can be extended into an arrangement of lines (pseudolines), then any edge in the complement of G can be inserted. In contrast, we show that it is   NP -complete to decide whether one edge can be inserted into a simple drawing. This remains true even if we assume that the drawing is pseudocircular, that is, the edges can be extended to an arrangement of pseudocircles. On the positive side, we show that, given an arrangement of pseudocircles   A  and a pseudosegment   σ , it can be decided in polynomial time whether there exists a pseudocircle   Φσ  extending   σ  for which   A∪{Φσ}  is again an arrangement of pseudocircles."}],"date_published":"2020-10-09T00:00:00Z","conference":{"name":"WG: Workshop on Graph-Theoretic Concepts in Computer Science","end_date":"2020-06-26","start_date":"2020-06-24","location":"Leeds, United Kingdom"},"article_processing_charge":"No","alternative_title":["LNCS"],"month":"10","oa_version":"None","year":"2020","_id":"8732","title":"Inserting one edge into a simple drawing is hard"},{"title":"Witness maps and applications","_id":"10865","year":"2020","oa_version":"Preprint","month":"04","article_processing_charge":"No","acknowledgement":"We would like to thank the anonymous reviewers of PKC 2019 for their useful comments and suggestions. We thank Omer Paneth for pointing out to us the connection between Unique Witness Maps (UWM) and Witness encryption (WE). The first author would like to acknowledge Pandu Rangan for his involvement during the initial discussion phase of the project.","scopus_import":"1","abstract":[{"lang":"eng","text":"We introduce the notion of Witness Maps as a cryptographic notion of a proof system. A Unique Witness Map (UWM) deterministically maps all witnesses for an   NP  statement to a single representative witness, resulting in a computationally sound, deterministic-prover, non-interactive witness independent proof system. A relaxation of UWM, called Compact Witness Map (CWM), maps all the witnesses to a small number of witnesses, resulting in a “lossy” deterministic-prover, non-interactive proof-system. We also define a Dual Mode Witness Map (DMWM) which adds an “extractable” mode to a CWM.\r\nOur main construction is a DMWM for all   NP  relations, assuming sub-exponentially secure indistinguishability obfuscation (  iO ), along with standard cryptographic assumptions. The DMWM construction relies on a CWM and a new primitive called Cumulative All-Lossy-But-One Trapdoor Functions (C-ALBO-TDF), both of which are in turn instantiated based on   iO  and other primitives. Our instantiation of a CWM is in fact a UWM; in turn, we show that a UWM implies Witness Encryption. Along the way to constructing UWM and C-ALBO-TDF, we also construct, from standard assumptions, Puncturable Digital Signatures and a new primitive called Cumulative Lossy Trapdoor Functions (C-LTDF). The former improves up on a construction of Bellare et al. (Eurocrypt 2016), who relied on sub-exponentially secure   iO  and sub-exponentially secure OWF.\r\nAs an application of our constructions, we show how to use a DMWM to construct the first leakage and tamper-resilient signatures with a deterministic signer, thereby solving a decade old open problem posed by Katz and Vaikunthanathan (Asiacrypt 2009), by Boyle, Segev and Wichs (Eurocrypt 2011), as well as by Faonio and Venturi (Asiacrypt 2016). Our construction achieves the optimal leakage rate of   1−o(1) ."}],"date_published":"2020-04-29T00:00:00Z","status":"public","isi":1,"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","oa":1,"publication_status":"published","author":[{"first_name":"Suvradip","id":"B9CD0494-D033-11E9-B219-A439E6697425","full_name":"Chakraborty, Suvradip","last_name":"Chakraborty"},{"last_name":"Prabhakaran","full_name":"Prabhakaran, Manoj","first_name":"Manoj"},{"full_name":"Wichs, Daniel","first_name":"Daniel","last_name":"Wichs"}],"doi":"10.1007/978-3-030-45374-9_8","day":"29","publisher":"Springer Nature","page":"220-246","type":"book_chapter","citation":{"chicago":"Chakraborty, Suvradip, Manoj Prabhakaran, and Daniel Wichs. “Witness Maps and Applications.” In <i>Public-Key Cryptography</i>, edited by A Kiayias, 12110:220–46. LNCS. Cham: Springer Nature, 2020. <a href=\"https://doi.org/10.1007/978-3-030-45374-9_8\">https://doi.org/10.1007/978-3-030-45374-9_8</a>.","ama":"Chakraborty S, Prabhakaran M, Wichs D. Witness maps and applications. In: Kiayias A, ed. <i>Public-Key Cryptography</i>. Vol 12110. LNCS. Cham: Springer Nature; 2020:220-246. doi:<a href=\"https://doi.org/10.1007/978-3-030-45374-9_8\">10.1007/978-3-030-45374-9_8</a>","ieee":"S. Chakraborty, M. Prabhakaran, and D. Wichs, “Witness maps and applications,” in <i>Public-Key Cryptography</i>, vol. 12110, A. Kiayias, Ed. Cham: Springer Nature, 2020, pp. 220–246.","ista":"Chakraborty S, Prabhakaran M, Wichs D. 2020.Witness maps and applications. In: Public-Key Cryptography. vol. 12110, 220–246.","mla":"Chakraborty, Suvradip, et al. “Witness Maps and Applications.” <i>Public-Key Cryptography</i>, edited by A Kiayias, vol. 12110, Springer Nature, 2020, pp. 220–46, doi:<a href=\"https://doi.org/10.1007/978-3-030-45374-9_8\">10.1007/978-3-030-45374-9_8</a>.","apa":"Chakraborty, S., Prabhakaran, M., &#38; Wichs, D. (2020). Witness maps and applications. In A. Kiayias (Ed.), <i>Public-Key Cryptography</i> (Vol. 12110, pp. 220–246). Cham: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-45374-9_8\">https://doi.org/10.1007/978-3-030-45374-9_8</a>","short":"S. Chakraborty, M. Prabhakaran, D. Wichs, in:, A. Kiayias (Ed.), Public-Key Cryptography, Springer Nature, Cham, 2020, pp. 220–246."},"volume":12110,"main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2020/090"}],"place":"Cham","publication":"Public-Key Cryptography","editor":[{"last_name":"Kiayias","full_name":"Kiayias, A","first_name":"A"}],"date_updated":"2026-04-16T10:21:31Z","corr_author":"1","external_id":{"isi":["001299210200008"]},"quality_controlled":"1","language":[{"iso":"eng"}],"intvolume":"     12110","publication_identifier":{"eissn":["1611-3349"],"isbn":["9783030453732"],"eisbn":["9783030453749"],"issn":["0302-9743"]},"date_created":"2022-03-18T11:35:51Z","series_title":"LNCS"},{"month":"04","pmid":1,"article_processing_charge":"No","keyword":["Cell Biology"],"title":"Lamellipodin tunes cell migration by stabilizing protrusions and promoting adhesion formation","oa_version":"Published Version","_id":"8434","issue":"7","year":"2020","oa":1,"isi":1,"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","file":[{"content_type":"application/pdf","date_created":"2020-09-17T14:07:51Z","creator":"dernst","access_level":"open_access","file_id":"8435","relation":"main_file","file_size":13493302,"checksum":"ba917e551acc4ece2884b751434df9ae","embargo":"2020-10-10","file_name":"2020_JournalCellScience_Dimchev.pdf","date_updated":"2020-10-11T22:30:02Z"}],"author":[{"full_name":"Dimchev, Georgi A","id":"38C393BE-F248-11E8-B48F-1D18A9856A87","first_name":"Georgi A","last_name":"Dimchev","orcid":"0000-0001-8370-6161"},{"full_name":"Amiri, Behnam","first_name":"Behnam","last_name":"Amiri"},{"last_name":"Humphries","first_name":"Ashley C.","full_name":"Humphries, Ashley C."},{"last_name":"Schaks","first_name":"Matthias","full_name":"Schaks, Matthias"},{"last_name":"Dimchev","full_name":"Dimchev, Vanessa","first_name":"Vanessa"},{"first_name":"Theresia E. B.","full_name":"Stradal, Theresia E. B.","last_name":"Stradal"},{"first_name":"Jan","full_name":"Faix, Jan","last_name":"Faix"},{"full_name":"Krause, Matthias","first_name":"Matthias","last_name":"Krause"},{"first_name":"Michael","full_name":"Way, Michael","last_name":"Way"},{"full_name":"Falcke, Martin","first_name":"Martin","last_name":"Falcke"},{"last_name":"Rottner","full_name":"Rottner, Klemens","first_name":"Klemens"}],"publication_status":"published","article_type":"original","project":[{"grant_number":"M02495","_id":"2674F658-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Protein structure and function in filopodia across scales"}],"ddc":["570"],"acknowledgement":"This work was supported in part by Deutsche Forschungsgemeinschaft (DFG)[GRK2223/1, RO2414/5-1 (to K.R.), FA350/11-1 (to M.F.) and FA330/11-1 (to J.F.)],as well as by intramural funding from the Helmholtz Association (to T.E.B.S. andK.R.). G.D. was additionally funded by the Austrian Science Fund (FWF) LiseMeitner Program [M-2495]. A.C.H. and M.W. are supported by the Francis CrickInstitute, which receives its core funding from Cancer Research UK [FC001209], theMedical Research Council [FC001209] and the Wellcome Trust [FC001209]. M.K. issupported by the Biotechnology and Biological Sciences Research Council [BB/F011431/1, BB/J000590/1, BB/N000226/1]. Deposited in PMC for release after 6months.","status":"public","scopus_import":"1","date_published":"2020-04-09T00:00:00Z","abstract":[{"text":"Efficient migration on adhesive surfaces involves the protrusion of lamellipodial actin networks and their subsequent stabilization by nascent adhesions. The actin-binding protein lamellipodin (Lpd) is thought to play a critical role in lamellipodium protrusion, by delivering Ena/VASP proteins onto the growing plus ends of actin filaments and by interacting with the WAVE regulatory complex, an activator of the Arp2/3 complex, at the leading edge. Using B16-F1 melanoma cell lines, we demonstrate that genetic ablation of Lpd compromises protrusion efficiency and coincident cell migration without altering essential parameters of lamellipodia, including their maximal rate of forward advancement and actin polymerization. We also confirmed lamellipodia and migration phenotypes with CRISPR/Cas9-mediated Lpd knockout Rat2 fibroblasts, excluding cell type-specific effects. Moreover, computer-aided analysis of cell-edge morphodynamics on B16-F1 cell lamellipodia revealed that loss of Lpd correlates with reduced temporal protrusion maintenance as a prerequisite of nascent adhesion formation. We conclude that Lpd optimizes protrusion and nascent adhesion formation by counteracting frequent, chaotic retraction and membrane ruffling.This article has an associated First Person interview with the first author of the paper. ","lang":"eng"}],"publication":"Journal of Cell Science","type":"journal_article","doi":"10.1242/jcs.239020","publisher":"The Company of Biologists","day":"09","volume":133,"citation":{"chicago":"Dimchev, Georgi A, Behnam Amiri, Ashley C. Humphries, Matthias Schaks, Vanessa Dimchev, Theresia E. B. Stradal, Jan Faix, et al. “Lamellipodin Tunes Cell Migration by Stabilizing Protrusions and Promoting Adhesion Formation.” <i>Journal of Cell Science</i>. The Company of Biologists, 2020. <a href=\"https://doi.org/10.1242/jcs.239020\">https://doi.org/10.1242/jcs.239020</a>.","ama":"Dimchev GA, Amiri B, Humphries AC, et al. Lamellipodin tunes cell migration by stabilizing protrusions and promoting adhesion formation. <i>Journal of Cell Science</i>. 2020;133(7). doi:<a href=\"https://doi.org/10.1242/jcs.239020\">10.1242/jcs.239020</a>","apa":"Dimchev, G. A., Amiri, B., Humphries, A. C., Schaks, M., Dimchev, V., Stradal, T. E. B., … Rottner, K. (2020). Lamellipodin tunes cell migration by stabilizing protrusions and promoting adhesion formation. <i>Journal of Cell Science</i>. The Company of Biologists. <a href=\"https://doi.org/10.1242/jcs.239020\">https://doi.org/10.1242/jcs.239020</a>","mla":"Dimchev, Georgi A., et al. “Lamellipodin Tunes Cell Migration by Stabilizing Protrusions and Promoting Adhesion Formation.” <i>Journal of Cell Science</i>, vol. 133, no. 7, jcs239020, The Company of Biologists, 2020, doi:<a href=\"https://doi.org/10.1242/jcs.239020\">10.1242/jcs.239020</a>.","ista":"Dimchev GA, Amiri B, Humphries AC, Schaks M, Dimchev V, Stradal TEB, Faix J, Krause M, Way M, Falcke M, Rottner K. 2020. Lamellipodin tunes cell migration by stabilizing protrusions and promoting adhesion formation. Journal of Cell Science. 133(7), jcs239020.","ieee":"G. A. Dimchev <i>et al.</i>, “Lamellipodin tunes cell migration by stabilizing protrusions and promoting adhesion formation,” <i>Journal of Cell Science</i>, vol. 133, no. 7. The Company of Biologists, 2020.","short":"G.A. Dimchev, B. Amiri, A.C. Humphries, M. Schaks, V. Dimchev, T.E.B. Stradal, J. Faix, M. Krause, M. Way, M. Falcke, K. Rottner, Journal of Cell Science 133 (2020)."},"department":[{"_id":"FlSc"}],"article_number":"jcs239020","file_date_updated":"2020-10-11T22:30:02Z","date_created":"2020-09-17T14:00:33Z","external_id":{"isi":["000534387800005"],"pmid":[" 32094266"]},"has_accepted_license":"1","date_updated":"2025-04-15T07:52:13Z","publication_identifier":{"eissn":["1477-9137"],"issn":["0021-9533"]},"language":[{"iso":"eng"}],"quality_controlled":"1","intvolume":"       133"},{"OA_type":"green","acknowledgement":"Work in the Vaquerizas laboratory is funded by the Max Planck Society, the Deutsche Forschungsgemeinschaft (DFG) Priority Programme SPP 2202 ‘Spatial Genome Architecture in Development and Disease’ (project no. 422857230 to J.M.V.), the DFG Clinical Research Unit CRU326 ‘Male Germ Cells: from Genes to Function’ (project no. 329621271 to J.M.V.), the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement no. 643062—ZENCODE-ITN to J.M.V.) and the Medical Research Council in the UK. This research was partially funded by the European Union’s H2020 Framework Programme through the European Research Council (grant no. 609989 to M.A.M.-R.). We thank the support of the Spanish Ministerio de Ciencia, Innovación y Universidades through grant no. BFU2017-85926-P to M.A.M.-R. The Centre for Genomic Regulation thanks the support of the Ministerio de Ciencia, Innovación y Universidades to the European Molecular Biology Laboratory partnership, the ‘Centro de Excelencia Severo Ochoa 2013–2017’, agreement no. SEV-2012-0208, the CERCA Programme/Generalitat de Catalunya, Spanish Ministerio de Ciencia, Innovación y Universidades through the Instituto de Salud Carlos III, the Generalitat de Catalunya through the Departament de Salut and Departament d’Empresa i Coneixement and cofinancing by the Spanish Ministerio de Ciencia, Innovación y Universidades with funds from the European Regional Development Fund corresponding to the 2014–2020 Smart Growth Operating Program. S.G. thanks the support from the Company of Biologists (grant no. JCSTF181158) and the European Molecular Biology Organization Short-Term Fellowship programme.","date_published":"2020-10-19T00:00:00Z","abstract":[{"lang":"eng","text":"Dynamic changes in the three-dimensional (3D) organization of chromatin are associated with central biological processes, such as transcription, replication and development. Therefore, the comprehensive identification and quantification of these changes is fundamental to understanding of evolutionary and regulatory mechanisms. Here, we present Comparison of Hi-C Experiments using Structural Similarity (CHESS), an algorithm for the comparison of chromatin contact maps and automatic differential feature extraction. We demonstrate the robustness of CHESS to experimental variability and showcase its biological applications on (1) interspecies comparisons of syntenic regions in human and mouse models; (2) intraspecies identification of conformational changes in Zelda-depleted Drosophila embryos; (3) patient-specific aberrant chromatin conformation in a diffuse large B-cell lymphoma sample; and (4) the systematic identification of chromatin contact differences in high-resolution Capture-C data. In summary, CHESS is a computationally efficient method for the comparison and classification of changes in chromatin contact data."}],"scopus_import":"1","status":"public","isi":1,"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","oa":1,"article_type":"original","publication_status":"published","author":[{"first_name":"Silvia","full_name":" Galan, Silvia","last_name":" Galan"},{"first_name":"Nick N","id":"3591A0AA-F248-11E8-B48F-1D18A9856A87","full_name":"Machnik, Nick N","orcid":"0000-0001-6617-9742","last_name":"Machnik"},{"last_name":"Kruse","full_name":"Kruse, Kai","first_name":"Kai"},{"last_name":"Díaz","first_name":"Noelia","full_name":"Díaz, Noelia"},{"first_name":"Marc A","full_name":"Marti-Renom, Marc A","last_name":"Marti-Renom"},{"last_name":"Vaquerizas","full_name":"Vaquerizas, Juan M","first_name":"Juan M"}],"title":"CHESS enables quantitative comparison of chromatin contact data and automatic feature extraction","year":"2020","_id":"8707","oa_version":"Submitted Version","pmid":1,"month":"10","article_processing_charge":"No","date_updated":"2026-05-04T22:30:28Z","OA_place":"repository","external_id":{"pmid":["33077914"],"isi":["000579693500004"]},"intvolume":"        52","language":[{"iso":"eng"}],"quality_controlled":"1","publication_identifier":{"eissn":["1546-1718"],"issn":["1061-4036"]},"date_created":"2020-10-25T23:01:20Z","department":[{"_id":"FyKo"}],"page":"1247-1255","doi":"10.1038/s41588-020-00712-y","publisher":"Springer Nature","day":"19","related_material":{"record":[{"relation":"dissertation_contains","id":"18642","status":"public"}]},"type":"journal_article","citation":{"ama":"Galan S, Machnik NN, Kruse K, Díaz N, Marti-Renom MA, Vaquerizas JM. CHESS enables quantitative comparison of chromatin contact data and automatic feature extraction. <i>Nature Genetics</i>. 2020;52:1247-1255. doi:<a href=\"https://doi.org/10.1038/s41588-020-00712-y\">10.1038/s41588-020-00712-y</a>","chicago":"Galan, Silvia, Nick N Machnik, Kai Kruse, Noelia Díaz, Marc A Marti-Renom, and Juan M Vaquerizas. “CHESS Enables Quantitative Comparison of Chromatin Contact Data and Automatic Feature Extraction.” <i>Nature Genetics</i>. Springer Nature, 2020. <a href=\"https://doi.org/10.1038/s41588-020-00712-y\">https://doi.org/10.1038/s41588-020-00712-y</a>.","short":"S.  Galan, N.N. Machnik, K. Kruse, N. Díaz, M.A. Marti-Renom, J.M. Vaquerizas, Nature Genetics 52 (2020) 1247–1255.","ieee":"S.  Galan, N. N. Machnik, K. Kruse, N. Díaz, M. A. Marti-Renom, and J. M. Vaquerizas, “CHESS enables quantitative comparison of chromatin contact data and automatic feature extraction,” <i>Nature Genetics</i>, vol. 52. Springer Nature, pp. 1247–1255, 2020.","apa":"Galan, S., Machnik, N. N., Kruse, K., Díaz, N., Marti-Renom, M. A., &#38; Vaquerizas, J. M. (2020). CHESS enables quantitative comparison of chromatin contact data and automatic feature extraction. <i>Nature Genetics</i>. Springer Nature. <a href=\"https://doi.org/10.1038/s41588-020-00712-y\">https://doi.org/10.1038/s41588-020-00712-y</a>","mla":"Galan, Silvia, et al. “CHESS Enables Quantitative Comparison of Chromatin Contact Data and Automatic Feature Extraction.” <i>Nature Genetics</i>, vol. 52, Springer Nature, 2020, pp. 1247–55, doi:<a href=\"https://doi.org/10.1038/s41588-020-00712-y\">10.1038/s41588-020-00712-y</a>.","ista":"Galan S, Machnik NN, Kruse K, Díaz N, Marti-Renom MA, Vaquerizas JM. 2020. CHESS enables quantitative comparison of chromatin contact data and automatic feature extraction. Nature Genetics. 52, 1247–1255."},"volume":52,"main_file_link":[{"url":"https://pmc.ncbi.nlm.nih.gov/articles/PMC7610641/","open_access":"1"}],"publication":"Nature Genetics"},{"tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"date_created":"2020-09-20T22:01:35Z","file_date_updated":"2020-09-21T14:08:58Z","department":[{"_id":"RySh"}],"article_number":"6737","has_accepted_license":"1","date_updated":"2026-05-04T22:30:42Z","corr_author":"1","external_id":{"isi":["000579945300001"]},"quality_controlled":"1","language":[{"iso":"eng"}],"intvolume":"        21","publication_identifier":{"eissn":["1422-0067"],"issn":["1661-6596"]},"publication":"International Journal of Molecular Sciences","doi":"10.3390/ijms21186737","publisher":"MDPI","day":"14","ec_funded":1,"type":"journal_article","related_material":{"record":[{"relation":"dissertation_contains","id":"9562","status":"public"}]},"citation":{"short":"D. Kleindienst, J.-C. Montanaro-Punzengruber, P. Bhandari, M.J. Case, Y. Fukazawa, R. Shigemoto, International Journal of Molecular Sciences 21 (2020).","ieee":"D. Kleindienst, J.-C. Montanaro-Punzengruber, P. Bhandari, M. J. Case, Y. Fukazawa, and R. Shigemoto, “Deep learning-assisted high-throughput analysis of freeze-fracture replica images applied to glutamate receptors and calcium channels at hippocampal synapses,” <i>International Journal of Molecular Sciences</i>, vol. 21, no. 18. MDPI, 2020.","mla":"Kleindienst, David, et al. “Deep Learning-Assisted High-Throughput Analysis of Freeze-Fracture Replica Images Applied to Glutamate Receptors and Calcium Channels at Hippocampal Synapses.” <i>International Journal of Molecular Sciences</i>, vol. 21, no. 18, 6737, MDPI, 2020, doi:<a href=\"https://doi.org/10.3390/ijms21186737\">10.3390/ijms21186737</a>.","ista":"Kleindienst D, Montanaro-Punzengruber J-C, Bhandari P, Case MJ, Fukazawa Y, Shigemoto R. 2020. Deep learning-assisted high-throughput analysis of freeze-fracture replica images applied to glutamate receptors and calcium channels at hippocampal synapses. International Journal of Molecular Sciences. 21(18), 6737.","apa":"Kleindienst, D., Montanaro-Punzengruber, J.-C., Bhandari, P., Case, M. J., Fukazawa, Y., &#38; Shigemoto, R. (2020). Deep learning-assisted high-throughput analysis of freeze-fracture replica images applied to glutamate receptors and calcium channels at hippocampal synapses. <i>International Journal of Molecular Sciences</i>. MDPI. <a href=\"https://doi.org/10.3390/ijms21186737\">https://doi.org/10.3390/ijms21186737</a>","ama":"Kleindienst D, Montanaro-Punzengruber J-C, Bhandari P, Case MJ, Fukazawa Y, Shigemoto R. Deep learning-assisted high-throughput analysis of freeze-fracture replica images applied to glutamate receptors and calcium channels at hippocampal synapses. <i>International Journal of Molecular Sciences</i>. 2020;21(18). doi:<a href=\"https://doi.org/10.3390/ijms21186737\">10.3390/ijms21186737</a>","chicago":"Kleindienst, David, Jacqueline-Claire Montanaro-Punzengruber, Pradeep Bhandari, Matthew J Case, Yugo Fukazawa, and Ryuichi Shigemoto. “Deep Learning-Assisted High-Throughput Analysis of Freeze-Fracture Replica Images Applied to Glutamate Receptors and Calcium Channels at Hippocampal Synapses.” <i>International Journal of Molecular Sciences</i>. MDPI, 2020. <a href=\"https://doi.org/10.3390/ijms21186737\">https://doi.org/10.3390/ijms21186737</a>."},"volume":21,"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","isi":1,"file":[{"date_updated":"2020-09-21T14:08:58Z","file_name":"2020_JournMolecSciences_Kleindienst.pdf","checksum":"2e4f62f3cfe945b7391fc3070e5a289f","success":1,"file_size":5748456,"relation":"main_file","file_id":"8551","access_level":"open_access","date_created":"2020-09-21T14:08:58Z","creator":"dernst","content_type":"application/pdf"}],"oa":1,"publication_status":"published","article_type":"original","project":[{"name":"In situ analysis of single channel subunit composition in neurons: physiological implication in synaptic plasticity and behaviour","call_identifier":"H2020","grant_number":"694539","_id":"25CA28EA-B435-11E9-9278-68D0E5697425"},{"name":"Mechanism of formation and maintenance of input side-dependent asymmetry in the hippocampus","_id":"25D32BC0-B435-11E9-9278-68D0E5697425"},{"_id":"26436750-B435-11E9-9278-68D0E5697425","grant_number":"785907","call_identifier":"H2020","name":"Human Brain Project Specific Grant Agreement 2"}],"author":[{"last_name":"Kleindienst","full_name":"Kleindienst, David","id":"42E121A4-F248-11E8-B48F-1D18A9856A87","first_name":"David"},{"last_name":"Montanaro-Punzengruber","full_name":"Montanaro-Punzengruber, Jacqueline-Claire","id":"3786AB44-F248-11E8-B48F-1D18A9856A87","first_name":"Jacqueline-Claire"},{"orcid":"0000-0003-0863-4481","last_name":"Bhandari","first_name":"Pradeep","id":"45EDD1BC-F248-11E8-B48F-1D18A9856A87","full_name":"Bhandari, Pradeep"},{"last_name":"Case","id":"44B7CA5A-F248-11E8-B48F-1D18A9856A87","full_name":"Case, Matthew J","first_name":"Matthew J"},{"first_name":"Yugo","full_name":"Fukazawa, Yugo","last_name":"Fukazawa"},{"first_name":"Ryuichi","full_name":"Shigemoto, Ryuichi","id":"499F3ABC-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-8761-9444","last_name":"Shigemoto"}],"ddc":["570"],"acknowledgement":"This research was funded by Austrian Academy of Sciences, DOC fellowship to D.K., European Research\r\nCouncil Advanced Grant 694539 and European Union Human Brain Project (HBP) SGA2 785907 to R.S.\r\nWe acknowledge Elena Hollergschwandtner for technical support.","scopus_import":"1","date_published":"2020-09-14T00:00:00Z","abstract":[{"text":"The molecular anatomy of synapses defines their characteristics in transmission and plasticity. Precise measurements of the number and distribution of synaptic proteins are important for our understanding of synapse heterogeneity within and between brain regions. Freeze–fracture replica immunogold electron microscopy enables us to analyze them quantitatively on a two-dimensional membrane surface. Here, we introduce Darea software, which utilizes deep learning for analysis of replica images and demonstrate its usefulness for quick measurements of the pre- and postsynaptic areas, density and distribution of gold particles at synapses in a reproducible manner. We used Darea for comparing glutamate receptor and calcium channel distributions between hippocampal CA3-CA1 spine synapses on apical and basal dendrites, which differ in signaling pathways involved in synaptic plasticity. We found that apical synapses express a higher density of α-amino-3-hydroxy-5-methyl-4-isoxazolepropionic acid (AMPA) receptors and a stronger increase of AMPA receptors with synaptic size, while basal synapses show a larger increase in N-methyl-D-aspartate (NMDA) receptors with size. Interestingly, AMPA and NMDA receptors are segregated within postsynaptic sites and negatively correlated in density among both apical and basal synapses. In the presynaptic sites, Cav2.1 voltage-gated calcium channels show similar densities in apical and basal synapses with distributions consistent with an exclusion zone model of calcium channel-release site topography.","lang":"eng"}],"status":"public","month":"09","article_processing_charge":"No","title":"Deep learning-assisted high-throughput analysis of freeze-fracture replica images applied to glutamate receptors and calcium channels at hippocampal synapses","_id":"8532","issue":"18","year":"2020","oa_version":"Published Version"},{"title":"Perturbations of protein synthesis: from antibiotics to genetics and physiology","year":"2020","_id":"8657","oa_version":"Published Version","month":"10","article_processing_charge":"No","alternative_title":["ISTA Thesis"],"acknowledgement":"I thank Life Science Facilities for their continuous support with providing top-notch laboratory materials, keeping the devices humming, and coordinating the repairs and building of custom-designed laboratory equipment with the MIBA Machine shop.","ddc":["571","530","570"],"degree_awarded":"PhD","abstract":[{"text":"Synthesis of proteins – translation – is a fundamental process of life. Quantitative studies anchor translation into the context of bacterial physiology and reveal several mathematical relationships, called “growth laws,” which capture physiological feedbacks between protein synthesis and cell growth. Growth laws describe the dependency of the ribosome abundance as a function of growth rate, which can change depending on the growth conditions. Perturbations of translation reveal that bacteria employ a compensatory strategy in which the reduced translation capability results in increased expression of the translation machinery.\r\nPerturbations of translation are achieved in various ways; clinically interesting is the application of translation-targeting antibiotics – translation inhibitors. The antibiotic effects on bacterial physiology are often poorly understood. Bacterial responses to two or more simultaneously applied antibiotics are even more puzzling. The combined antibiotic effect determines the type of drug interaction, which ranges from synergy (the effect is stronger than expected) to antagonism (the effect is weaker) and suppression (one of the drugs loses its potency).\r\nIn the first part of this work, we systematically measure the pairwise interaction network for translation inhibitors that interfere with different steps in translation. We find that the interactions are surprisingly diverse and tend to be more antagonistic. To explore the underlying mechanisms, we begin with a minimal biophysical model of combined antibiotic action. We base this model on the kinetics of antibiotic uptake and binding together with the physiological response described by the growth laws. The biophysical model explains some drug interactions, but not all; it specifically fails to predict suppression.\r\nIn the second part of this work, we hypothesize that elusive suppressive drug interactions result from the interplay between ribosomes halted in different stages of translation. To elucidate this putative mechanism of drug interactions between translation inhibitors, we generate translation bottlenecks genetically using in- ducible control of translation factors that regulate well-defined translation cycle steps. These perturbations accurately mimic antibiotic action and drug interactions, supporting that the interplay of different translation bottlenecks partially causes these interactions.\r\nWe extend this approach by varying two translation bottlenecks simultaneously. This approach reveals the suppression of translocation inhibition by inhibited translation. We rationalize this effect by modeling dense traffic of ribosomes that move on transcripts in a translation factor-mediated manner. This model predicts a dissolution of traffic jams caused by inhibited translocation when the density of ribosome traffic is reduced by lowered initiation. We base this model on the growth laws and quantitative relationships between different translation and growth parameters.\r\nIn the final part of this work, we describe a set of tools aimed at quantification of physiological and translation parameters. We further develop a simple model that directly connects the abundance of a translation factor with the growth rate, which allows us to extract physiological parameters describing initiation. We demonstrate the development of tools for measuring translation rate.\r\nThis thesis showcases how a combination of high-throughput growth rate mea- surements, genetics, and modeling can reveal mechanisms of drug interactions. Furthermore, by a gradual transition from combinations of antibiotics to precise genetic interventions, we demonstrated the equivalency between genetic and chemi- cal perturbations of translation. These findings tile the path for quantitative studies of antibiotic combinations and illustrate future approaches towards the quantitative description of translation.","lang":"eng"}],"date_published":"2020-10-14T00:00:00Z","status":"public","file":[{"access_level":"open_access","creator":"bkavcic","date_created":"2020-10-15T06:41:20Z","content_type":"application/pdf","file_size":52636162,"relation":"main_file","file_id":"8663","checksum":"d708ecd62b6fcc3bc1feb483b8dbe9eb","date_updated":"2021-10-07T22:30:03Z","file_name":"kavcicB_thesis202009.pdf","embargo":"2021-10-06"},{"checksum":"bb35f2352a04db19164da609f00501f3","date_updated":"2021-10-07T22:30:03Z","file_name":"2020b.zip","embargo_to":"open_access","content_type":"application/zip","access_level":"closed","date_created":"2020-10-15T06:41:53Z","creator":"bkavcic","file_id":"8664","relation":"source_file","file_size":321681247}],"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","oa":1,"publication_status":"published","author":[{"orcid":"0000-0001-6041-254X","last_name":"Kavcic","first_name":"Bor","id":"350F91D2-F248-11E8-B48F-1D18A9856A87","full_name":"Kavcic, Bor"}],"page":"271","doi":"10.15479/AT:ISTA:8657","day":"14","publisher":"Institute of Science and Technology Austria","related_material":{"record":[{"status":"public","relation":"part_of_dissertation","id":"7673"},{"status":"public","id":"8250","relation":"part_of_dissertation"}]},"type":"dissertation","citation":{"ieee":"B. Kavcic, “Perturbations of protein synthesis: from antibiotics to genetics and physiology,” Institute of Science and Technology Austria, 2020.","ista":"Kavcic B. 2020. Perturbations of protein synthesis: from antibiotics to genetics and physiology. Institute of Science and Technology Austria.","apa":"Kavcic, B. (2020). <i>Perturbations of protein synthesis: from antibiotics to genetics and physiology</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:8657\">https://doi.org/10.15479/AT:ISTA:8657</a>","mla":"Kavcic, Bor. <i>Perturbations of Protein Synthesis: From Antibiotics to Genetics and Physiology</i>. Institute of Science and Technology Austria, 2020, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:8657\">10.15479/AT:ISTA:8657</a>.","short":"B. Kavcic, Perturbations of Protein Synthesis: From Antibiotics to Genetics and Physiology, Institute of Science and Technology Austria, 2020.","chicago":"Kavcic, Bor. “Perturbations of Protein Synthesis: From Antibiotics to Genetics and Physiology.” Institute of Science and Technology Austria, 2020. <a href=\"https://doi.org/10.15479/AT:ISTA:8657\">https://doi.org/10.15479/AT:ISTA:8657</a>.","ama":"Kavcic B. Perturbations of protein synthesis: from antibiotics to genetics and physiology. 2020. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:8657\">10.15479/AT:ISTA:8657</a>"},"date_updated":"2026-04-08T07:27:48Z","has_accepted_license":"1","OA_place":"publisher","supervisor":[{"orcid":"0000-0002-6699-1455","last_name":"Tkačik","id":"3D494DCA-F248-11E8-B48F-1D18A9856A87","full_name":"Tkačik, Gašper","first_name":"Gašper"},{"last_name":"Bollenbach","orcid":"0000-0003-4398-476X","id":"3E6DB97A-F248-11E8-B48F-1D18A9856A87","full_name":"Bollenbach, Mark Tobias","first_name":"Mark Tobias"}],"corr_author":"1","language":[{"iso":"eng"}],"publication_identifier":{"issn":["2663-337X"],"isbn":["978-3-99078-011-4"]},"acknowledged_ssus":[{"_id":"LifeSc"},{"_id":"M-Shop"}],"file_date_updated":"2021-10-07T22:30:03Z","date_created":"2020-10-13T16:46:14Z","department":[{"_id":"GaTk"}]},{"article_processing_charge":"Yes (via OA deal)","month":"09","pmid":1,"oa_version":"Published Version","year":"2020","_id":"8569","issue":"9","title":"Non-cell-autonomous mechanisms in radial projection neuron migration in the developing cerebral cortex","author":[{"last_name":"Hansen","full_name":"Hansen, Andi H","id":"38853E16-F248-11E8-B48F-1D18A9856A87","first_name":"Andi H"},{"orcid":"0000-0003-2279-1061","last_name":"Hippenmeyer","first_name":"Simon","full_name":"Hippenmeyer, Simon","id":"37B36620-F248-11E8-B48F-1D18A9856A87"}],"project":[{"name":"Molecular mechanisms of radial neuronal migration","grant_number":"24812","_id":"2625A13E-B435-11E9-9278-68D0E5697425"},{"name":"Molecular Mechanisms of Cerebral Cortex Development","call_identifier":"FP7","grant_number":"618444","_id":"25D61E48-B435-11E9-9278-68D0E5697425"}],"article_type":"original","publication_status":"published","oa":1,"file":[{"content_type":"application/pdf","creator":"dernst","date_created":"2020-09-28T13:11:17Z","access_level":"open_access","file_id":"8584","relation":"main_file","file_size":5527139,"success":1,"checksum":"01f731824194c94c81a5da360d997073","file_name":"2020_Frontiers_Hansen.pdf","date_updated":"2020-09-28T13:11:17Z"}],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","isi":1,"status":"public","date_published":"2020-09-25T00:00:00Z","abstract":[{"text":"Concerted radial migration of newly born cortical projection neurons, from their birthplace to their final target lamina, is a key step in the assembly of the cerebral cortex. The cellular and molecular mechanisms regulating the specific sequential steps of radial neuronal migration in vivo are however still unclear, let alone the effects and interactions with the extracellular environment. In any in vivo context, cells will always be exposed to a complex extracellular environment consisting of (1) secreted factors acting as potential signaling cues, (2) the extracellular matrix, and (3) other cells providing cell–cell interaction through receptors and/or direct physical stimuli. Most studies so far have described and focused mainly on intrinsic cell-autonomous gene functions in neuronal migration but there is accumulating evidence that non-cell-autonomous-, local-, systemic-, and/or whole tissue-wide effects substantially contribute to the regulation of radial neuronal migration. These non-cell-autonomous effects may differentially affect cortical neuron migration in distinct cellular environments. However, the cellular and molecular natures of such non-cell-autonomous mechanisms are mostly unknown. Furthermore, physical forces due to collective migration and/or community effects (i.e., interactions with surrounding cells) may play important roles in neocortical projection neuron migration. In this concise review, we first outline distinct models of non-cell-autonomous interactions of cortical projection neurons along their radial migration trajectory during development. We then summarize experimental assays and platforms that can be utilized to visualize and potentially probe non-cell-autonomous mechanisms. Lastly, we define key questions to address in the future.","lang":"eng"}],"scopus_import":"1","acknowledgement":"AH was a recipient of a DOC Fellowship (24812) of the Austrian Academy of Sciences. This work also received support from IST Austria institutional funds; the People Programme (Marie Curie Actions) of the European Union’s Seventh Framework Programme (FP7/2007–2013) under REA Grant Agreement No. 618444 to SH.","ddc":["570"],"publication":"Frontiers in Cell and Developmental Biology","volume":8,"citation":{"ama":"Hansen AH, Hippenmeyer S. Non-cell-autonomous mechanisms in radial projection neuron migration in the developing cerebral cortex. <i>Frontiers in Cell and Developmental Biology</i>. 2020;8(9). doi:<a href=\"https://doi.org/10.3389/fcell.2020.574382\">10.3389/fcell.2020.574382</a>","chicago":"Hansen, Andi H, and Simon Hippenmeyer. “Non-Cell-Autonomous Mechanisms in Radial Projection Neuron Migration in the Developing Cerebral Cortex.” <i>Frontiers in Cell and Developmental Biology</i>. Frontiers, 2020. <a href=\"https://doi.org/10.3389/fcell.2020.574382\">https://doi.org/10.3389/fcell.2020.574382</a>.","short":"A.H. Hansen, S. Hippenmeyer, Frontiers in Cell and Developmental Biology 8 (2020).","mla":"Hansen, Andi H., and Simon Hippenmeyer. “Non-Cell-Autonomous Mechanisms in Radial Projection Neuron Migration in the Developing Cerebral Cortex.” <i>Frontiers in Cell and Developmental Biology</i>, vol. 8, no. 9, 574382, Frontiers, 2020, doi:<a href=\"https://doi.org/10.3389/fcell.2020.574382\">10.3389/fcell.2020.574382</a>.","apa":"Hansen, A. H., &#38; Hippenmeyer, S. (2020). Non-cell-autonomous mechanisms in radial projection neuron migration in the developing cerebral cortex. <i>Frontiers in Cell and Developmental Biology</i>. Frontiers. <a href=\"https://doi.org/10.3389/fcell.2020.574382\">https://doi.org/10.3389/fcell.2020.574382</a>","ista":"Hansen AH, Hippenmeyer S. 2020. Non-cell-autonomous mechanisms in radial projection neuron migration in the developing cerebral cortex. Frontiers in Cell and Developmental Biology. 8(9), 574382.","ieee":"A. H. Hansen and S. Hippenmeyer, “Non-cell-autonomous mechanisms in radial projection neuron migration in the developing cerebral cortex,” <i>Frontiers in Cell and Developmental Biology</i>, vol. 8, no. 9. Frontiers, 2020."},"related_material":{"record":[{"relation":"dissertation_contains","id":"9962","status":"public"}]},"ec_funded":1,"type":"journal_article","doi":"10.3389/fcell.2020.574382","day":"25","publisher":"Frontiers","article_number":"574382","department":[{"_id":"SiHi"}],"file_date_updated":"2020-09-28T13:11:17Z","date_created":"2020-09-26T06:11:07Z","tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"publication_identifier":{"issn":["2296-634X"]},"intvolume":"         8","language":[{"iso":"eng"}],"quality_controlled":"1","external_id":{"pmid":["33102480"],"isi":["000577915900001"]},"corr_author":"1","date_updated":"2026-05-04T22:30:44Z","has_accepted_license":"1"},{"title":"Molecular mechanisms of mitochondrial redox-coupled proton pumping enzymes","oa_version":"None","_id":"8340","year":"2020","month":"09","alternative_title":["ISTA Thesis"],"article_processing_charge":"No","degree_awarded":"PhD","ddc":["572"],"acknowledgement":"I acknowledge the support of IST facilities, especially the Electron Miscroscopy facility for providing training and resources. Special thanks also go to cryo-EM specialists who helped me to collect the data present here: Dr Valentin Hodirnau (IST Austria), Dr Tom Heuser (IMBA, Vienna), Dr Rebecca Thompson (Uni. of Leeds) and Dr Jirka Nováček (CEITEC). This work has been supported by iNEXT, project number 653706, funded by the Horizon 2020 programme of the European Union. This project has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie Grant Agreement No. 665385.","status":"public","abstract":[{"text":"Mitochondria are sites of oxidative phosphorylation in eukaryotic cells. Oxidative phosphorylation operates by a chemiosmotic mechanism made possible by redox-driven proton pumping machines which establish a proton motive force across the inner mitochondrial membrane. This electrochemical proton gradient is used to drive ATP synthesis, which powers the majority of cellular processes such as protein synthesis, locomotion and signalling. In this thesis I investigate the structures and molecular mechanisms of two inner mitochondrial proton pumping enzymes, respiratory complex I and transhydrogenase. I present the first high-resolution structure of the full transhydrogenase from any species, and a significantly improved structure of complex I. Improving the resolution from 3.3 Å available previously to up to 2.3 Å in this thesis allowed us to model bound water molecules, crucial in the proton pumping mechanism. For both enzymes, up to five cryo-EM datasets with different substrates and inhibitors bound were solved to delineate the catalytic cycle and understand the proton pumping mechanism. In transhydrogenase, the proton channel is gated by reversible detachment of the NADP(H)-binding domain which opens the proton channel to the opposite sites of the membrane. In complex I, the proton channels are gated by reversible protonation of key glutamate and lysine residues and breaking of the water wire connecting the proton pumps with the quinone reduction site. The tight coupling between the redox and the proton pumping reactions in transhydrogenase is achieved by controlling the NADP(H) exchange which can only happen when the NADP(H)-binding domain interacts with the membrane domain. In complex I, coupling is achieved by cycling of the whole complex between the closed state, in which quinone can get reduced, and the open state, in which NADH can induce quinol ejection from the binding pocket. On the basis of these results I propose detailed mechanisms for catalytic cycles of transhydrogenase and complex I that are consistent with a large amount of previous work. In both enzymes, conformational and electrostatic mechanisms contribute to the overall catalytic process. Results presented here could be used for better understanding of the human pathologies arising from deficiencies of complex I or transhydrogenase and could be used to develop novel therapies.","lang":"eng"}],"date_published":"2020-09-09T00:00:00Z","oa":1,"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","file":[{"checksum":"dd270baf82121eb4472ad19d77bf227c","date_updated":"2021-09-11T22:30:04Z","embargo_to":"open_access","file_name":"ThesisFull20200908.docx","content_type":"application/vnd.openxmlformats-officedocument.wordprocessingml.document","access_level":"closed","date_created":"2020-09-08T13:32:06Z","creator":"dkampjut","file_id":"8345","relation":"source_file","file_size":166146359},{"checksum":"82fce6f95ffa47ecc4ebca67ea2cc38c","embargo":"2021-09-10","file_name":"2020_Thesis_Kampjut.pdf","date_updated":"2021-09-11T22:30:04Z","content_type":"application/pdf","date_created":"2020-09-14T15:02:20Z","creator":"dernst","access_level":"open_access","file_id":"8393","relation":"main_file","file_size":13873769}],"author":[{"id":"37233050-F248-11E8-B48F-1D18A9856A87","full_name":"Kampjut, Domen","first_name":"Domen","orcid":"0000-0002-6018-3422","last_name":"Kampjut"}],"publication_status":"published","project":[{"grant_number":"665385","_id":"2564DBCA-B435-11E9-9278-68D0E5697425","call_identifier":"H2020","name":"International IST Doctoral Program"}],"ec_funded":1,"type":"dissertation","related_material":{"record":[{"status":"public","relation":"part_of_dissertation","id":"6848"}]},"doi":"10.15479/AT:ISTA:8340","publisher":"Institute of Science and Technology Austria","day":"09","page":"242","citation":{"short":"D. Kampjut, Molecular Mechanisms of Mitochondrial Redox-Coupled Proton Pumping Enzymes, Institute of Science and Technology Austria, 2020.","ista":"Kampjut D. 2020. Molecular mechanisms of mitochondrial redox-coupled proton pumping enzymes. Institute of Science and Technology Austria.","mla":"Kampjut, Domen. <i>Molecular Mechanisms of Mitochondrial Redox-Coupled Proton Pumping Enzymes</i>. Institute of Science and Technology Austria, 2020, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:8340\">10.15479/AT:ISTA:8340</a>.","apa":"Kampjut, D. (2020). <i>Molecular mechanisms of mitochondrial redox-coupled proton pumping enzymes</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:8340\">https://doi.org/10.15479/AT:ISTA:8340</a>","ieee":"D. Kampjut, “Molecular mechanisms of mitochondrial redox-coupled proton pumping enzymes,” Institute of Science and Technology Austria, 2020.","ama":"Kampjut D. Molecular mechanisms of mitochondrial redox-coupled proton pumping enzymes. 2020. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:8340\">10.15479/AT:ISTA:8340</a>","chicago":"Kampjut, Domen. “Molecular Mechanisms of Mitochondrial Redox-Coupled Proton Pumping Enzymes.” Institute of Science and Technology Austria, 2020. <a href=\"https://doi.org/10.15479/AT:ISTA:8340\">https://doi.org/10.15479/AT:ISTA:8340</a>."},"corr_author":"1","supervisor":[{"orcid":"0000-0002-0977-7989","last_name":"Sazanov","id":"338D39FE-F248-11E8-B48F-1D18A9856A87","full_name":"Sazanov, Leonid A","first_name":"Leonid A"}],"has_accepted_license":"1","OA_place":"publisher","date_updated":"2026-04-08T07:43:58Z","publication_identifier":{"isbn":["978-3-99078-008-4"],"issn":["2663-337X"]},"language":[{"iso":"eng"}],"acknowledged_ssus":[{"_id":"EM-Fac"}],"department":[{"_id":"LeSa"}],"file_date_updated":"2021-09-11T22:30:04Z","date_created":"2020-09-07T18:42:23Z"},{"related_material":{"record":[{"status":"public","id":"7800","relation":"part_of_dissertation"},{"status":"public","relation":"part_of_dissertation","id":"8131"}]},"type":"dissertation","page":"138","doi":"10.15479/AT:ISTA:8620","day":"12","publisher":"Institute of Science and Technology Austria","citation":{"chicago":"Morandell, Jasmin. “Illuminating the Role of Cul3 in Autism Spectrum Disorder Pathogenesis.” Institute of Science and Technology Austria, 2020. <a href=\"https://doi.org/10.15479/AT:ISTA:8620\">https://doi.org/10.15479/AT:ISTA:8620</a>.","ama":"Morandell J. Illuminating the role of Cul3 in autism spectrum disorder pathogenesis. 2020. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:8620\">10.15479/AT:ISTA:8620</a>","ieee":"J. Morandell, “Illuminating the role of Cul3 in autism spectrum disorder pathogenesis,” Institute of Science and Technology Austria, 2020.","apa":"Morandell, J. (2020). <i>Illuminating the role of Cul3 in autism spectrum disorder pathogenesis</i>. Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:8620\">https://doi.org/10.15479/AT:ISTA:8620</a>","mla":"Morandell, Jasmin. <i>Illuminating the Role of Cul3 in Autism Spectrum Disorder Pathogenesis</i>. Institute of Science and Technology Austria, 2020, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:8620\">10.15479/AT:ISTA:8620</a>.","ista":"Morandell J. 2020. Illuminating the role of Cul3 in autism spectrum disorder pathogenesis. Institute of Science and Technology Austria.","short":"J. Morandell, Illuminating the Role of Cul3 in Autism Spectrum Disorder Pathogenesis, Institute of Science and Technology Austria, 2020."},"supervisor":[{"orcid":"0000-0002-7673-7178","last_name":"Novarino","first_name":"Gaia","full_name":"Novarino, Gaia","id":"3E57A680-F248-11E8-B48F-1D18A9856A87"}],"corr_author":"1","date_updated":"2026-04-14T09:07:16Z","OA_place":"publisher","has_accepted_license":"1","publication_identifier":{"issn":["2663-337X"]},"language":[{"iso":"eng"}],"acknowledged_ssus":[{"_id":"Bio"},{"_id":"PreCl"}],"department":[{"_id":"GaNo"}],"date_created":"2020-10-07T14:53:13Z","file_date_updated":"2021-10-16T22:30:04Z","title":"Illuminating the role of Cul3 in autism spectrum disorder pathogenesis","oa_version":"Published Version","year":"2020","_id":"8620","month":"10","article_processing_charge":"No","alternative_title":["ISTA Thesis"],"acknowledgement":"I would like to especially thank Armel Nicolas from the Proteomics and Christoph Sommer from the Bioimaging Facilities for the data analysis, and to thank the team of the Preclinical Facility, especially Sabina Deixler, Angela Schlerka, Anita Lepold, Mihalea Mihai and Michael Schun for taking care of the mouse line maintenance and their great support.","degree_awarded":"PhD","ddc":["610"],"status":"public","abstract":[{"text":"The development of the human brain occurs through a tightly regulated series of dynamic and adaptive processes during prenatal and postnatal life. A disruption of this strictly orchestrated series of events can lead to a number of neurodevelopmental conditions, including Autism Spectrum Disorders (ASDs). ASDs are a very common, etiologically and phenotypically heterogeneous group of disorders sharing the core symptoms of social interaction and communication deficits and restrictive and repetitive interests and behaviors. They are estimated to affect one in 59 individuals in the U.S. and, over the last three decades, mutations in more than a hundred genetic loci have been convincingly linked to ASD pathogenesis. Yet, for the vast majority of these ASD-risk genes their role during brain development and precise molecular function still remain elusive.\r\nDe novo loss of function mutations in the ubiquitin ligase-encoding gene Cullin 3 (CUL3) lead to ASD. In the study described here, we used Cul3 mouse models to evaluate the consequences of Cul3 mutations in vivo. Our results show that Cul3 heterozygous knockout mice exhibit deficits in motor coordination as well as ASD-relevant social and cognitive impairments. Cul3+/-, Cul3+/fl Emx1-Cre and Cul3fl/fl Emx1-Cre mutant brains display cortical lamination abnormalities due to defective migration of post-mitotic excitatory neurons, as well as reduced numbers of excitatory and inhibitory neurons. In line with the observed abnormal cortical organization, Cul3 heterozygous deletion is associated with decreased spontaneous excitatory and inhibitory activity in the cortex. At the molecular level we show that Cul3 regulates cytoskeletal and adhesion protein abundance in the mouse embryonic cortex. Abnormal regulation of cytoskeletal proteins in Cul3 mutant neural cells results in atypical organization of the actin mesh at the cell leading edge. Of note, heterozygous deletion of Cul3 in adult mice does not induce the majority of the behavioral defects observed in constitutive Cul3 haploinsufficient animals, pointing to a critical time-window for Cul3 deficiency.\r\nIn conclusion, our data indicate that Cul3 plays a critical role in the regulation of cytoskeletal proteins and neuronal migration. ASD-associated defects and behavioral abnormalities are primarily due to dosage sensitive Cul3 functions at early brain developmental stages.","lang":"eng"}],"date_published":"2020-10-12T00:00:00Z","oa":1,"file":[{"embargo":"2021-10-15","date_updated":"2021-10-16T22:30:04Z","file_name":"Jasmin_Morandell_Thesis-2020_final.pdf","checksum":"7ee83e42de3e5ce2fedb44dff472f75f","file_id":"8621","file_size":16155786,"relation":"main_file","content_type":"application/pdf","access_level":"open_access","date_created":"2020-10-07T14:41:49Z","creator":"jmorande"},{"file_size":24344152,"relation":"source_file","file_id":"8622","access_level":"closed","creator":"jmorande","date_created":"2020-10-07T14:45:07Z","content_type":"application/x-zip-compressed","date_updated":"2021-10-16T22:30:04Z","embargo_to":"open_access","file_name":"Jasmin_Morandell_Thesis-2020_final.zip","checksum":"5e0464af453734210ce7aab7b4a92e3a"}],"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","author":[{"id":"4739D480-F248-11E8-B48F-1D18A9856A87","full_name":"Morandell, Jasmin","first_name":"Jasmin","last_name":"Morandell"}],"project":[{"grant_number":"W1232","_id":"2548AE96-B435-11E9-9278-68D0E5697425","call_identifier":"FWF","name":"Molecular Drug Targets"},{"grant_number":"F7807","_id":"05A0D778-7A3F-11EA-A408-12923DDC885E","name":"Stem Cell Modulation in Neural Development and Regeneration/ P07-Neural stem cells in autism and epilepsy"}],"publication_status":"published"},{"doi":"10.1007/978-3-030-44914-8_5","day":"18","publisher":"Springer Nature","page":"112-140","type":"conference","related_material":{"record":[{"id":"8934","relation":"dissertation_contains","status":"public"}]},"citation":{"ama":"Chatterjee K, Goharshady AK, Ibsen-Jensen R, Pavlogiannis A. Optimal and perfectly parallel algorithms for on-demand data-flow analysis. In: <i>European Symposium on Programming</i>. Vol 12075. Springer Nature; 2020:112-140. doi:<a href=\"https://doi.org/10.1007/978-3-030-44914-8_5\">10.1007/978-3-030-44914-8_5</a>","chicago":"Chatterjee, Krishnendu, Amir Kafshdar Goharshady, Rasmus Ibsen-Jensen, and Andreas Pavlogiannis. “Optimal and Perfectly Parallel Algorithms for On-Demand Data-Flow Analysis.” In <i>European Symposium on Programming</i>, 12075:112–40. Springer Nature, 2020. <a href=\"https://doi.org/10.1007/978-3-030-44914-8_5\">https://doi.org/10.1007/978-3-030-44914-8_5</a>.","short":"K. Chatterjee, A.K. Goharshady, R. Ibsen-Jensen, A. Pavlogiannis, in:, European Symposium on Programming, Springer Nature, 2020, pp. 112–140.","ieee":"K. Chatterjee, A. K. Goharshady, R. Ibsen-Jensen, and A. Pavlogiannis, “Optimal and perfectly parallel algorithms for on-demand data-flow analysis,” in <i>European Symposium on Programming</i>, Dublin, Ireland, 2020, vol. 12075, pp. 112–140.","ista":"Chatterjee K, Goharshady AK, Ibsen-Jensen R, Pavlogiannis A. 2020. Optimal and perfectly parallel algorithms for on-demand data-flow analysis. European Symposium on Programming. ESOP: Programming Languages and Systems, LNCS, vol. 12075, 112–140.","mla":"Chatterjee, Krishnendu, et al. “Optimal and Perfectly Parallel Algorithms for On-Demand Data-Flow Analysis.” <i>European Symposium on Programming</i>, vol. 12075, Springer Nature, 2020, pp. 112–40, doi:<a href=\"https://doi.org/10.1007/978-3-030-44914-8_5\">10.1007/978-3-030-44914-8_5</a>.","apa":"Chatterjee, K., Goharshady, A. K., Ibsen-Jensen, R., &#38; Pavlogiannis, A. (2020). Optimal and perfectly parallel algorithms for on-demand data-flow analysis. In <i>European Symposium on Programming</i> (Vol. 12075, pp. 112–140). Dublin, Ireland: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-44914-8_5\">https://doi.org/10.1007/978-3-030-44914-8_5</a>"},"volume":12075,"publication":"European Symposium on Programming","has_accepted_license":"1","date_updated":"2026-05-04T22:31:06Z","corr_author":"1","external_id":{"isi":["000681656800005"]},"quality_controlled":"1","language":[{"iso":"eng"}],"intvolume":"     12075","publication_identifier":{"isbn":["9783030449131"],"issn":["0302-9743"],"eissn":["1611-3349"]},"tmp":{"legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","image":"/images/cc_by.png","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","short":"CC BY (4.0)"},"date_created":"2020-05-10T22:00:50Z","file_date_updated":"2020-07-14T12:48:03Z","department":[{"_id":"KrCh"}],"title":"Optimal and perfectly parallel algorithms for on-demand data-flow analysis","_id":"7810","year":"2020","oa_version":"Published Version","month":"04","article_processing_charge":"No","alternative_title":["LNCS"],"ddc":["000"],"conference":{"start_date":"2020-04-25","end_date":"2020-04-30","name":"ESOP: Programming Languages and Systems","location":"Dublin, Ireland"},"date_published":"2020-04-18T00:00:00Z","scopus_import":"1","abstract":[{"lang":"eng","text":"Interprocedural data-flow analyses form an expressive and useful paradigm of numerous static analysis applications, such as live variables analysis, alias analysis and null pointers analysis. The most widely-used framework for interprocedural data-flow analysis is IFDS, which encompasses distributive data-flow functions over a finite domain. On-demand data-flow analyses restrict the focus of the analysis on specific program locations and data facts. This setting provides a natural split between (i) an offline (or preprocessing) phase, where the program is partially analyzed and analysis summaries are created, and (ii) an online (or query) phase, where analysis queries arrive on demand and the summaries are used to speed up answering queries.\r\nIn this work, we consider on-demand IFDS analyses where the queries concern program locations of the same procedure (aka same-context queries). We exploit the fact that flow graphs of programs have low treewidth to develop faster algorithms that are space and time optimal for many common data-flow analyses, in both the preprocessing and the query phase. We also use treewidth to develop query solutions that are embarrassingly parallelizable, i.e. the total work for answering each query is split to a number of threads such that each thread performs only a constant amount of work. Finally, we implement a static analyzer based on our algorithms, and perform a series of on-demand analysis experiments on standard benchmarks. Our experimental results show a drastic speed-up of the queries after only a lightweight preprocessing phase, which significantly outperforms existing techniques."}],"status":"public","isi":1,"user_id":"ba8df636-2132-11f1-aed0-ed93e2281fdd","file":[{"file_id":"7895","relation":"main_file","file_size":651250,"content_type":"application/pdf","date_created":"2020-05-26T13:34:48Z","creator":"dernst","access_level":"open_access","file_name":"2020_LNCS_Chatterjee.pdf","date_updated":"2020-07-14T12:48:03Z","checksum":"8618b80f4cf7b39a60e61a6445ad9807"}],"oa":1,"publication_status":"published","project":[{"grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425","name":"Rigorous Systems Engineering","call_identifier":"FWF"},{"name":"Efficient Algorithms for Computer Aided Verification","grant_number":"ICT15-003","_id":"25892FC0-B435-11E9-9278-68D0E5697425"},{"name":"Quantitative Game-theoretic Analysis of Blockchain Applications and Smart Contracts","_id":"266EEEC0-B435-11E9-9278-68D0E5697425"},{"_id":"267066CE-B435-11E9-9278-68D0E5697425","name":"Quantitative Analysis of Probabilistic Systems with a focus on Crypto-Currencies"}],"author":[{"first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","orcid":"0000-0002-4561-241X"},{"last_name":"Goharshady","orcid":"0000-0003-1702-6584","first_name":"Amir Kafshdar","id":"391365CE-F248-11E8-B48F-1D18A9856A87","full_name":"Goharshady, Amir Kafshdar"},{"orcid":"0000-0003-4783-0389","last_name":"Ibsen-Jensen","id":"3B699956-F248-11E8-B48F-1D18A9856A87","full_name":"Ibsen-Jensen, Rasmus","first_name":"Rasmus"},{"last_name":"Pavlogiannis","orcid":"0000-0002-8943-0722","first_name":"Andreas","id":"49704004-F248-11E8-B48F-1D18A9856A87","full_name":"Pavlogiannis, Andreas"}]},{"alternative_title":["LNCS"],"article_processing_charge":"No","month":"10","oa_version":"Submitted Version","_id":"8728","year":"2020","title":"Faster algorithms for quantitative analysis of MCs and MDPs with small treewidth","author":[{"full_name":"Asadi, Ali","first_name":"Ali","last_name":"Asadi"},{"first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu","orcid":"0000-0002-4561-241X","last_name":"Chatterjee"},{"last_name":"Goharshady","orcid":"0000-0003-1702-6584","full_name":"Goharshady, Amir Kafshdar","id":"391365CE-F248-11E8-B48F-1D18A9856A87","first_name":"Amir Kafshdar"},{"first_name":"Kiarash","full_name":"Mohammadi, Kiarash","last_name":"Mohammadi"},{"last_name":"Pavlogiannis","orcid":"0000-0002-8943-0722","full_name":"Pavlogiannis, Andreas","id":"49704004-F248-11E8-B48F-1D18A9856A87","first_name":"Andreas"}],"publication_status":"published","project":[{"call_identifier":"FWF","name":"Rigorous Systems Engineering","grant_number":"S 11407_N23","_id":"25832EC2-B435-11E9-9278-68D0E5697425"},{"name":"Efficient Algorithms for Computer Aided Verification","grant_number":"ICT15-003","_id":"25892FC0-B435-11E9-9278-68D0E5697425"},{"name":"Quantitative Analysis of Probabilistic Systems with a focus on Crypto-Currencies","_id":"267066CE-B435-11E9-9278-68D0E5697425"}],"oa":1,"isi":1,"user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","file":[{"checksum":"ae83f27e5b189d5abc2e7514f1b7e1b5","success":1,"date_updated":"2020-11-06T07:41:03Z","file_name":"2020_LNCS_ATVA_Asadi_accepted.pdf","access_level":"open_access","date_created":"2020-11-06T07:41:03Z","creator":"dernst","content_type":"application/pdf","file_size":726648,"relation":"main_file","file_id":"8729"}],"status":"public","date_published":"2020-10-12T00:00:00Z","scopus_import":"1","abstract":[{"lang":"eng","text":"Discrete-time Markov Chains (MCs) and Markov Decision Processes (MDPs) are two standard formalisms in system analysis. Their main associated quantitative objectives are hitting probabilities, discounted sum, and mean payoff. Although there are many techniques for computing these objectives in general MCs/MDPs, they have not been thoroughly studied in terms of parameterized algorithms, particularly when treewidth is used as the parameter. This is in sharp contrast to qualitative objectives for MCs, MDPs and graph games, for which treewidth-based algorithms yield significant complexity improvements. In this work, we show that treewidth can also be used to obtain faster algorithms for the quantitative problems. For an MC with n states and m transitions, we show that each of the classical quantitative objectives can be computed in   O((n+m)⋅t2)  time, given a tree decomposition of the MC with width t. Our results also imply a bound of   O(κ⋅(n+m)⋅t2)  for each objective on MDPs, where   κ  is the number of strategy-iteration refinements required for the given input and objective. Finally, we make an experimental evaluation of our new algorithms on low-treewidth MCs and MDPs obtained from the DaCapo benchmark suite. Our experiments show that on low-treewidth MCs and MDPs, our algorithms outperform existing well-established methods by one or more orders of magnitude."}],"ddc":["000"],"conference":{"location":"Hanoi, Vietnam","start_date":"2020-10-19","name":"ATVA: Automated Technology for Verification and Analysis","end_date":"2020-10-23"},"publication":"Automated Technology for Verification and Analysis","volume":12302,"citation":{"ieee":"A. Asadi, K. Chatterjee, A. K. Goharshady, K. Mohammadi, and A. Pavlogiannis, “Faster algorithms for quantitative analysis of MCs and MDPs with small treewidth,” in <i>Automated Technology for Verification and Analysis</i>, Hanoi, Vietnam, 2020, vol. 12302, pp. 253–270.","apa":"Asadi, A., Chatterjee, K., Goharshady, A. K., Mohammadi, K., &#38; Pavlogiannis, A. (2020). Faster algorithms for quantitative analysis of MCs and MDPs with small treewidth. In <i>Automated Technology for Verification and Analysis</i> (Vol. 12302, pp. 253–270). Hanoi, Vietnam: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-030-59152-6_14\">https://doi.org/10.1007/978-3-030-59152-6_14</a>","ista":"Asadi A, Chatterjee K, Goharshady AK, Mohammadi K, Pavlogiannis A. 2020. Faster algorithms for quantitative analysis of MCs and MDPs with small treewidth. Automated Technology for Verification and Analysis. ATVA: Automated Technology for Verification and Analysis, LNCS, vol. 12302, 253–270.","mla":"Asadi, Ali, et al. “Faster Algorithms for Quantitative Analysis of MCs and MDPs with Small Treewidth.” <i>Automated Technology for Verification and Analysis</i>, vol. 12302, Springer Nature, 2020, pp. 253–70, doi:<a href=\"https://doi.org/10.1007/978-3-030-59152-6_14\">10.1007/978-3-030-59152-6_14</a>.","short":"A. Asadi, K. Chatterjee, A.K. Goharshady, K. Mohammadi, A. Pavlogiannis, in:, Automated Technology for Verification and Analysis, Springer Nature, 2020, pp. 253–270.","chicago":"Asadi, Ali, Krishnendu Chatterjee, Amir Kafshdar Goharshady, Kiarash Mohammadi, and Andreas Pavlogiannis. “Faster Algorithms for Quantitative Analysis of MCs and MDPs with Small Treewidth.” In <i>Automated Technology for Verification and Analysis</i>, 12302:253–70. Springer Nature, 2020. <a href=\"https://doi.org/10.1007/978-3-030-59152-6_14\">https://doi.org/10.1007/978-3-030-59152-6_14</a>.","ama":"Asadi A, Chatterjee K, Goharshady AK, Mohammadi K, Pavlogiannis A. Faster algorithms for quantitative analysis of MCs and MDPs with small treewidth. In: <i>Automated Technology for Verification and Analysis</i>. Vol 12302. Springer Nature; 2020:253-270. doi:<a href=\"https://doi.org/10.1007/978-3-030-59152-6_14\">10.1007/978-3-030-59152-6_14</a>"},"type":"conference","related_material":{"record":[{"status":"public","id":"8934","relation":"dissertation_contains"}]},"doi":"10.1007/978-3-030-59152-6_14","day":"12","publisher":"Springer Nature","page":"253-270","department":[{"_id":"KrCh"}],"date_created":"2020-11-06T07:30:05Z","file_date_updated":"2020-11-06T07:41:03Z","publication_identifier":{"eissn":["1611-3349"],"issn":["0302-9743"],"isbn":["9783030591519"],"eisbn":["9783030591526"]},"quality_controlled":"1","language":[{"iso":"eng"}],"intvolume":"     12302","external_id":{"isi":["000723555700014"]},"has_accepted_license":"1","date_updated":"2026-05-04T22:31:06Z"},{"abstract":[{"lang":"eng","text":"We show that nanophotonic structures enable the possibility of realizing lasers based on stimulated emission by free electrons. The associated threshold beam currents are in the nanoampere range, and could be realized in electron microscopes."}],"language":[{"iso":"eng"}],"quality_controlled":"1","scopus_import":"1","date_published":"2020-06-01T00:00:00Z","publication_identifier":{"eisbn":["9781943580767"],"issnl":["2162-2701"]},"status":"public","OA_type":"closed access","date_updated":"2026-05-05T06:49:40Z","conference":{"location":"Washington, DC, United States","start_date":"2020-05-10","name":"CLEO: Fundamental Science","end_date":"2020-05-15"},"publication_status":"published","date_created":"2026-03-30T12:22:48Z","author":[{"first_name":"Nicholas","full_name":"Rivera, Nicholas","last_name":"Rivera"},{"id":"e2e68fc9-6505-11ef-a541-eb4e72cc3e82","full_name":"Roques-Carmes, Charles","first_name":"Charles","last_name":"Roques-Carmes"},{"last_name":"Kaminer","first_name":"Ido","full_name":"Kaminer, Ido"},{"first_name":"Marin","full_name":"Soljačić, Marin","last_name":"Soljačić"}],"article_number":"FM2Q.3","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","_id":"21621","citation":{"mla":"Rivera, Nicholas, et al. “Toward Nanophotonic Free-Electron Lasers.” <i>Conference on Lasers and Electro-Optics</i>, FM2Q.3, Optica Publishing Group, 2020, doi:<a href=\"https://doi.org/10.1364/cleo_qels.2020.fm2q.3\">10.1364/cleo_qels.2020.fm2q.3</a>.","ista":"Rivera N, Roques-Carmes C, Kaminer I, Soljačić M. 2020. Toward nanophotonic free-electron lasers. Conference on Lasers and Electro-Optics. CLEO: Fundamental Science, FM2Q.3.","apa":"Rivera, N., Roques-Carmes, C., Kaminer, I., &#38; Soljačić, M. (2020). Toward nanophotonic free-electron lasers. In <i>Conference on Lasers and Electro-Optics</i>. Washington, DC, United States: Optica Publishing Group. <a href=\"https://doi.org/10.1364/cleo_qels.2020.fm2q.3\">https://doi.org/10.1364/cleo_qels.2020.fm2q.3</a>","ieee":"N. Rivera, C. Roques-Carmes, I. Kaminer, and M. Soljačić, “Toward nanophotonic free-electron lasers,” in <i>Conference on Lasers and Electro-Optics</i>, Washington, DC, United States, 2020.","short":"N. Rivera, C. Roques-Carmes, I. Kaminer, M. Soljačić, in:, Conference on Lasers and Electro-Optics, Optica Publishing Group, 2020.","chicago":"Rivera, Nicholas, Charles Roques-Carmes, Ido Kaminer, and Marin Soljačić. “Toward Nanophotonic Free-Electron Lasers.” In <i>Conference on Lasers and Electro-Optics</i>. Optica Publishing Group, 2020. <a href=\"https://doi.org/10.1364/cleo_qels.2020.fm2q.3\">https://doi.org/10.1364/cleo_qels.2020.fm2q.3</a>.","ama":"Rivera N, Roques-Carmes C, Kaminer I, Soljačić M. Toward nanophotonic free-electron lasers. In: <i>Conference on Lasers and Electro-Optics</i>. Optica Publishing Group; 2020. doi:<a href=\"https://doi.org/10.1364/cleo_qels.2020.fm2q.3\">10.1364/cleo_qels.2020.fm2q.3</a>"},"year":"2020","oa_version":"None","publisher":"Optica Publishing Group","day":"01","doi":"10.1364/cleo_qels.2020.fm2q.3","type":"conference","title":"Toward nanophotonic free-electron lasers","publication":"Conference on Lasers and Electro-Optics","article_processing_charge":"No","extern":"1","month":"06"}]
