[{"author":[{"full_name":"Zapata, Luis","last_name":"Zapata","first_name":"Luis"},{"first_name":"Oriol","last_name":"Pich","full_name":"Pich, Oriol"},{"full_name":"Serrano, Luis","last_name":"Serrano","first_name":"Luis"},{"last_name":"Kondrashov","first_name":"Fyodor","orcid":"0000-0001-8243-4694","id":"44FDEF62-F248-11E8-B48F-1D18A9856A87","full_name":"Kondrashov, Fyodor"},{"full_name":"Ossowski, Stephan","first_name":"Stephan","last_name":"Ossowski"},{"full_name":"Schaefer, Martin","last_name":"Schaefer","first_name":"Martin"}],"related_material":{"record":[{"relation":"used_in_publication","status":"public","id":"279"}]},"date_created":"2021-08-06T12:53:49Z","date_updated":"2023-09-13T09:01:31Z","oa_version":"Preprint","_id":"9811","year":"2018","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","title":"Additional file 1: Of negative selection in tumor genome evolution acts on essential cellular functions and the immunopeptidome","status":"public","publisher":"Springer Nature","department":[{"_id":"FyKo"}],"abstract":[{"lang":"eng","text":"This document contains additional supporting evidence presented as supplemental tables. (XLSX 50Â kb)"}],"type":"research_data_reference","date_published":"2018-05-31T00:00:00Z","doi":"10.6084/m9.figshare.6401390.v1","citation":{"short":"L. Zapata, O. Pich, L. Serrano, F. Kondrashov, S. Ossowski, M. Schaefer, (2018).","mla":"Zapata, Luis, et al. Additional File 1: Of Negative Selection in Tumor Genome Evolution Acts on Essential Cellular Functions and the Immunopeptidome. Springer Nature, 2018, doi:10.6084/m9.figshare.6401390.v1.","chicago":"Zapata, Luis, Oriol Pich, Luis Serrano, Fyodor Kondrashov, Stephan Ossowski, and Martin Schaefer. “Additional File 1: Of Negative Selection in Tumor Genome Evolution Acts on Essential Cellular Functions and the Immunopeptidome.” Springer Nature, 2018. https://doi.org/10.6084/m9.figshare.6401390.v1.","ama":"Zapata L, Pich O, Serrano L, Kondrashov F, Ossowski S, Schaefer M. Additional file 1: Of negative selection in tumor genome evolution acts on essential cellular functions and the immunopeptidome. 2018. doi:10.6084/m9.figshare.6401390.v1","apa":"Zapata, L., Pich, O., Serrano, L., Kondrashov, F., Ossowski, S., & Schaefer, M. (2018). Additional file 1: Of negative selection in tumor genome evolution acts on essential cellular functions and the immunopeptidome. Springer Nature. https://doi.org/10.6084/m9.figshare.6401390.v1","ieee":"L. Zapata, O. Pich, L. Serrano, F. Kondrashov, S. Ossowski, and M. Schaefer, “Additional file 1: Of negative selection in tumor genome evolution acts on essential cellular functions and the immunopeptidome.” Springer Nature, 2018.","ista":"Zapata L, Pich O, Serrano L, Kondrashov F, Ossowski S, Schaefer M. 2018. Additional file 1: Of negative selection in tumor genome evolution acts on essential cellular functions and the immunopeptidome, Springer Nature, 10.6084/m9.figshare.6401390.v1."},"main_file_link":[{"url":"https://doi.org/10.6084/m9.figshare.6401390.v1","open_access":"1"}],"oa":1,"day":"31","month":"05","article_processing_charge":"No"},{"type":"journal_article","abstract":[{"lang":"eng","text":"Background: Norepinephrine (NE) signaling has a key role in white adipose tissue (WAT) functions, including lipolysis, free fatty acid liberation and, under certain conditions, conversion of white into brite (brown-in-white) adipocytes. However, acute effects of NE stimulation have not been described at the transcriptional network level. Results: We used RNA-seq to uncover a broad transcriptional response. The inference of protein-protein and protein-DNA interaction networks allowed us to identify a set of immediate-early genes (IEGs) with high betweenness, validating our approach and suggesting a hierarchical control of transcriptional regulation. In addition, we identified a transcriptional regulatory network with IEGs as master regulators, including HSF1 and NFIL3 as novel NE-induced IEG candidates. Moreover, a functional enrichment analysis and gene clustering into functional modules suggest a crosstalk between metabolic, signaling, and immune responses. Conclusions: Altogether, our network biology approach explores for the first time the immediate-early systems level response of human adipocytes to acute sympathetic activation, thereby providing a first network basis of early cell fate programs and crosstalks between metabolic and transcriptional networks required for proper WAT function."}],"issue":"1","title":"Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes","ddc":["570"],"status":"public","intvolume":" 19","_id":"20","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","file":[{"access_level":"open_access","file_name":"2018_BMCGenomics_Higareda.pdf","file_size":4629784,"content_type":"application/pdf","creator":"dernst","relation":"main_file","file_id":"5712","checksum":"a56516e734dab589dc7f3e1915973b4d","date_updated":"2020-07-14T12:45:23Z","date_created":"2018-12-17T14:52:57Z"}],"oa_version":"Published Version","scopus_import":"1","day":"03","article_processing_charge":"No","has_accepted_license":"1","article_type":"original","publication":"BMC Genomics","citation":{"mla":"Higareda Almaraz, Juan, et al. “Norepinephrine Triggers an Immediate-Early Regulatory Network Response in Primary Human White Adipocytes.” BMC Genomics, vol. 19, no. 1, BioMed Central, 2018, doi:10.1186/s12864-018-5173-0.","short":"J. Higareda Almaraz, M. Karbiener, M. Giroud, F. Pauler, T. Gerhalter, S. Herzig, M. Scheideler, BMC Genomics 19 (2018).","chicago":"Higareda Almaraz, Juan, Michael Karbiener, Maude Giroud, Florian Pauler, Teresa Gerhalter, Stephan Herzig, and Marcel Scheideler. “Norepinephrine Triggers an Immediate-Early Regulatory Network Response in Primary Human White Adipocytes.” BMC Genomics. BioMed Central, 2018. https://doi.org/10.1186/s12864-018-5173-0.","ama":"Higareda Almaraz J, Karbiener M, Giroud M, et al. Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes. BMC Genomics. 2018;19(1). doi:10.1186/s12864-018-5173-0","ista":"Higareda Almaraz J, Karbiener M, Giroud M, Pauler F, Gerhalter T, Herzig S, Scheideler M. 2018. Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes. BMC Genomics. 19(1).","apa":"Higareda Almaraz, J., Karbiener, M., Giroud, M., Pauler, F., Gerhalter, T., Herzig, S., & Scheideler, M. (2018). Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes. BMC Genomics. BioMed Central. https://doi.org/10.1186/s12864-018-5173-0","ieee":"J. Higareda Almaraz et al., “Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes,” BMC Genomics, vol. 19, no. 1. BioMed Central, 2018."},"date_published":"2018-11-03T00:00:00Z","license":"https://creativecommons.org/licenses/by/4.0/","file_date_updated":"2020-07-14T12:45:23Z","publist_id":"8035","publication_status":"published","department":[{"_id":"SiHi"}],"publisher":"BioMed Central","acknowledgement":"This work was funded by the German Centre for Diabetes Research (DZD) and the Austrian Science Fund (FWF, P25729-B19).","year":"2018","date_created":"2018-12-11T11:44:12Z","date_updated":"2023-09-13T09:10:47Z","volume":19,"author":[{"full_name":"Higareda Almaraz, Juan","last_name":"Higareda Almaraz","first_name":"Juan"},{"last_name":"Karbiener","first_name":"Michael","full_name":"Karbiener, Michael"},{"full_name":"Giroud, Maude","first_name":"Maude","last_name":"Giroud"},{"full_name":"Pauler, Florian","id":"48EA0138-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-7462-0048","first_name":"Florian","last_name":"Pauler"},{"full_name":"Gerhalter, Teresa","last_name":"Gerhalter","first_name":"Teresa"},{"first_name":"Stephan","last_name":"Herzig","full_name":"Herzig, Stephan"},{"last_name":"Scheideler","first_name":"Marcel","full_name":"Scheideler, Marcel"}],"related_material":{"record":[{"relation":"research_data","status":"public","id":"9807"},{"id":"9808","relation":"research_data","status":"public"}]},"month":"11","publication_identifier":{"issn":["1471-2164"]},"quality_controlled":"1","isi":1,"external_id":{"isi":["000450976700002"]},"tmp":{"name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","short":"CC BY (4.0)","image":"/images/cc_by.png"},"oa":1,"language":[{"iso":"eng"}],"doi":"10.1186/s12864-018-5173-0"},{"day":"01","article_processing_charge":"No","scopus_import":"1","date_published":"2018-08-01T00:00:00Z","article_type":"original","publication":"Journal of the ACM","citation":{"ama":"Dziembowski S, Pietrzak KZ, Wichs D. Non-malleable codes. Journal of the ACM. 2018;65(4). doi:10.1145/3178432","apa":"Dziembowski, S., Pietrzak, K. Z., & Wichs, D. (2018). Non-malleable codes. Journal of the ACM. ACM. https://doi.org/10.1145/3178432","ieee":"S. Dziembowski, K. Z. Pietrzak, and D. Wichs, “Non-malleable codes,” Journal of the ACM, vol. 65, no. 4. ACM, 2018.","ista":"Dziembowski S, Pietrzak KZ, Wichs D. 2018. Non-malleable codes. Journal of the ACM. 65(4), 20.","short":"S. Dziembowski, K.Z. Pietrzak, D. Wichs, Journal of the ACM 65 (2018).","mla":"Dziembowski, Stefan, et al. “Non-Malleable Codes.” Journal of the ACM, vol. 65, no. 4, 20, ACM, 2018, doi:10.1145/3178432.","chicago":"Dziembowski, Stefan, Krzysztof Z Pietrzak, and Daniel Wichs. “Non-Malleable Codes.” Journal of the ACM. ACM, 2018. https://doi.org/10.1145/3178432."},"abstract":[{"text":"We introduce the notion of “non-malleable codes” which relaxes the notion of error correction and error detection. Informally, a code is non-malleable if the message contained in a modified codeword is either the original message, or a completely unrelated value. In contrast to error correction and error detection, non-malleability can be achieved for very rich classes of modifications. We construct an efficient code that is non-malleable with respect to modifications that affect each bit of the codeword arbitrarily (i.e., leave it untouched, flip it, or set it to either 0 or 1), but independently of the value of the other bits of the codeword. Using the probabilistic method, we also show a very strong and general statement: there exists a non-malleable code for every “small enough” family F of functions via which codewords can be modified. Although this probabilistic method argument does not directly yield efficient constructions, it gives us efficient non-malleable codes in the random-oracle model for very general classes of tampering functions—e.g., functions where every bit in the tampered codeword can depend arbitrarily on any 99% of the bits in the original codeword. As an application of non-malleable codes, we show that they provide an elegant algorithmic solution to the task of protecting functionalities implemented in hardware (e.g., signature cards) against “tampering attacks.” In such attacks, the secret state of a physical system is tampered, in the hopes that future interaction with the modified system will reveal some secret information. This problem was previously studied in the work of Gennaro et al. in 2004 under the name “algorithmic tamper proof security” (ATP). We show that non-malleable codes can be used to achieve important improvements over the prior work. In particular, we show that any functionality can be made secure against a large class of tampering attacks, simply by encoding the secret state with a non-malleable code while it is stored in memory.","lang":"eng"}],"issue":"4","type":"journal_article","oa_version":"Preprint","status":"public","title":"Non-malleable codes","intvolume":" 65","_id":"107","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","month":"08","language":[{"iso":"eng"}],"doi":"10.1145/3178432","isi":1,"quality_controlled":"1","project":[{"grant_number":"682815","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","name":"Teaching Old Crypto New Tricks","call_identifier":"H2020"},{"name":"Provable Security for Physical Cryptography","call_identifier":"FP7","grant_number":"259668","_id":"258C570E-B435-11E9-9278-68D0E5697425"}],"main_file_link":[{"url":"https://eprint.iacr.org/2009/608","open_access":"1"}],"oa":1,"external_id":{"isi":["000442938200004"]},"publist_id":"7947","ec_funded":1,"article_number":"20","date_created":"2018-12-11T11:44:40Z","date_updated":"2023-09-13T09:05:17Z","volume":65,"author":[{"last_name":"Dziembowski","first_name":"Stefan","full_name":"Dziembowski, Stefan"},{"full_name":"Pietrzak, Krzysztof Z","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9139-1654","first_name":"Krzysztof Z","last_name":"Pietrzak"},{"full_name":"Wichs, Daniel","first_name":"Daniel","last_name":"Wichs"}],"publication_status":"published","department":[{"_id":"KrPi"}],"publisher":"ACM","year":"2018"},{"publication_identifier":{"issn":["00219525"]},"month":"12","project":[{"_id":"25681D80-B435-11E9-9278-68D0E5697425","grant_number":"291734","name":"International IST Postdoc Fellowship Programme","call_identifier":"FP7"}],"isi":1,"quality_controlled":"1","oa":1,"main_file_link":[{"url":"https://www.ncbi.nlm.nih.gov/pubmed/30228162","open_access":"1"}],"external_id":{"isi":["000451960800018"],"pmid":["30228162 "]},"language":[{"iso":"eng"}],"doi":"10.1083/jcb.201804048","ec_funded":1,"publisher":"Rockefeller University Press","department":[{"_id":"CaHe"}],"publication_status":"published","pmid":1,"year":"2018","volume":217,"date_updated":"2023-09-13T09:11:17Z","date_created":"2018-12-16T22:59:19Z","author":[{"full_name":"Carvalho, Lara","first_name":"Lara","last_name":"Carvalho"},{"full_name":"Patricio, Pedro","first_name":"Pedro","last_name":"Patricio"},{"full_name":"Ponte, Susana","first_name":"Susana","last_name":"Ponte"},{"full_name":"Heisenberg, Carl-Philipp J","orcid":"0000-0002-0912-4566","id":"39427864-F248-11E8-B48F-1D18A9856A87","last_name":"Heisenberg","first_name":"Carl-Philipp J"},{"first_name":"Luis","last_name":"Almeida","full_name":"Almeida, Luis"},{"first_name":"André S.","last_name":"Nunes","full_name":"Nunes, André S."},{"first_name":"Nuno A.M.","last_name":"Araújo","full_name":"Araújo, Nuno A.M."},{"last_name":"Jacinto","first_name":"Antonio","full_name":"Jacinto, Antonio"}],"scopus_import":"1","article_processing_charge":"No","day":"01","page":"4267-4283","citation":{"chicago":"Carvalho, Lara, Pedro Patricio, Susana Ponte, Carl-Philipp J Heisenberg, Luis Almeida, André S. Nunes, Nuno A.M. Araújo, and Antonio Jacinto. “Occluding Junctions as Novel Regulators of Tissue Mechanics during Wound Repair.” Journal of Cell Biology. Rockefeller University Press, 2018. https://doi.org/10.1083/jcb.201804048.","mla":"Carvalho, Lara, et al. “Occluding Junctions as Novel Regulators of Tissue Mechanics during Wound Repair.” Journal of Cell Biology, vol. 217, no. 12, Rockefeller University Press, 2018, pp. 4267–83, doi:10.1083/jcb.201804048.","short":"L. Carvalho, P. Patricio, S. Ponte, C.-P.J. Heisenberg, L. Almeida, A.S. Nunes, N.A.M. Araújo, A. Jacinto, Journal of Cell Biology 217 (2018) 4267–4283.","ista":"Carvalho L, Patricio P, Ponte S, Heisenberg C-PJ, Almeida L, Nunes AS, Araújo NAM, Jacinto A. 2018. Occluding junctions as novel regulators of tissue mechanics during wound repair. Journal of Cell Biology. 217(12), 4267–4283.","apa":"Carvalho, L., Patricio, P., Ponte, S., Heisenberg, C.-P. J., Almeida, L., Nunes, A. S., … Jacinto, A. (2018). Occluding junctions as novel regulators of tissue mechanics during wound repair. Journal of Cell Biology. Rockefeller University Press. https://doi.org/10.1083/jcb.201804048","ieee":"L. Carvalho et al., “Occluding junctions as novel regulators of tissue mechanics during wound repair,” Journal of Cell Biology, vol. 217, no. 12. Rockefeller University Press, pp. 4267–4283, 2018.","ama":"Carvalho L, Patricio P, Ponte S, et al. Occluding junctions as novel regulators of tissue mechanics during wound repair. Journal of Cell Biology. 2018;217(12):4267-4283. doi:10.1083/jcb.201804048"},"publication":"Journal of Cell Biology","date_published":"2018-12-01T00:00:00Z","type":"journal_article","issue":"12","abstract":[{"lang":"eng","text":"In epithelial tissues, cells tightly connect to each other through cell–cell junctions, but they also present the remarkable capacity of reorganizing themselves without compromising tissue integrity. Upon injury, simple epithelia efficiently resolve small lesions through the action of actin cytoskeleton contractile structures at the wound edge and cellular rearrangements. However, the underlying mechanisms and how they cooperate are still poorly understood. In this study, we combine live imaging and theoretical modeling to reveal a novel and indispensable role for occluding junctions (OJs) in this process. We demonstrate that OJ loss of function leads to defects in wound-closure dynamics: instead of contracting, wounds dramatically increase their area. OJ mutants exhibit phenotypes in cell shape, cellular rearrangements, and mechanical properties as well as in actin cytoskeleton dynamics at the wound edge. We propose that OJs are essential for wound closure by impacting on epithelial mechanics at the tissue level, which in turn is crucial for correct regulation of the cellular events occurring at the wound edge."}],"intvolume":" 217","status":"public","title":"Occluding junctions as novel regulators of tissue mechanics during wound repair","_id":"5676","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","oa_version":"Submitted Version"},{"related_material":{"record":[{"id":"20","relation":"used_in_publication","status":"public"}]},"author":[{"last_name":"Higareda Almaraz","first_name":"Juan","full_name":"Higareda Almaraz, Juan"},{"first_name":"Michael","last_name":"Karbiener","full_name":"Karbiener, Michael"},{"last_name":"Giroud","first_name":"Maude","full_name":"Giroud, Maude"},{"first_name":"Florian","last_name":"Pauler","id":"48EA0138-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-7462-0048","full_name":"Pauler, Florian"},{"full_name":"Gerhalter, Teresa","first_name":"Teresa","last_name":"Gerhalter"},{"full_name":"Herzig, Stephan","last_name":"Herzig","first_name":"Stephan"},{"full_name":"Scheideler, Marcel","last_name":"Scheideler","first_name":"Marcel"}],"oa_version":"Published Version","date_created":"2021-08-06T12:26:53Z","date_updated":"2023-09-13T09:10:47Z","year":"2018","_id":"9807","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","publisher":"Springer Nature","department":[{"_id":"SiHi"}],"title":"Additional file 1: Of Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes","status":"public","abstract":[{"text":"Table S1. Genes with highest betweenness. Table S2. Local and Master regulators up-regulated. Table S3. Local and Master regulators down-regulated (XLSX 23 kb).","lang":"eng"}],"type":"research_data_reference","doi":"10.6084/m9.figshare.7295339.v1","date_published":"2018-11-03T00:00:00Z","main_file_link":[{"url":"https://doi.org/10.6084/m9.figshare.7295339.v1","open_access":"1"}],"oa":1,"citation":{"mla":"Higareda Almaraz, Juan, et al. Additional File 1: Of Norepinephrine Triggers an Immediate-Early Regulatory Network Response in Primary Human White Adipocytes. Springer Nature, 2018, doi:10.6084/m9.figshare.7295339.v1.","short":"J. Higareda Almaraz, M. Karbiener, M. Giroud, F. Pauler, T. Gerhalter, S. Herzig, M. Scheideler, (2018).","chicago":"Higareda Almaraz, Juan, Michael Karbiener, Maude Giroud, Florian Pauler, Teresa Gerhalter, Stephan Herzig, and Marcel Scheideler. “Additional File 1: Of Norepinephrine Triggers an Immediate-Early Regulatory Network Response in Primary Human White Adipocytes.” Springer Nature, 2018. https://doi.org/10.6084/m9.figshare.7295339.v1.","ama":"Higareda Almaraz J, Karbiener M, Giroud M, et al. Additional file 1: Of Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes. 2018. doi:10.6084/m9.figshare.7295339.v1","ista":"Higareda Almaraz J, Karbiener M, Giroud M, Pauler F, Gerhalter T, Herzig S, Scheideler M. 2018. Additional file 1: Of Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes, Springer Nature, 10.6084/m9.figshare.7295339.v1.","ieee":"J. Higareda Almaraz et al., “Additional file 1: Of Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes.” Springer Nature, 2018.","apa":"Higareda Almaraz, J., Karbiener, M., Giroud, M., Pauler, F., Gerhalter, T., Herzig, S., & Scheideler, M. (2018). Additional file 1: Of Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes. Springer Nature. https://doi.org/10.6084/m9.figshare.7295339.v1"},"article_processing_charge":"No","day":"03","month":"11"},{"date_published":"2018-11-03T00:00:00Z","doi":"10.6084/m9.figshare.7295369.v1","citation":{"ama":"Higareda Almaraz J, Karbiener M, Giroud M, et al. Additional file 3: Of Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes. 2018. doi:10.6084/m9.figshare.7295369.v1","ista":"Higareda Almaraz J, Karbiener M, Giroud M, Pauler F, Gerhalter T, Herzig S, Scheideler M. 2018. Additional file 3: Of Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes, Springer Nature, 10.6084/m9.figshare.7295369.v1.","apa":"Higareda Almaraz, J., Karbiener, M., Giroud, M., Pauler, F., Gerhalter, T., Herzig, S., & Scheideler, M. (2018). Additional file 3: Of Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes. Springer Nature. https://doi.org/10.6084/m9.figshare.7295369.v1","ieee":"J. Higareda Almaraz et al., “Additional file 3: Of Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes.” Springer Nature, 2018.","mla":"Higareda Almaraz, Juan, et al. Additional File 3: Of Norepinephrine Triggers an Immediate-Early Regulatory Network Response in Primary Human White Adipocytes. Springer Nature, 2018, doi:10.6084/m9.figshare.7295369.v1.","short":"J. Higareda Almaraz, M. Karbiener, M. Giroud, F. Pauler, T. Gerhalter, S. Herzig, M. Scheideler, (2018).","chicago":"Higareda Almaraz, Juan, Michael Karbiener, Maude Giroud, Florian Pauler, Teresa Gerhalter, Stephan Herzig, and Marcel Scheideler. “Additional File 3: Of Norepinephrine Triggers an Immediate-Early Regulatory Network Response in Primary Human White Adipocytes.” Springer Nature, 2018. https://doi.org/10.6084/m9.figshare.7295369.v1."},"oa":1,"main_file_link":[{"open_access":"1","url":"https://doi.org/10.6084/m9.figshare.7295369.v1"}],"day":"03","month":"11","article_processing_charge":"No","date_created":"2021-08-06T12:31:57Z","date_updated":"2023-09-13T09:10:47Z","oa_version":"Published Version","author":[{"last_name":"Higareda Almaraz","first_name":"Juan","full_name":"Higareda Almaraz, Juan"},{"full_name":"Karbiener, Michael","first_name":"Michael","last_name":"Karbiener"},{"first_name":"Maude","last_name":"Giroud","full_name":"Giroud, Maude"},{"full_name":"Pauler, Florian","last_name":"Pauler","first_name":"Florian","orcid":"0000-0002-7462-0048","id":"48EA0138-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Gerhalter","first_name":"Teresa","full_name":"Gerhalter, Teresa"},{"last_name":"Herzig","first_name":"Stephan","full_name":"Herzig, Stephan"},{"last_name":"Scheideler","first_name":"Marcel","full_name":"Scheideler, Marcel"}],"related_material":{"record":[{"relation":"used_in_publication","status":"public","id":"20"}]},"title":"Additional file 3: Of Norepinephrine triggers an immediate-early regulatory network response in primary human white adipocytes","status":"public","department":[{"_id":"SiHi"}],"publisher":"Springer Nature","_id":"9808","year":"2018","user_id":"6785fbc1-c503-11eb-8a32-93094b40e1cf","abstract":[{"lang":"eng","text":"Table S4. Counts per Gene per Million Reads Mapped. (XLSX 2751 kb)."}],"type":"research_data_reference"},{"page":"51 - 65","citation":{"mla":"Alwen, Joel F., et al. “On the Memory Hardness of Data Independent Password Hashing Functions.” Proceedings of the 2018 on Asia Conference on Computer and Communication Security, ACM, 2018, pp. 51–65, doi:10.1145/3196494.3196534.","short":"J.F. Alwen, P. Gazi, C. Kamath Hosdurg, K. Klein, G.F. Osang, K.Z. Pietrzak, L. Reyzin, M. Rolinek, M. Rybar, in:, Proceedings of the 2018 on Asia Conference on Computer and Communication Security, ACM, 2018, pp. 51–65.","chicago":"Alwen, Joel F, Peter Gazi, Chethan Kamath Hosdurg, Karen Klein, Georg F Osang, Krzysztof Z Pietrzak, Lenoid Reyzin, Michal Rolinek, and Michal Rybar. “On the Memory Hardness of Data Independent Password Hashing Functions.” In Proceedings of the 2018 on Asia Conference on Computer and Communication Security, 51–65. ACM, 2018. https://doi.org/10.1145/3196494.3196534.","ama":"Alwen JF, Gazi P, Kamath Hosdurg C, et al. On the memory hardness of data independent password hashing functions. In: Proceedings of the 2018 on Asia Conference on Computer and Communication Security. ACM; 2018:51-65. doi:10.1145/3196494.3196534","ista":"Alwen JF, Gazi P, Kamath Hosdurg C, Klein K, Osang GF, Pietrzak KZ, Reyzin L, Rolinek M, Rybar M. 2018. On the memory hardness of data independent password hashing functions. Proceedings of the 2018 on Asia Conference on Computer and Communication Security. ASIACCS: Asia Conference on Computer and Communications Security , 51–65.","apa":"Alwen, J. F., Gazi, P., Kamath Hosdurg, C., Klein, K., Osang, G. F., Pietrzak, K. Z., … Rybar, M. (2018). On the memory hardness of data independent password hashing functions. In Proceedings of the 2018 on Asia Conference on Computer and Communication Security (pp. 51–65). Incheon, Republic of Korea: ACM. https://doi.org/10.1145/3196494.3196534","ieee":"J. F. Alwen et al., “On the memory hardness of data independent password hashing functions,” in Proceedings of the 2018 on Asia Conference on Computer and Communication Security, Incheon, Republic of Korea, 2018, pp. 51–65."},"publication":"Proceedings of the 2018 on Asia Conference on Computer and Communication Security","date_published":"2018-06-01T00:00:00Z","scopus_import":"1","article_processing_charge":"No","day":"01","status":"public","title":"On the memory hardness of data independent password hashing functions","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","_id":"193","oa_version":"Submitted Version","type":"conference","abstract":[{"text":"We show attacks on five data-independent memory-hard functions (iMHF) that were submitted to the password hashing competition (PHC). Informally, an MHF is a function which cannot be evaluated on dedicated hardware, like ASICs, at significantly lower hardware and/or energy cost than evaluating a single instance on a standard single-core architecture. Data-independent means the memory access pattern of the function is independent of the input; this makes iMHFs harder to construct than data-dependent ones, but the latter can be attacked by various side-channel attacks. Following [Alwen-Blocki'16], we capture the evaluation of an iMHF as a directed acyclic graph (DAG). The cumulative parallel pebbling complexity of this DAG is a measure for the hardware cost of evaluating the iMHF on an ASIC. Ideally, one would like the complexity of a DAG underlying an iMHF to be as close to quadratic in the number of nodes of the graph as possible. Instead, we show that (the DAGs underlying) the following iMHFs are far from this bound: Rig.v2, TwoCats and Gambit each having an exponent no more than 1.75. Moreover, we show that the complexity of the iMHF modes of the PHC finalists Pomelo and Lyra2 have exponents at most 1.83 and 1.67 respectively. To show this we investigate a combinatorial property of each underlying DAG (called its depth-robustness. By establishing upper bounds on this property we are then able to apply the general technique of [Alwen-Block'16] for analyzing the hardware costs of an iMHF.","lang":"eng"}],"project":[{"grant_number":"616160","_id":"25FBA906-B435-11E9-9278-68D0E5697425","name":"Discrete Optimization in Computer Vision: Theory and Practice","call_identifier":"FP7"},{"name":"Teaching Old Crypto New Tricks","call_identifier":"H2020","grant_number":"682815","_id":"258AA5B2-B435-11E9-9278-68D0E5697425"}],"quality_controlled":"1","isi":1,"oa":1,"main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2016/783"}],"external_id":{"isi":["000516620100005"]},"language":[{"iso":"eng"}],"doi":"10.1145/3196494.3196534","conference":{"name":"ASIACCS: Asia Conference on Computer and Communications Security ","end_date":"2018-06-08","start_date":"2018-06-04","location":"Incheon, Republic of Korea"},"month":"06","department":[{"_id":"KrPi"},{"_id":"HeEd"},{"_id":"VlKo"}],"publisher":"ACM","publication_status":"published","acknowledgement":"Leonid Reyzin was supported in part by IST Austria and by US NSF grants 1012910, 1012798, and 1422965; this research was performed while he was visiting IST Austria.","year":"2018","date_created":"2018-12-11T11:45:07Z","date_updated":"2023-09-13T09:13:12Z","author":[{"id":"2A8DFA8C-F248-11E8-B48F-1D18A9856A87","first_name":"Joel F","last_name":"Alwen","full_name":"Alwen, Joel F"},{"last_name":"Gazi","first_name":"Peter","full_name":"Gazi, Peter"},{"full_name":"Kamath Hosdurg, Chethan","id":"4BD3F30E-F248-11E8-B48F-1D18A9856A87","last_name":"Kamath Hosdurg","first_name":"Chethan"},{"first_name":"Karen","last_name":"Klein","id":"3E83A2F8-F248-11E8-B48F-1D18A9856A87","full_name":"Klein, Karen"},{"full_name":"Osang, Georg F","id":"464B40D6-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-8882-5116","first_name":"Georg F","last_name":"Osang"},{"full_name":"Pietrzak, Krzysztof Z","last_name":"Pietrzak","first_name":"Krzysztof Z","orcid":"0000-0002-9139-1654","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87"},{"full_name":"Reyzin, Lenoid","first_name":"Lenoid","last_name":"Reyzin"},{"id":"3CB3BC06-F248-11E8-B48F-1D18A9856A87","last_name":"Rolinek","first_name":"Michal","full_name":"Rolinek, Michal"},{"last_name":"Rybar","first_name":"Michal","id":"2B3E3DE8-F248-11E8-B48F-1D18A9856A87","full_name":"Rybar, Michal"}],"publist_id":"7723","ec_funded":1},{"oa_version":"Submitted Version","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","_id":"300","status":"public","title":"On the bit security of cryptographic primitives","intvolume":" 10820","abstract":[{"lang":"eng","text":"We introduce a formal quantitative notion of “bit security” for a general type of cryptographic games (capturing both decision and search problems), aimed at capturing the intuition that a cryptographic primitive with k-bit security is as hard to break as an ideal cryptographic function requiring a brute force attack on a k-bit key space. Our new definition matches the notion of bit security commonly used by cryptographers and cryptanalysts when studying search (e.g., key recovery) problems, where the use of the traditional definition is well established. However, it produces a quantitatively different metric in the case of decision (indistinguishability) problems, where the use of (a straightforward generalization of) the traditional definition is more problematic and leads to a number of paradoxical situations or mismatches between theoretical/provable security and practical/common sense intuition. Key to our new definition is to consider adversaries that may explicitly declare failure of the attack. We support and justify the new definition by proving a number of technical results, including tight reductions between several standard cryptographic problems, a new hybrid theorem that preserves bit security, and an application to the security analysis of indistinguishability primitives making use of (approximate) floating point numbers. This is the first result showing that (standard precision) 53-bit floating point numbers can be used to achieve 100-bit security in the context of cryptographic primitives with general indistinguishability-based security definitions. Previous results of this type applied only to search problems, or special types of decision problems."}],"type":"conference","alternative_title":["LNCS"],"date_published":"2018-03-31T00:00:00Z","citation":{"ista":"Micciancio D, Walter M. 2018. On the bit security of cryptographic primitives. Eurocrypt: Advances in Cryptology, LNCS, vol. 10820, 3–28.","apa":"Micciancio, D., & Walter, M. (2018). On the bit security of cryptographic primitives (Vol. 10820, pp. 3–28). Presented at the Eurocrypt: Advances in Cryptology, Tel Aviv, Israel: Springer. https://doi.org/10.1007/978-3-319-78381-9_1","ieee":"D. Micciancio and M. Walter, “On the bit security of cryptographic primitives,” presented at the Eurocrypt: Advances in Cryptology, Tel Aviv, Israel, 2018, vol. 10820, pp. 3–28.","ama":"Micciancio D, Walter M. On the bit security of cryptographic primitives. In: Vol 10820. Springer; 2018:3-28. doi:10.1007/978-3-319-78381-9_1","chicago":"Micciancio, Daniele, and Michael Walter. “On the Bit Security of Cryptographic Primitives,” 10820:3–28. Springer, 2018. https://doi.org/10.1007/978-3-319-78381-9_1.","mla":"Micciancio, Daniele, and Michael Walter. On the Bit Security of Cryptographic Primitives. Vol. 10820, Springer, 2018, pp. 3–28, doi:10.1007/978-3-319-78381-9_1.","short":"D. Micciancio, M. Walter, in:, Springer, 2018, pp. 3–28."},"page":"3 - 28","day":"31","article_processing_charge":"No","scopus_import":"1","author":[{"first_name":"Daniele","last_name":"Micciancio","full_name":"Micciancio, Daniele"},{"first_name":"Michael","last_name":"Walter","id":"488F98B0-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0003-3186-2482","full_name":"Walter, Michael"}],"date_created":"2018-12-11T11:45:42Z","date_updated":"2023-09-13T09:12:04Z","volume":10820,"acknowledgement":"Research supported in part by the Defense Advanced Research Projects Agency (DARPA) and the U.S. Army Research Office under the SafeWare program. Opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views, position or policy of the Government. The second author was also supported by the European Research Council, ERC consolidator grant (682815 - TOCNeT).","year":"2018","publication_status":"published","department":[{"_id":"KrPi"}],"publisher":"Springer","ec_funded":1,"publist_id":"7581","conference":{"location":"Tel Aviv, Israel","start_date":"2018-04-29","end_date":"2018-05-03","name":"Eurocrypt: Advances in Cryptology"},"doi":"10.1007/978-3-319-78381-9_1","language":[{"iso":"eng"}],"main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2018/077"}],"oa":1,"external_id":{"isi":["000517097500001"]},"quality_controlled":"1","isi":1,"project":[{"name":"Teaching Old Crypto New Tricks","call_identifier":"H2020","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","grant_number":"682815"}],"month":"03"},{"type":"journal_article","abstract":[{"text":"Motivated by biological questions, we study configurations of equal spheres that neither pack nor cover. Placing their centers on a lattice, we define the soft density of the configuration by penalizing multiple overlaps. Considering the 1-parameter family of diagonally distorted 3-dimensional integer lattices, we show that the soft density is maximized at the FCC lattice.","lang":"eng"}],"issue":"1","status":"public","title":"On the optimality of the FCC lattice for soft sphere packing","intvolume":" 32","_id":"312","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","oa_version":"Submitted Version","scopus_import":"1","day":"29","article_processing_charge":"No","article_type":"original","page":"750 - 782","publication":"SIAM J Discrete Math","citation":{"short":"H. Edelsbrunner, M. Iglesias Ham, SIAM J Discrete Math 32 (2018) 750–782.","mla":"Edelsbrunner, Herbert, and Mabel Iglesias Ham. “On the Optimality of the FCC Lattice for Soft Sphere Packing.” SIAM J Discrete Math, vol. 32, no. 1, Society for Industrial and Applied Mathematics , 2018, pp. 750–82, doi:10.1137/16M1097201.","chicago":"Edelsbrunner, Herbert, and Mabel Iglesias Ham. “On the Optimality of the FCC Lattice for Soft Sphere Packing.” SIAM J Discrete Math. Society for Industrial and Applied Mathematics , 2018. https://doi.org/10.1137/16M1097201.","ama":"Edelsbrunner H, Iglesias Ham M. On the optimality of the FCC lattice for soft sphere packing. SIAM J Discrete Math. 2018;32(1):750-782. doi:10.1137/16M1097201","apa":"Edelsbrunner, H., & Iglesias Ham, M. (2018). On the optimality of the FCC lattice for soft sphere packing. SIAM J Discrete Math. Society for Industrial and Applied Mathematics . https://doi.org/10.1137/16M1097201","ieee":"H. Edelsbrunner and M. Iglesias Ham, “On the optimality of the FCC lattice for soft sphere packing,” SIAM J Discrete Math, vol. 32, no. 1. Society for Industrial and Applied Mathematics , pp. 750–782, 2018.","ista":"Edelsbrunner H, Iglesias Ham M. 2018. On the optimality of the FCC lattice for soft sphere packing. SIAM J Discrete Math. 32(1), 750–782."},"date_published":"2018-03-29T00:00:00Z","publist_id":"7553","publication_status":"published","publisher":"Society for Industrial and Applied Mathematics ","department":[{"_id":"HeEd"}],"year":"2018","acknowledgement":"This work was partially supported by the DFG Collaborative Research Center TRR 109, “Discretization in Geometry and Dynamics,” through grant I02979-N35 of the Austrian Science Fund (FWF).","date_updated":"2023-09-13T09:34:38Z","date_created":"2018-12-11T11:45:46Z","volume":32,"author":[{"first_name":"Herbert","last_name":"Edelsbrunner","id":"3FB178DA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9823-6833","full_name":"Edelsbrunner, Herbert"},{"full_name":"Iglesias Ham, Mabel","last_name":"Iglesias Ham","first_name":"Mabel","id":"41B58C0C-F248-11E8-B48F-1D18A9856A87"}],"month":"03","publication_identifier":{"issn":["08954801"]},"isi":1,"quality_controlled":"1","project":[{"name":"Persistence and stability of geometric complexes","call_identifier":"FWF","_id":"2561EBF4-B435-11E9-9278-68D0E5697425","grant_number":"I02979-N35"}],"oa":1,"main_file_link":[{"open_access":"1","url":"http://pdfs.semanticscholar.org/d2d5/6da00fbc674e6a8b1bb9d857167e54200dc6.pdf"}],"external_id":{"isi":["000428958900038"]},"language":[{"iso":"eng"}],"doi":"10.1137/16M1097201"},{"publist_id":"7420","author":[{"last_name":"Akopyan","first_name":"Arseniy","orcid":"0000-0002-2548-617X","id":"430D2C90-F248-11E8-B48F-1D18A9856A87","full_name":"Akopyan, Arseniy"}],"date_updated":"2023-09-13T09:34:12Z","date_created":"2018-12-11T11:46:19Z","volume":356,"year":"2018","publication_status":"published","publisher":"Elsevier","department":[{"_id":"HeEd"}],"month":"04","publication_identifier":{"issn":["1631073X"]},"doi":"10.1016/j.crma.2018.03.005","language":[{"iso":"eng"}],"external_id":{"arxiv":["1805.01652"],"isi":["000430402700009"]},"oa":1,"main_file_link":[{"open_access":"1","url":"https://arxiv.org/abs/1805.01652"}],"quality_controlled":"1","isi":1,"abstract":[{"text":"We give a simple proof of T. Stehling's result [4], whereby in any normal tiling of the plane with convex polygons with number of sides not less than six, all tiles except a finite number are hexagons.","lang":"eng"}],"issue":"4","type":"journal_article","oa_version":"Preprint","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","_id":"409","status":"public","title":"On the number of non-hexagons in a planar tiling","intvolume":" 356","day":"01","article_processing_charge":"No","scopus_import":"1","date_published":"2018-04-01T00:00:00Z","publication":"Comptes Rendus Mathematique","citation":{"chicago":"Akopyan, Arseniy. “On the Number of Non-Hexagons in a Planar Tiling.” Comptes Rendus Mathematique. Elsevier, 2018. https://doi.org/10.1016/j.crma.2018.03.005.","mla":"Akopyan, Arseniy. “On the Number of Non-Hexagons in a Planar Tiling.” Comptes Rendus Mathematique, vol. 356, no. 4, Elsevier, 2018, pp. 412–14, doi:10.1016/j.crma.2018.03.005.","short":"A. Akopyan, Comptes Rendus Mathematique 356 (2018) 412–414.","ista":"Akopyan A. 2018. On the number of non-hexagons in a planar tiling. Comptes Rendus Mathematique. 356(4), 412–414.","ieee":"A. Akopyan, “On the number of non-hexagons in a planar tiling,” Comptes Rendus Mathematique, vol. 356, no. 4. Elsevier, pp. 412–414, 2018.","apa":"Akopyan, A. (2018). On the number of non-hexagons in a planar tiling. Comptes Rendus Mathematique. Elsevier. https://doi.org/10.1016/j.crma.2018.03.005","ama":"Akopyan A. On the number of non-hexagons in a planar tiling. Comptes Rendus Mathematique. 2018;356(4):412-414. doi:10.1016/j.crma.2018.03.005"},"article_type":"original","page":"412-414"}]