---
_id: '3843'
abstract:
- lang: eng
  text: "We simulate light scattering by random irregular particles that have dimensions
    much larger than the wavelength of incident light at the size parameter of \U0001D44B=200
    using the discontinuous Galerkin time domain method. A comparison of the DGTD
    solution for smoothly faceted particles with that obtained with a geometric optics
    model shows good agreement for the scattering angle curves of intensity and polarization.
    If a wavelength-scale surface roughness is introduced, diffuse scattering at rough
    interface results in smooth and featureless curves for all scattering matrix elements
    which is consistent with the laboratory measurements of real samples."
article_type: original
author:
- first_name: Yevgen
  full_name: Grynko, Yevgen
  id: '26059'
  last_name: Grynko
- first_name: Yuriy
  full_name: Shkuratov, Yuriy
  last_name: Shkuratov
- first_name: Jens
  full_name: Förstner, Jens
  id: '158'
  last_name: Förstner
  orcid: 0000-0001-7059-9862
citation:
  ama: Grynko Y, Shkuratov Y, Förstner J. Light scattering by irregular particles
    much larger than the wavelength with wavelength-scale surface roughness. <i>Optics
    Letters</i>. 2016;41(15):3491-3493. doi:<a href="https://doi.org/10.1364/ol.41.003491">10.1364/ol.41.003491</a>
  apa: Grynko, Y., Shkuratov, Y., &#38; Förstner, J. (2016). Light scattering by irregular
    particles much larger than the wavelength with wavelength-scale surface roughness.
    <i>Optics Letters</i>, <i>41</i>(15), 3491–3493. <a href="https://doi.org/10.1364/ol.41.003491">https://doi.org/10.1364/ol.41.003491</a>
  bibtex: '@article{Grynko_Shkuratov_Förstner_2016, title={Light scattering by irregular
    particles much larger than the wavelength with wavelength-scale surface roughness},
    volume={41}, DOI={<a href="https://doi.org/10.1364/ol.41.003491">10.1364/ol.41.003491</a>},
    number={15}, journal={Optics Letters}, publisher={The Optical Society}, author={Grynko,
    Yevgen and Shkuratov, Yuriy and Förstner, Jens}, year={2016}, pages={3491–3493}
    }'
  chicago: 'Grynko, Yevgen, Yuriy Shkuratov, and Jens Förstner. “Light Scattering
    by Irregular Particles Much Larger than the Wavelength with Wavelength-Scale Surface
    Roughness.” <i>Optics Letters</i> 41, no. 15 (2016): 3491–93. <a href="https://doi.org/10.1364/ol.41.003491">https://doi.org/10.1364/ol.41.003491</a>.'
  ieee: Y. Grynko, Y. Shkuratov, and J. Förstner, “Light scattering by irregular particles
    much larger than the wavelength with wavelength-scale surface roughness,” <i>Optics
    Letters</i>, vol. 41, no. 15, pp. 3491–3493, 2016.
  mla: Grynko, Yevgen, et al. “Light Scattering by Irregular Particles Much Larger
    than the Wavelength with Wavelength-Scale Surface Roughness.” <i>Optics Letters</i>,
    vol. 41, no. 15, The Optical Society, 2016, pp. 3491–93, doi:<a href="https://doi.org/10.1364/ol.41.003491">10.1364/ol.41.003491</a>.
  short: Y. Grynko, Y. Shkuratov, J. Förstner, Optics Letters 41 (2016) 3491–3493.
date_created: 2018-08-08T09:53:28Z
date_updated: 2022-01-06T06:59:43Z
ddc:
- '530'
department:
- _id: '61'
doi: 10.1364/ol.41.003491
file:
- access_level: closed
  content_type: application/pdf
  creator: hclaudia
  date_created: 2018-08-08T09:56:05Z
  date_updated: 2018-08-08T09:56:05Z
  file_id: '3844'
  file_name: 2016-07 Grynko,Förstner_Light scattering by irregular particles much
    larger than the wavelength with wavelength-scale surface roughness_Optics Letter
    ol-41-15-3491.pdf
  file_size: 1581998
  relation: main_file
  success: 1
file_date_updated: 2018-08-08T09:56:05Z
has_accepted_license: '1'
intvolume: '        41'
issue: '15'
keyword:
- tet_topic_scattering
language:
- iso: eng
page: 3491-3493
project:
- _id: '52'
  name: Computing Resources Provided by the Paderborn Center for Parallel Computing
publication: Optics Letters
publication_identifier:
  issn:
  - 0146-9592
  - 1539-4794
publication_status: published
publisher: The Optical Society
status: public
title: Light scattering by irregular particles much larger than the wavelength with
  wavelength-scale surface roughness
type: journal_article
user_id: '158'
volume: 41
year: '2016'
...
---
_id: '3849'
abstract:
- lang: eng
  text: The physical optics approximations are derived from the Maxwell equations.
    The scattered field equations by Kirchhoff, Stratton-Chu, Kottler and Franz are
    compared and discussed. It is shown that in the case of faceted particles, these
    equations reduce to a sum of the diffraction integrals, where every diffraction
    integral is associated with one plane–parallel optical beam leaving a particle
    facet. In the far zone, these diffraction integrals correspond to the Fraunhofer
    diffraction patterns. The paper discusses the E-, M- and (E, M)-diffraction theories
    as applied to ice crystals of cirrus clouds. The comparison to the exact solution
    obtained by the discontinuous Galerkin time domain method shows that the Kirchhoff
    diffraction theory is preferable.
article_type: original
author:
- first_name: Alexander V.
  full_name: Konoshonkin, Alexander V.
  last_name: Konoshonkin
- first_name: Natalia V.
  full_name: Kustova, Natalia V.
  last_name: Kustova
- first_name: Anatoli G.
  full_name: Borovoi, Anatoli G.
  last_name: Borovoi
- first_name: Yevgen
  full_name: Grynko, Yevgen
  id: '26059'
  last_name: Grynko
- first_name: Jens
  full_name: Förstner, Jens
  id: '158'
  last_name: Förstner
  orcid: 0000-0001-7059-9862
citation:
  ama: 'Konoshonkin AV, Kustova NV, Borovoi AG, Grynko Y, Förstner J. Light scattering
    by ice crystals of cirrus clouds: comparison of the physical optics methods. <i>Journal
    of Quantitative Spectroscopy and Radiative Transfer</i>. 2016;182:12-23. doi:<a
    href="https://doi.org/10.1016/j.jqsrt.2016.05.006">10.1016/j.jqsrt.2016.05.006</a>'
  apa: 'Konoshonkin, A. V., Kustova, N. V., Borovoi, A. G., Grynko, Y., &#38; Förstner,
    J. (2016). Light scattering by ice crystals of cirrus clouds: comparison of the
    physical optics methods. <i>Journal of Quantitative Spectroscopy and Radiative
    Transfer</i>, <i>182</i>, 12–23. <a href="https://doi.org/10.1016/j.jqsrt.2016.05.006">https://doi.org/10.1016/j.jqsrt.2016.05.006</a>'
  bibtex: '@article{Konoshonkin_Kustova_Borovoi_Grynko_Förstner_2016, title={Light
    scattering by ice crystals of cirrus clouds: comparison of the physical optics
    methods}, volume={182}, DOI={<a href="https://doi.org/10.1016/j.jqsrt.2016.05.006">10.1016/j.jqsrt.2016.05.006</a>},
    journal={Journal of Quantitative Spectroscopy and Radiative Transfer}, publisher={Elsevier
    BV}, author={Konoshonkin, Alexander V. and Kustova, Natalia V. and Borovoi, Anatoli
    G. and Grynko, Yevgen and Förstner, Jens}, year={2016}, pages={12–23} }'
  chicago: 'Konoshonkin, Alexander V., Natalia V. Kustova, Anatoli G. Borovoi, Yevgen
    Grynko, and Jens Förstner. “Light Scattering by Ice Crystals of Cirrus Clouds:
    Comparison of the Physical Optics Methods.” <i>Journal of Quantitative Spectroscopy
    and Radiative Transfer</i> 182 (2016): 12–23. <a href="https://doi.org/10.1016/j.jqsrt.2016.05.006">https://doi.org/10.1016/j.jqsrt.2016.05.006</a>.'
  ieee: 'A. V. Konoshonkin, N. V. Kustova, A. G. Borovoi, Y. Grynko, and J. Förstner,
    “Light scattering by ice crystals of cirrus clouds: comparison of the physical
    optics methods,” <i>Journal of Quantitative Spectroscopy and Radiative Transfer</i>,
    vol. 182, pp. 12–23, 2016.'
  mla: 'Konoshonkin, Alexander V., et al. “Light Scattering by Ice Crystals of Cirrus
    Clouds: Comparison of the Physical Optics Methods.” <i>Journal of Quantitative
    Spectroscopy and Radiative Transfer</i>, vol. 182, Elsevier BV, 2016, pp. 12–23,
    doi:<a href="https://doi.org/10.1016/j.jqsrt.2016.05.006">10.1016/j.jqsrt.2016.05.006</a>.'
  short: A.V. Konoshonkin, N.V. Kustova, A.G. Borovoi, Y. Grynko, J. Förstner, Journal
    of Quantitative Spectroscopy and Radiative Transfer 182 (2016) 12–23.
date_created: 2018-08-08T10:41:31Z
date_updated: 2022-01-06T06:59:45Z
ddc:
- '530'
department:
- _id: '61'
doi: 10.1016/j.jqsrt.2016.05.006
file:
- access_level: closed
  content_type: application/pdf
  creator: hclaudia
  date_created: 2018-08-08T10:47:08Z
  date_updated: 2018-08-08T10:47:08Z
  file_id: '3850'
  file_name: 2016 Grynko,Förstner_Light scattering by ice crystals of cirrus clouds
    comparison of the physical optics methods.pdf
  file_size: 3315958
  relation: main_file
  success: 1
file_date_updated: 2018-08-08T10:47:08Z
has_accepted_license: '1'
intvolume: '       182'
keyword:
- tet_topic_scattering
language:
- iso: eng
page: 12-23
project:
- _id: '52'
  name: Computing Resources Provided by the Paderborn Center for Parallel Computing
publication: Journal of Quantitative Spectroscopy and Radiative Transfer
publication_identifier:
  issn:
  - 0022-4073
publication_status: published
publisher: Elsevier BV
status: public
title: 'Light scattering by ice crystals of cirrus clouds: comparison of the physical
  optics methods'
type: journal_article
user_id: '55706'
volume: 182
year: '2016'
...
---
_id: '3880'
author:
- first_name: Henning
  full_name: Wachsmuth, Henning
  id: '3900'
  last_name: Wachsmuth
citation:
  ama: 'Wachsmuth H. Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse. In:
    <i>Ausgezeichnete Informatikdissertationen 2015</i>. ; 2016:329-338.'
  apa: Wachsmuth, H. (2016). Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse.
    In <i>Ausgezeichnete Informatikdissertationen 2015</i> (pp. 329–338).
  bibtex: '@inproceedings{Wachsmuth_2016, title={Pipelines Für Effiziente und Robuste
    Ad-hoc Textanalyse}, booktitle={Ausgezeichnete Informatikdissertationen 2015},
    author={Wachsmuth, Henning}, year={2016}, pages={329–338} }'
  chicago: Wachsmuth, Henning. “Pipelines Für Effiziente Und Robuste Ad-Hoc Textanalyse.”
    In <i>Ausgezeichnete Informatikdissertationen 2015</i>, 329–38, 2016.
  ieee: H. Wachsmuth, “Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse,” in
    <i>Ausgezeichnete Informatikdissertationen 2015</i>, 2016, pp. 329–338.
  mla: Wachsmuth, Henning. “Pipelines Für Effiziente Und Robuste Ad-Hoc Textanalyse.”
    <i>Ausgezeichnete Informatikdissertationen 2015</i>, 2016, pp. 329–38.
  short: 'H. Wachsmuth, in: Ausgezeichnete Informatikdissertationen 2015, 2016, pp.
    329–338.'
date_created: 2018-08-11T16:16:00Z
date_updated: 2022-01-06T06:59:47Z
department:
- _id: '600'
language:
- iso: eng
main_file_link:
- url: https://dl.gi.de/bitstream/handle/20.500.12116/4595/329.pdf?sequence=1
page: 329-338
publication: Ausgezeichnete Informatikdissertationen 2015
publication_identifier:
  isbn:
  - 978-3-88579-975-7
status: public
title: Pipelines Für Effiziente und Robuste Ad-hoc Textanalyse
type: conference
user_id: '82920'
year: '2016'
...
---
_id: '3884'
abstract:
- lang: eng
  text: "e  study  the  discrete  soliton  formation  in  one-  and  two-\r\ndimensional
    arrays of nanowires coated with graphene monolayers. Highly \r\nconfined  solitons,
    \ including  the  fundamental  and  the  higher-order  modes,  are  found  to
    \ be  supported  by  the  proposed  structure  with  a  low  level  of  power
    \ flow.  Numerical  analysis  reveals  that,  by  tuning  the  input  intensity
    \ \r\nand Fermi energy, the beam diffraction, soliton dimension and propagation
    loss  can  be  fully  controlled  in  a  broad  range,  indicating  potential
    \ values  of  the graphene-based solitons in nonlinear/active nanophotonic systems. "
article_type: original
author:
- first_name: Yao
  full_name: Kou, Yao
  last_name: Kou
- first_name: Jens
  full_name: Förstner, Jens
  id: '158'
  last_name: Förstner
  orcid: 0000-0001-7059-9862
citation:
  ama: Kou Y, Förstner J. Discrete plasmonic solitons in graphene-coated nanowire
    arrays. <i>Optics Express</i>. 2016;24(5):4714. doi:<a href="https://doi.org/10.1364/oe.24.004714">10.1364/oe.24.004714</a>
  apa: Kou, Y., &#38; Förstner, J. (2016). Discrete plasmonic solitons in graphene-coated
    nanowire arrays. <i>Optics Express</i>, <i>24</i>(5), 4714. <a href="https://doi.org/10.1364/oe.24.004714">https://doi.org/10.1364/oe.24.004714</a>
  bibtex: '@article{Kou_Förstner_2016, title={Discrete plasmonic solitons in graphene-coated
    nanowire arrays}, volume={24}, DOI={<a href="https://doi.org/10.1364/oe.24.004714">10.1364/oe.24.004714</a>},
    number={5}, journal={Optics Express}, publisher={The Optical Society}, author={Kou,
    Yao and Förstner, Jens}, year={2016}, pages={4714} }'
  chicago: 'Kou, Yao, and Jens Förstner. “Discrete Plasmonic Solitons in Graphene-Coated
    Nanowire Arrays.” <i>Optics Express</i> 24, no. 5 (2016): 4714. <a href="https://doi.org/10.1364/oe.24.004714">https://doi.org/10.1364/oe.24.004714</a>.'
  ieee: Y. Kou and J. Förstner, “Discrete plasmonic solitons in graphene-coated nanowire
    arrays,” <i>Optics Express</i>, vol. 24, no. 5, p. 4714, 2016.
  mla: Kou, Yao, and Jens Förstner. “Discrete Plasmonic Solitons in Graphene-Coated
    Nanowire Arrays.” <i>Optics Express</i>, vol. 24, no. 5, The Optical Society,
    2016, p. 4714, doi:<a href="https://doi.org/10.1364/oe.24.004714">10.1364/oe.24.004714</a>.
  short: Y. Kou, J. Förstner, Optics Express 24 (2016) 4714.
date_created: 2018-08-13T08:45:53Z
date_updated: 2022-01-06T06:59:48Z
ddc:
- '530'
department:
- _id: '61'
doi: 10.1364/oe.24.004714
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hclaudia
  date_created: 2018-08-13T08:56:31Z
  date_updated: 2018-08-21T10:43:44Z
  file_id: '3885'
  file_name: 2016-02 Kou,Förstner_Discrete plasmonic solitons in graphene-coated nanowires
    arrays_optics express.pdf
  file_size: 2425722
  relation: main_file
file_date_updated: 2018-08-21T10:43:44Z
has_accepted_license: '1'
intvolume: '        24'
issue: '5'
keyword:
- tet_topic_plasmonics
- tet_topic_polariton
language:
- iso: eng
oa: '1'
page: '4714'
publication: Optics Express
publication_identifier:
  issn:
  - 1094-4087
publication_status: published
publisher: The Optical Society
status: public
title: Discrete plasmonic solitons in graphene-coated nanowire arrays
type: journal_article
urn: '38843'
user_id: '158'
volume: 24
year: '2016'
...
---
_id: '3886'
abstract:
- lang: eng
  text: " We report on second harmonic generation spectroscopy on a series of rectangular
    arrays of split-ring resonators. Within the  sample  series, the  lattice  constants
    are varied, but the area of the unit cell is kept ﬁxed. The SHG \r\nsignal intensity
    of the different arrays upon resonant excitation of the fundamental plasmonic
    mode  strongly depends \r\non the respective arrangement  of  the  split-ring
    \ resonators. This ﬁnding can be explained by variations of  the electromagnetic
    \ interactions  between the  split-ring resonators  in the different arrays. The
    experimental results are in agreement with  numerical calculations based  on the
    discontinuous Galerkin time-domain method. \r\n\r\n(PDF) The role of electromagnetic
    interactions.... Available from: https://www.researchgate.net/publication/297612326_The_role_of_electromagnetic_interactions_in_second_harmonic_generation_from_plasmonic_metamaterials
    [accessed Aug 13 2018]."
article_type: original
author:
- first_name: Julian
  full_name: Alberti, Julian
  last_name: Alberti
- first_name: Heiko
  full_name: Linnenbank, Heiko
  last_name: Linnenbank
- first_name: Stefan
  full_name: Linden, Stefan
  last_name: Linden
- first_name: Yevgen
  full_name: Grynko, Yevgen
  id: '26059'
  last_name: Grynko
- first_name: Jens
  full_name: Förstner, Jens
  id: '158'
  last_name: Förstner
  orcid: 0000-0001-7059-9862
citation:
  ama: Alberti J, Linnenbank H, Linden S, Grynko Y, Förstner J. The role of electromagnetic
    interactions in second harmonic generation from plasmonic metamaterials. <i>Applied
    Physics B</i>. 2016;122(2):45-50. doi:<a href="https://doi.org/10.1007/s00340-015-6311-x">10.1007/s00340-015-6311-x</a>
  apa: Alberti, J., Linnenbank, H., Linden, S., Grynko, Y., &#38; Förstner, J. (2016).
    The role of electromagnetic interactions in second harmonic generation from plasmonic
    metamaterials. <i>Applied Physics B</i>, <i>122</i>(2), 45–50. <a href="https://doi.org/10.1007/s00340-015-6311-x">https://doi.org/10.1007/s00340-015-6311-x</a>
  bibtex: '@article{Alberti_Linnenbank_Linden_Grynko_Förstner_2016, title={The role
    of electromagnetic interactions in second harmonic generation from plasmonic metamaterials},
    volume={122}, DOI={<a href="https://doi.org/10.1007/s00340-015-6311-x">10.1007/s00340-015-6311-x</a>},
    number={2}, journal={Applied Physics B}, publisher={Springer Nature}, author={Alberti,
    Julian and Linnenbank, Heiko and Linden, Stefan and Grynko, Yevgen and Förstner,
    Jens}, year={2016}, pages={45–50} }'
  chicago: 'Alberti, Julian, Heiko Linnenbank, Stefan Linden, Yevgen Grynko, and Jens
    Förstner. “The Role of Electromagnetic Interactions in Second Harmonic Generation
    from Plasmonic Metamaterials.” <i>Applied Physics B</i> 122, no. 2 (2016): 45–50.
    <a href="https://doi.org/10.1007/s00340-015-6311-x">https://doi.org/10.1007/s00340-015-6311-x</a>.'
  ieee: J. Alberti, H. Linnenbank, S. Linden, Y. Grynko, and J. Förstner, “The role
    of electromagnetic interactions in second harmonic generation from plasmonic metamaterials,”
    <i>Applied Physics B</i>, vol. 122, no. 2, pp. 45–50, 2016.
  mla: Alberti, Julian, et al. “The Role of Electromagnetic Interactions in Second
    Harmonic Generation from Plasmonic Metamaterials.” <i>Applied Physics B</i>, vol.
    122, no. 2, Springer Nature, 2016, pp. 45–50, doi:<a href="https://doi.org/10.1007/s00340-015-6311-x">10.1007/s00340-015-6311-x</a>.
  short: J. Alberti, H. Linnenbank, S. Linden, Y. Grynko, J. Förstner, Applied Physics
    B 122 (2016) 45–50.
date_created: 2018-08-13T08:59:27Z
date_updated: 2022-01-06T06:59:48Z
ddc:
- '530'
department:
- _id: '61'
doi: 10.1007/s00340-015-6311-x
file:
- access_level: closed
  content_type: application/pdf
  creator: hclaudia
  date_created: 2018-08-13T09:04:39Z
  date_updated: 2018-08-13T09:04:39Z
  file_id: '3887'
  file_name: 2016-03 Alberti,Linnenbank,Lindnen,Grynko,Förstner_The Role of Electromagnetic
    Interactions In Second Harmonic Generation From Plasmonic Metamaterials_Applied
    Physics B.pdf
  file_size: 863943
  relation: main_file
  success: 1
file_date_updated: 2018-08-13T09:04:39Z
has_accepted_license: '1'
intvolume: '       122'
issue: '2'
keyword:
- tet_topic_shg
- tet_topic_meta
language:
- iso: eng
page: 45-50
project:
- _id: '52'
  name: Computing Resources Provided by the Paderborn Center for Parallel Computing
publication: Applied Physics B
publication_identifier:
  issn:
  - 0946-2171
  - 1432-0649
publication_status: published
publisher: Springer Nature
status: public
title: The role of electromagnetic interactions in second harmonic generation from
  plasmonic metamaterials
type: journal_article
user_id: '55706'
volume: 122
year: '2016'
...
---
_id: '2898'
author:
- first_name: Eduard
  full_name: Weis, Eduard
  last_name: Weis
citation:
  ama: Weis E. <i>Searchable Encryption</i>.; 2016.
  apa: Weis, E. (2016). <i>Searchable Encryption</i>.
  bibtex: '@book{Weis_2016, title={Searchable Encryption}, author={Weis, Eduard},
    year={2016} }'
  chicago: Weis, Eduard. <i>Searchable Encryption</i>, 2016.
  ieee: E. Weis, <i>Searchable Encryption</i>. 2016.
  mla: Weis, Eduard. <i>Searchable Encryption</i>. 2016.
  short: E. Weis, Searchable Encryption, 2016.
date_created: 2018-05-25T09:43:39Z
date_updated: 2022-01-06T06:58:42Z
department:
- _id: '64'
status: public
supervisor:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
title: Searchable Encryption
type: mastersthesis
user_id: '25078'
year: '2016'
...
---
_id: '28995'
author:
- first_name: Birgit
  full_name: Eickelmann, Birgit
  id: '40387'
  last_name: Eickelmann
- first_name: Julia
  full_name: Gerick, Julia
  last_name: Gerick
- first_name: Kerstin
  full_name: Drossel, Kerstin
  id: '48921'
  last_name: Drossel
- first_name: Wilfried
  full_name: Bos, Wilfried
  last_name: Bos
citation:
  ama: 'Eickelmann B, Gerick J, Drossel K, Bos W. Vertiefende Analysen zu ICILS 2013
    – Befunde und mögliche Entwicklungsperspektiven. In: Eickelmann B, Gerick J, Drossel
    K, Bos W, eds. <i>ICILS 2013 - Vertiefende Analysen zu computer- und informationsbezogenen
    Kompetenzen von Jugendlichen</i>. 7-32. Waxmann; 2016.'
  apa: Eickelmann, B., Gerick, J., Drossel, K., &#38; Bos, W. (2016). Vertiefende
    Analysen zu ICILS 2013 – Befunde und mögliche Entwicklungsperspektiven. In B.
    Eickelmann, J. Gerick, K. Drossel, &#38; W. Bos (Eds.), <i>ICILS 2013 - Vertiefende
    Analysen zu computer- und informationsbezogenen Kompetenzen von Jugendlichen</i>.
    Waxmann.
  bibtex: '@inbook{Eickelmann_Gerick_Drossel_Bos_2016, place={Münster}, series={7-32},
    title={Vertiefende Analysen zu ICILS 2013 – Befunde und mögliche Entwicklungsperspektiven},
    booktitle={ICILS 2013 - Vertiefende Analysen zu computer- und informationsbezogenen
    Kompetenzen von Jugendlichen}, publisher={Waxmann}, author={Eickelmann, Birgit
    and Gerick, Julia and Drossel, Kerstin and Bos, Wilfried}, editor={Eickelmann,
    Birgit and Gerick, Julia and Drossel, Kerstin and Bos, Wilfried}, year={2016},
    collection={7-32} }'
  chicago: 'Eickelmann, Birgit, Julia Gerick, Kerstin Drossel, and Wilfried Bos. “Vertiefende
    Analysen zu ICILS 2013 – Befunde und mögliche Entwicklungsperspektiven.” In <i>ICILS
    2013 - Vertiefende Analysen zu computer- und informationsbezogenen Kompetenzen
    von Jugendlichen</i>, edited by Birgit Eickelmann, Julia Gerick, Kerstin Drossel,
    and Wilfried Bos. 7-32. Münster: Waxmann, 2016.'
  ieee: 'B. Eickelmann, J. Gerick, K. Drossel, and W. Bos, “Vertiefende Analysen zu
    ICILS 2013 – Befunde und mögliche Entwicklungsperspektiven,” in <i>ICILS 2013
    - Vertiefende Analysen zu computer- und informationsbezogenen Kompetenzen von
    Jugendlichen</i>, B. Eickelmann, J. Gerick, K. Drossel, and W. Bos, Eds. Münster:
    Waxmann, 2016.'
  mla: Eickelmann, Birgit, et al. “Vertiefende Analysen zu ICILS 2013 – Befunde und
    mögliche Entwicklungsperspektiven.” <i>ICILS 2013 - Vertiefende Analysen zu computer-
    und informationsbezogenen Kompetenzen von Jugendlichen</i>, edited by Birgit Eickelmann
    et al., Waxmann, 2016.
  short: 'B. Eickelmann, J. Gerick, K. Drossel, W. Bos, in: B. Eickelmann, J. Gerick,
    K. Drossel, W. Bos (Eds.), ICILS 2013 - Vertiefende Analysen zu computer- und
    informationsbezogenen Kompetenzen von Jugendlichen, Waxmann, Münster, 2016.'
date_created: 2021-12-15T17:24:17Z
date_updated: 2022-01-06T06:58:43Z
department:
- _id: '462'
editor:
- first_name: Birgit
  full_name: Eickelmann, Birgit
  last_name: Eickelmann
- first_name: Julia
  full_name: Gerick, Julia
  last_name: Gerick
- first_name: Kerstin
  full_name: Drossel, Kerstin
  last_name: Drossel
- first_name: Wilfried
  full_name: Bos, Wilfried
  last_name: Bos
language:
- iso: ger
place: Münster
publication: ICILS 2013 - Vertiefende Analysen zu computer- und informationsbezogenen
  Kompetenzen von Jugendlichen
publisher: Waxmann
series_title: 7-32
status: public
title: Vertiefende Analysen zu ICILS 2013 – Befunde und mögliche Entwicklungsperspektiven
type: book_chapter
user_id: '50923'
year: '2016'
...
---
_id: '2947'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Peter
  full_name: Günther, Peter
  last_name: Günther
citation:
  ama: 'Blömer J, Günther P. Singular Curve Point Decompression Attack. In: <i>2015
    Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>. IEEE; 2016.
    doi:<a href="https://doi.org/10.1109/fdtc.2015.17">10.1109/fdtc.2015.17</a>'
  apa: Blömer, J., &#38; Günther, P. (2016). Singular Curve Point Decompression Attack.
    In <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>.
    IEEE. <a href="https://doi.org/10.1109/fdtc.2015.17">https://doi.org/10.1109/fdtc.2015.17</a>
  bibtex: '@inproceedings{Blömer_Günther_2016, title={Singular Curve Point Decompression
    Attack}, DOI={<a href="https://doi.org/10.1109/fdtc.2015.17">10.1109/fdtc.2015.17</a>},
    booktitle={2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)},
    publisher={IEEE}, author={Blömer, Johannes and Günther, Peter}, year={2016} }'
  chicago: Blömer, Johannes, and Peter Günther. “Singular Curve Point Decompression
    Attack.” In <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography
    (FDTC)</i>. IEEE, 2016. <a href="https://doi.org/10.1109/fdtc.2015.17">https://doi.org/10.1109/fdtc.2015.17</a>.
  ieee: J. Blömer and P. Günther, “Singular Curve Point Decompression Attack,” in
    <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>,
    2016.
  mla: Blömer, Johannes, and Peter Günther. “Singular Curve Point Decompression Attack.”
    <i>2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</i>,
    IEEE, 2016, doi:<a href="https://doi.org/10.1109/fdtc.2015.17">10.1109/fdtc.2015.17</a>.
  short: 'J. Blömer, P. Günther, in: 2015 Workshop on Fault Diagnosis and Tolerance
    in Cryptography (FDTC), IEEE, 2016.'
date_created: 2018-05-29T11:25:43Z
date_updated: 2022-01-06T06:58:48Z
department:
- _id: '64'
doi: 10.1109/fdtc.2015.17
project:
- _id: '43'
  name: Securing the Financial Cloud
publication: 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
publication_identifier:
  isbn:
  - '9781467375795'
publication_status: published
publisher: IEEE
status: public
title: Singular Curve Point Decompression Attack
type: conference
user_id: '25078'
year: '2016'
...
---
_id: '2948'
author:
- first_name: Peter
  full_name: Günther, Peter
  last_name: Günther
- first_name: Volker
  full_name: Krummel, Volker
  last_name: Krummel
citation:
  ama: 'Günther P, Krummel V. Implementing Cryptographic Pairings on Accumulator Based
    Smart Card Architectures. In: <i>Mathematical Aspects of Computer and Information
    Sciences</i>. Cham: Springer International Publishing; 2016:151-165. doi:<a href="https://doi.org/10.1007/978-3-319-32859-1_13">10.1007/978-3-319-32859-1_13</a>'
  apa: 'Günther, P., &#38; Krummel, V. (2016). Implementing Cryptographic Pairings
    on Accumulator Based Smart Card Architectures. In <i>Mathematical Aspects of Computer
    and Information Sciences</i> (pp. 151–165). Cham: Springer International Publishing.
    <a href="https://doi.org/10.1007/978-3-319-32859-1_13">https://doi.org/10.1007/978-3-319-32859-1_13</a>'
  bibtex: '@inbook{Günther_Krummel_2016, place={Cham}, title={Implementing Cryptographic
    Pairings on Accumulator Based Smart Card Architectures}, DOI={<a href="https://doi.org/10.1007/978-3-319-32859-1_13">10.1007/978-3-319-32859-1_13</a>},
    booktitle={Mathematical Aspects of Computer and Information Sciences}, publisher={Springer
    International Publishing}, author={Günther, Peter and Krummel, Volker}, year={2016},
    pages={151–165} }'
  chicago: 'Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings
    on Accumulator Based Smart Card Architectures.” In <i>Mathematical Aspects of
    Computer and Information Sciences</i>, 151–65. Cham: Springer International Publishing,
    2016. <a href="https://doi.org/10.1007/978-3-319-32859-1_13">https://doi.org/10.1007/978-3-319-32859-1_13</a>.'
  ieee: 'P. Günther and V. Krummel, “Implementing Cryptographic Pairings on Accumulator
    Based Smart Card Architectures,” in <i>Mathematical Aspects of Computer and Information
    Sciences</i>, Cham: Springer International Publishing, 2016, pp. 151–165.'
  mla: Günther, Peter, and Volker Krummel. “Implementing Cryptographic Pairings on
    Accumulator Based Smart Card Architectures.” <i>Mathematical Aspects of Computer
    and Information Sciences</i>, Springer International Publishing, 2016, pp. 151–65,
    doi:<a href="https://doi.org/10.1007/978-3-319-32859-1_13">10.1007/978-3-319-32859-1_13</a>.
  short: 'P. Günther, V. Krummel, in: Mathematical Aspects of Computer and Information
    Sciences, Springer International Publishing, Cham, 2016, pp. 151–165.'
date_created: 2018-05-29T11:26:56Z
date_updated: 2022-01-06T06:58:48Z
department:
- _id: '64'
doi: 10.1007/978-3-319-32859-1_13
page: 151-165
place: Cham
project:
- _id: '43'
  name: Securing the Financial Cloud
publication: Mathematical Aspects of Computer and Information Sciences
publication_identifier:
  isbn:
  - '9783319328584'
  - '9783319328591'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Implementing Cryptographic Pairings on Accumulator Based Smart Card Architectures
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '2968'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Christiane
  full_name: Lammersen, Christiane
  last_name: Lammersen
- first_name: Melanie
  full_name: Schmidt, Melanie
  last_name: Schmidt
- first_name: Christian
  full_name: Sohler, Christian
  last_name: Sohler
citation:
  ama: 'Blömer J, Lammersen C, Schmidt M, Sohler C. Theoretical Analysis of the k-Means
    Algorithm – A Survey. In: <i>Algorithm Engineering</i>. Cham: Springer International
    Publishing; 2016:81-116. doi:<a href="https://doi.org/10.1007/978-3-319-49487-6_3">10.1007/978-3-319-49487-6_3</a>'
  apa: 'Blömer, J., Lammersen, C., Schmidt, M., &#38; Sohler, C. (2016). Theoretical
    Analysis of the k-Means Algorithm – A Survey. In <i>Algorithm Engineering</i>
    (pp. 81–116). Cham: Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-49487-6_3">https://doi.org/10.1007/978-3-319-49487-6_3</a>'
  bibtex: '@inbook{Blömer_Lammersen_Schmidt_Sohler_2016, place={Cham}, title={Theoretical
    Analysis of the k-Means Algorithm – A Survey}, DOI={<a href="https://doi.org/10.1007/978-3-319-49487-6_3">10.1007/978-3-319-49487-6_3</a>},
    booktitle={Algorithm Engineering}, publisher={Springer International Publishing},
    author={Blömer, Johannes and Lammersen, Christiane and Schmidt, Melanie and Sohler,
    Christian}, year={2016}, pages={81–116} }'
  chicago: 'Blömer, Johannes, Christiane Lammersen, Melanie Schmidt, and Christian
    Sohler. “Theoretical Analysis of the K-Means Algorithm – A Survey.” In <i>Algorithm
    Engineering</i>, 81–116. Cham: Springer International Publishing, 2016. <a href="https://doi.org/10.1007/978-3-319-49487-6_3">https://doi.org/10.1007/978-3-319-49487-6_3</a>.'
  ieee: 'J. Blömer, C. Lammersen, M. Schmidt, and C. Sohler, “Theoretical Analysis
    of the k-Means Algorithm – A Survey,” in <i>Algorithm Engineering</i>, Cham: Springer
    International Publishing, 2016, pp. 81–116.'
  mla: Blömer, Johannes, et al. “Theoretical Analysis of the K-Means Algorithm – A
    Survey.” <i>Algorithm Engineering</i>, Springer International Publishing, 2016,
    pp. 81–116, doi:<a href="https://doi.org/10.1007/978-3-319-49487-6_3">10.1007/978-3-319-49487-6_3</a>.
  short: 'J. Blömer, C. Lammersen, M. Schmidt, C. Sohler, in: Algorithm Engineering,
    Springer International Publishing, Cham, 2016, pp. 81–116.'
date_created: 2018-06-04T12:22:40Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
doi: 10.1007/978-3-319-49487-6_3
page: 81-116
place: Cham
publication: Algorithm Engineering
publication_identifier:
  isbn:
  - '9783319494869'
  - '9783319494876'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Theoretical Analysis of the k-Means Algorithm – A Survey
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '2969'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Sascha
  full_name: Brauer, Sascha
  id: '13291'
  last_name: Brauer
- first_name: Kathrin
  full_name: Bujna, Kathrin
  last_name: Bujna
citation:
  ama: Blömer J, Brauer S, Bujna K. Hard-Clustering with Gaussian Mixture Models.
    2016.
  apa: Blömer, J., Brauer, S., &#38; Bujna, K. (2016). Hard-Clustering with Gaussian
    Mixture Models. Computing Research Repository.
  bibtex: '@article{Blömer_Brauer_Bujna_2016, title={Hard-Clustering with Gaussian
    Mixture Models}, publisher={Computing Research Repository}, author={Blömer, Johannes
    and Brauer, Sascha and Bujna, Kathrin}, year={2016} }'
  chicago: Blömer, Johannes, Sascha Brauer, and Kathrin Bujna. “Hard-Clustering with
    Gaussian Mixture Models.” Computing Research Repository, 2016.
  ieee: J. Blömer, S. Brauer, and K. Bujna, “Hard-Clustering with Gaussian Mixture
    Models.” Computing Research Repository, 2016.
  mla: Blömer, Johannes, et al. <i>Hard-Clustering with Gaussian Mixture Models</i>.
    Computing Research Repository, 2016.
  short: J. Blömer, S. Brauer, K. Bujna, (2016).
date_created: 2018-06-04T12:26:51Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
main_file_link:
- open_access: '1'
  url: https://arxiv.org/abs/1603.06478
oa: '1'
publisher: Computing Research Repository
status: public
title: Hard-Clustering with Gaussian Mixture Models
type: preprint
user_id: '25078'
year: '2016'
...
---
_id: '2970'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Kathrin
  full_name: Bujna, Kathrin
  last_name: Bujna
citation:
  ama: 'Blömer J, Bujna K. Adaptive Seeding for Gaussian Mixture Models. In: <i>Advances
    in Knowledge Discovery and Data Mining</i>. Cham: Springer International Publishing;
    2016:296-308. doi:<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>'
  apa: 'Blömer, J., &#38; Bujna, K. (2016). Adaptive Seeding for Gaussian Mixture
    Models. In <i>Advances in Knowledge Discovery and Data Mining</i> (pp. 296–308).
    Cham: Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-31750-2_24">https://doi.org/10.1007/978-3-319-31750-2_24</a>'
  bibtex: '@inbook{Blömer_Bujna_2016, place={Cham}, title={Adaptive Seeding for Gaussian
    Mixture Models}, DOI={<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>},
    booktitle={Advances in Knowledge Discovery and Data Mining}, publisher={Springer
    International Publishing}, author={Blömer, Johannes and Bujna, Kathrin}, year={2016},
    pages={296–308} }'
  chicago: 'Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture
    Models.” In <i>Advances in Knowledge Discovery and Data Mining</i>, 296–308. Cham:
    Springer International Publishing, 2016. <a href="https://doi.org/10.1007/978-3-319-31750-2_24">https://doi.org/10.1007/978-3-319-31750-2_24</a>.'
  ieee: 'J. Blömer and K. Bujna, “Adaptive Seeding for Gaussian Mixture Models,” in
    <i>Advances in Knowledge Discovery and Data Mining</i>, Cham: Springer International
    Publishing, 2016, pp. 296–308.'
  mla: Blömer, Johannes, and Kathrin Bujna. “Adaptive Seeding for Gaussian Mixture
    Models.” <i>Advances in Knowledge Discovery and Data Mining</i>, Springer International
    Publishing, 2016, pp. 296–308, doi:<a href="https://doi.org/10.1007/978-3-319-31750-2_24">10.1007/978-3-319-31750-2_24</a>.
  short: 'J. Blömer, K. Bujna, in: Advances in Knowledge Discovery and Data Mining,
    Springer International Publishing, Cham, 2016, pp. 296–308.'
date_created: 2018-06-04T12:27:21Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
doi: 10.1007/978-3-319-31750-2_24
page: 296-308
place: Cham
publication: Advances in Knowledge Discovery and Data Mining
publication_identifier:
  isbn:
  - '9783319317496'
  - '9783319317502'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
publisher: Springer International Publishing
status: public
title: Adaptive Seeding for Gaussian Mixture Models
type: book_chapter
user_id: '25078'
year: '2016'
...
---
_id: '2971'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Peter
  full_name: Günther, Peter
  last_name: Günther
citation:
  ama: Blömer J, Günther P. <i>Effizienz Und Sicherheit Paarungsbasierter Kryptographie</i>.
    Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops; 2016.
  apa: Blömer, J., &#38; Günther, P. (2016). <i>Effizienz und Sicherheit paarungsbasierter
    Kryptographie</i>. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops.
  bibtex: '@book{Blömer_Günther_2016, title={Effizienz und Sicherheit paarungsbasierter
    Kryptographie}, publisher={Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops},
    author={Blömer, Johannes and Günther, Peter}, year={2016} }'
  chicago: Blömer, Johannes, and Peter Günther. <i>Effizienz Und Sicherheit Paarungsbasierter
    Kryptographie</i>. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
  ieee: J. Blömer and P. Günther, <i>Effizienz und Sicherheit paarungsbasierter Kryptographie</i>.
    Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
  mla: Blömer, Johannes, and Peter Günther. <i>Effizienz Und Sicherheit Paarungsbasierter
    Kryptographie</i>. Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
  short: J. Blömer, P. Günther, Effizienz Und Sicherheit Paarungsbasierter Kryptographie,
    Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops, 2016.
date_created: 2018-06-05T07:21:25Z
date_updated: 2022-01-06T06:58:49Z
department:
- _id: '64'
publication_status: published
publisher: Tagungsband des 26. Fraunhofer SIT Smartcard-Workshops
status: public
title: Effizienz und Sicherheit paarungsbasierter Kryptographie
type: report
user_id: '25078'
year: '2016'
...
---
_id: '3106'
author:
- first_name: Papatya
  full_name: Duman, Papatya
  id: '72752'
  last_name: Duman
- first_name: Walter
  full_name: Trockel, Walter
  last_name: Trockel
citation:
  ama: Duman P, Trockel W. On Non-Cooperative Foundation and Implementation of the
    Nash Solution in Subgame Perfect Equilibrium via Rubinstein’s Game. <i>Journal
    of Mechanism and Institution Design</i>. 2016;1(1):83-106. doi:<a href="https://doi.org/10.22574/jmid.2016.12.003">10.22574/jmid.2016.12.003</a>
  apa: Duman, P., &#38; Trockel, W. (2016). On Non-Cooperative Foundation and Implementation
    of the Nash Solution in Subgame Perfect Equilibrium via Rubinstein’s Game. <i>Journal
    of Mechanism and Institution Design</i>, <i>1</i>(1), 83–106. <a href="https://doi.org/10.22574/jmid.2016.12.003">https://doi.org/10.22574/jmid.2016.12.003</a>
  bibtex: '@article{Duman_Trockel_2016, title={On Non-Cooperative Foundation and Implementation
    of the Nash Solution in Subgame Perfect Equilibrium via Rubinstein’s Game}, volume={1},
    DOI={<a href="https://doi.org/10.22574/jmid.2016.12.003">10.22574/jmid.2016.12.003</a>},
    number={1}, journal={Journal of Mechanism and Institution Design}, publisher={The
    Society for the Promotion of Mechanism and Institution Design}, author={Duman,
    Papatya and Trockel, Walter}, year={2016}, pages={83–106} }'
  chicago: 'Duman, Papatya, and Walter Trockel. “On Non-Cooperative Foundation and
    Implementation of the Nash Solution in Subgame Perfect Equilibrium via Rubinstein’s
    Game.” <i>Journal of Mechanism and Institution Design</i> 1, no. 1 (2016): 83–106.
    <a href="https://doi.org/10.22574/jmid.2016.12.003">https://doi.org/10.22574/jmid.2016.12.003</a>.'
  ieee: P. Duman and W. Trockel, “On Non-Cooperative Foundation and Implementation
    of the Nash Solution in Subgame Perfect Equilibrium via Rubinstein’s Game,” <i>Journal
    of Mechanism and Institution Design</i>, vol. 1, no. 1, pp. 83–106, 2016.
  mla: Duman, Papatya, and Walter Trockel. “On Non-Cooperative Foundation and Implementation
    of the Nash Solution in Subgame Perfect Equilibrium via Rubinstein’s Game.” <i>Journal
    of Mechanism and Institution Design</i>, vol. 1, no. 1, The Society for the Promotion
    of Mechanism and Institution Design, 2016, pp. 83–106, doi:<a href="https://doi.org/10.22574/jmid.2016.12.003">10.22574/jmid.2016.12.003</a>.
  short: P. Duman, W. Trockel, Journal of Mechanism and Institution Design 1 (2016)
    83–106.
date_created: 2018-06-07T08:53:37Z
date_updated: 2022-01-06T06:58:56Z
ddc:
- '040'
doi: 10.22574/jmid.2016.12.003
extern: '1'
file:
- access_level: closed
  content_type: application/pdf
  creator: stela
  date_created: 2018-10-31T08:49:27Z
  date_updated: 2018-10-31T08:49:27Z
  file_id: '5138'
  file_name: On Non-Cooperative Foundation and Implementation of the Nash....pdf
  file_size: 332414
  relation: main_file
  success: 1
file_date_updated: 2018-10-31T08:49:27Z
has_accepted_license: '1'
intvolume: '         1'
issue: '1'
language:
- iso: eng
page: 83-106
publication: Journal of Mechanism and Institution Design
publication_identifier:
  issn:
  - 2399-844X
  - 2399-8458
publication_status: published
publisher: The Society for the Promotion of Mechanism and Institution Design
status: public
title: On Non-Cooperative Foundation and Implementation of the Nash Solution in Subgame
  Perfect Equilibrium via Rubinstein's Game
type: journal_article
user_id: '65453'
volume: 1
year: '2016'
...
---
_id: '3112'
author:
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
citation:
  ama: Hofheinz D, Jager T. Tightly secure signatures and public-key encryption. <i>Des
    Codes Cryptography</i>. 2016;(1):29--61. doi:<a href="https://doi.org/10.1007/s10623-015-0062-x">10.1007/s10623-015-0062-x</a>
  apa: Hofheinz, D., &#38; Jager, T. (2016). Tightly secure signatures and public-key
    encryption. <i>Des. Codes Cryptography</i>, (1), 29--61. <a href="https://doi.org/10.1007/s10623-015-0062-x">https://doi.org/10.1007/s10623-015-0062-x</a>
  bibtex: '@article{Hofheinz_Jager_2016, title={Tightly secure signatures and public-key
    encryption}, DOI={<a href="https://doi.org/10.1007/s10623-015-0062-x">10.1007/s10623-015-0062-x</a>},
    number={1}, journal={Des. Codes Cryptography}, author={Hofheinz, Dennis and Jager,
    Tibor}, year={2016}, pages={29--61} }'
  chicago: 'Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key
    Encryption.” <i>Des. Codes Cryptography</i>, no. 1 (2016): 29--61. <a href="https://doi.org/10.1007/s10623-015-0062-x">https://doi.org/10.1007/s10623-015-0062-x</a>.'
  ieee: D. Hofheinz and T. Jager, “Tightly secure signatures and public-key encryption,”
    <i>Des. Codes Cryptography</i>, no. 1, pp. 29--61, 2016.
  mla: Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key
    Encryption.” <i>Des. Codes Cryptography</i>, no. 1, 2016, pp. 29--61, doi:<a href="https://doi.org/10.1007/s10623-015-0062-x">10.1007/s10623-015-0062-x</a>.
  short: D. Hofheinz, T. Jager, Des. Codes Cryptography (2016) 29--61.
date_created: 2018-06-07T09:12:15Z
date_updated: 2022-01-06T06:58:56Z
department:
- _id: '558'
doi: 10.1007/s10623-015-0062-x
extern: '1'
issue: '1'
page: 29--61
publication: Des. Codes Cryptography
status: public
title: Tightly secure signatures and public-key encryption
type: journal_article
user_id: '38235'
year: '2016'
...
---
_id: '3113'
author:
- first_name: Felix
  full_name: Heuer, Felix
  last_name: Heuer
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Sven
  full_name: Schäge, Sven
  last_name: Schäge
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
citation:
  ama: Heuer F, Jager T, Schäge S, Kiltz E. Selective opening security of practical
    public-key encryption schemes. <i>IET Information Security</i>. 2016;(6):304--318.
    doi:<a href="https://doi.org/10.1049/iet-ifs.2015.0507">10.1049/iet-ifs.2015.0507</a>
  apa: Heuer, F., Jager, T., Schäge, S., &#38; Kiltz, E. (2016). Selective opening
    security of practical public-key encryption schemes. <i>IET Information Security</i>,
    (6), 304--318. <a href="https://doi.org/10.1049/iet-ifs.2015.0507">https://doi.org/10.1049/iet-ifs.2015.0507</a>
  bibtex: '@article{Heuer_Jager_Schäge_Kiltz_2016, title={Selective opening security
    of practical public-key encryption schemes}, DOI={<a href="https://doi.org/10.1049/iet-ifs.2015.0507">10.1049/iet-ifs.2015.0507</a>},
    number={6}, journal={IET Information Security}, author={Heuer, Felix and Jager,
    Tibor and Schäge, Sven and Kiltz, Eike}, year={2016}, pages={304--318} }'
  chicago: 'Heuer, Felix, Tibor Jager, Sven Schäge, and Eike Kiltz. “Selective Opening
    Security of Practical Public-Key Encryption Schemes.” <i>IET Information Security</i>,
    no. 6 (2016): 304--318. <a href="https://doi.org/10.1049/iet-ifs.2015.0507">https://doi.org/10.1049/iet-ifs.2015.0507</a>.'
  ieee: F. Heuer, T. Jager, S. Schäge, and E. Kiltz, “Selective opening security of
    practical public-key encryption schemes,” <i>IET Information Security</i>, no.
    6, pp. 304--318, 2016.
  mla: Heuer, Felix, et al. “Selective Opening Security of Practical Public-Key Encryption
    Schemes.” <i>IET Information Security</i>, no. 6, 2016, pp. 304--318, doi:<a href="https://doi.org/10.1049/iet-ifs.2015.0507">10.1049/iet-ifs.2015.0507</a>.
  short: F. Heuer, T. Jager, S. Schäge, E. Kiltz, IET Information Security (2016)
    304--318.
date_created: 2018-06-07T09:12:50Z
date_updated: 2022-01-06T06:58:56Z
department:
- _id: '558'
doi: 10.1049/iet-ifs.2015.0507
extern: '1'
issue: '6'
page: 304--318
publication: IET Information Security
status: public
title: Selective opening security of practical public-key encryption schemes
type: journal_article
user_id: '38235'
year: '2016'
...
---
_id: '3114'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Andy
  full_name: Rupp, Andy
  last_name: Rupp
citation:
  ama: 'Jager T, Rupp A. Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving
    Way. <i>PoPETs</i>. 2016;(3):62--82.'
  apa: 'Jager, T., &#38; Rupp, A. (2016). Black-Box Accumulation: Collecting Incentives
    in a Privacy-Preserving Way. <i>PoPETs</i>, (3), 62--82.'
  bibtex: '@article{Jager_Rupp_2016, title={Black-Box Accumulation: Collecting Incentives
    in a Privacy-Preserving Way}, number={3}, journal={PoPETs}, author={Jager, Tibor
    and Rupp, Andy}, year={2016}, pages={62--82} }'
  chicago: 'Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives
    in a Privacy-Preserving Way.” <i>PoPETs</i>, no. 3 (2016): 62--82.'
  ieee: 'T. Jager and A. Rupp, “Black-Box Accumulation: Collecting Incentives in a
    Privacy-Preserving Way,” <i>PoPETs</i>, no. 3, pp. 62--82, 2016.'
  mla: 'Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives
    in a Privacy-Preserving Way.” <i>PoPETs</i>, no. 3, 2016, pp. 62--82.'
  short: T. Jager, A. Rupp, PoPETs (2016) 62--82.
date_created: 2018-06-07T09:13:15Z
date_updated: 2022-01-06T06:58:56Z
department:
- _id: '558'
extern: '1'
issue: '3'
page: 62--82
publication: PoPETs
status: public
title: 'Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way'
type: journal_article
user_id: '38235'
year: '2016'
...
---
_id: '3115'
author:
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Dakshita
  full_name: Khurana, Dakshita
  last_name: Khurana
- first_name: Amit
  full_name: Sahai, Amit
  last_name: Sahai
- first_name: Brent
  full_name: Waters, Brent
  last_name: Waters
- first_name: Mark
  full_name: Zhandry, Mark
  last_name: Zhandry
citation:
  ama: 'Hofheinz D, Jager T, Khurana D, Sahai A, Waters B, Zhandry M. How to Generate
    and Use Universal Samplers. In: <i>Advances in Cryptology - ASIACRYPT 2016 - 22nd
    International Conference on the Theory and Application of Cryptology and Information
    Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II</i>. ; 2016:715--744.
    doi:<a href="https://doi.org/10.1007/978-3-662-53890-6_24">10.1007/978-3-662-53890-6_24</a>'
  apa: Hofheinz, D., Jager, T., Khurana, D., Sahai, A., Waters, B., &#38; Zhandry,
    M. (2016). How to Generate and Use Universal Samplers. In <i>Advances in Cryptology
    - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application
    of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings,
    Part II</i> (pp. 715--744). <a href="https://doi.org/10.1007/978-3-662-53890-6_24">https://doi.org/10.1007/978-3-662-53890-6_24</a>
  bibtex: '@inproceedings{Hofheinz_Jager_Khurana_Sahai_Waters_Zhandry_2016, title={How
    to Generate and Use Universal Samplers}, DOI={<a href="https://doi.org/10.1007/978-3-662-53890-6_24">10.1007/978-3-662-53890-6_24</a>},
    booktitle={Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference
    on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam,
    December 4-8, 2016, Proceedings, Part II}, author={Hofheinz, Dennis and Jager,
    Tibor and Khurana, Dakshita and Sahai, Amit and Waters, Brent and Zhandry, Mark},
    year={2016}, pages={715--744} }'
  chicago: Hofheinz, Dennis, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters,
    and Mark Zhandry. “How to Generate and Use Universal Samplers.” In <i>Advances
    in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and
    Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8,
    2016, Proceedings, Part II</i>, 715--744, 2016. <a href="https://doi.org/10.1007/978-3-662-53890-6_24">https://doi.org/10.1007/978-3-662-53890-6_24</a>.
  ieee: D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, and M. Zhandry, “How
    to Generate and Use Universal Samplers,” in <i>Advances in Cryptology - ASIACRYPT
    2016 - 22nd International Conference on the Theory and Application of Cryptology
    and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part
    II</i>, 2016, pp. 715--744.
  mla: Hofheinz, Dennis, et al. “How to Generate and Use Universal Samplers.” <i>Advances
    in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and
    Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8,
    2016, Proceedings, Part II</i>, 2016, pp. 715--744, doi:<a href="https://doi.org/10.1007/978-3-662-53890-6_24">10.1007/978-3-662-53890-6_24</a>.
  short: 'D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, M. Zhandry, in:
    Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the
    Theory and Application of Cryptology and Information Security, Hanoi, Vietnam,
    December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744.'
date_created: 2018-06-07T09:13:48Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-53890-6_24
extern: '1'
page: 715--744
publication: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference
  on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam,
  December 4-8, 2016, Proceedings, Part II
status: public
title: How to Generate and Use Universal Samplers
type: conference
user_id: '38235'
year: '2016'
...
---
_id: '3116'
author:
- first_name: Matthias
  full_name: Horst, Matthias
  last_name: Horst
- first_name: Martin
  full_name: Grothe, Martin
  last_name: Grothe
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Horst M, Grothe M, Jager T, Schwenk J. Breaking PPTP VPNs via RADIUS Encryption.
    In: <i>Cryptology and Network Security - 15th International Conference, CANS 2016,
    Milan, Italy, November 14-16, 2016, Proceedings</i>. ; 2016:159--175. doi:<a href="https://doi.org/10.1007/978-3-319-48965-0_10">10.1007/978-3-319-48965-0_10</a>'
  apa: Horst, M., Grothe, M., Jager, T., &#38; Schwenk, J. (2016). Breaking PPTP VPNs
    via RADIUS Encryption. In <i>Cryptology and Network Security - 15th International
    Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i> (pp.
    159--175). <a href="https://doi.org/10.1007/978-3-319-48965-0_10">https://doi.org/10.1007/978-3-319-48965-0_10</a>
  bibtex: '@inproceedings{Horst_Grothe_Jager_Schwenk_2016, title={Breaking PPTP VPNs
    via RADIUS Encryption}, DOI={<a href="https://doi.org/10.1007/978-3-319-48965-0_10">10.1007/978-3-319-48965-0_10</a>},
    booktitle={Cryptology and Network Security - 15th International Conference, CANS
    2016, Milan, Italy, November 14-16, 2016, Proceedings}, author={Horst, Matthias
    and Grothe, Martin and Jager, Tibor and Schwenk, Jörg}, year={2016}, pages={159--175}
    }'
  chicago: Horst, Matthias, Martin Grothe, Tibor Jager, and Jörg Schwenk. “Breaking
    PPTP VPNs via RADIUS Encryption.” In <i>Cryptology and Network Security - 15th
    International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i>,
    159--175, 2016. <a href="https://doi.org/10.1007/978-3-319-48965-0_10">https://doi.org/10.1007/978-3-319-48965-0_10</a>.
  ieee: M. Horst, M. Grothe, T. Jager, and J. Schwenk, “Breaking PPTP VPNs via RADIUS
    Encryption,” in <i>Cryptology and Network Security - 15th International Conference,
    CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i>, 2016, pp. 159--175.
  mla: Horst, Matthias, et al. “Breaking PPTP VPNs via RADIUS Encryption.” <i>Cryptology
    and Network Security - 15th International Conference, CANS 2016, Milan, Italy,
    November 14-16, 2016, Proceedings</i>, 2016, pp. 159--175, doi:<a href="https://doi.org/10.1007/978-3-319-48965-0_10">10.1007/978-3-319-48965-0_10</a>.
  short: 'M. Horst, M. Grothe, T. Jager, J. Schwenk, in: Cryptology and Network Security
    - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016,
    Proceedings, 2016, pp. 159--175.'
date_created: 2018-06-07T09:14:34Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-319-48965-0_10
extern: '1'
page: 159--175
publication: Cryptology and Network Security - 15th International Conference, CANS
  2016, Milan, Italy, November 14-16, 2016, Proceedings
status: public
title: Breaking PPTP VPNs via RADIUS Encryption
type: conference
user_id: '38235'
year: '2016'
...
---
_id: '3117'
author:
- first_name: Christoph
  full_name: Bader, Christoph
  last_name: Bader
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Yong
  full_name: Li, Yong
  last_name: Li
- first_name: Sven
  full_name: Schäge, Sven
  last_name: Schäge
citation:
  ama: 'Bader C, Jager T, Li Y, Schäge S. On the Impossibility of Tight Cryptographic
    Reductions. In: <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International
    Conference on the Theory and Applications of Cryptographic Techniques, Vienna,
    Austria, May 8-12, 2016, Proceedings, Part II</i>. ; 2016:273--304. doi:<a href="https://doi.org/10.1007/978-3-662-49896-5_10">10.1007/978-3-662-49896-5_10</a>'
  apa: Bader, C., Jager, T., Li, Y., &#38; Schäge, S. (2016). On the Impossibility
    of Tight Cryptographic Reductions. In <i>Advances in Cryptology - EUROCRYPT 2016
    - 35th Annual International Conference on the Theory and Applications of Cryptographic
    Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i> (pp. 273--304).
    <a href="https://doi.org/10.1007/978-3-662-49896-5_10">https://doi.org/10.1007/978-3-662-49896-5_10</a>
  bibtex: '@inproceedings{Bader_Jager_Li_Schäge_2016, title={On the Impossibility
    of Tight Cryptographic Reductions}, DOI={<a href="https://doi.org/10.1007/978-3-662-49896-5_10">10.1007/978-3-662-49896-5_10</a>},
    booktitle={Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International
    Conference on the Theory and Applications of Cryptographic Techniques, Vienna,
    Austria, May 8-12, 2016, Proceedings, Part II}, author={Bader, Christoph and Jager,
    Tibor and Li, Yong and Schäge, Sven}, year={2016}, pages={273--304} }'
  chicago: Bader, Christoph, Tibor Jager, Yong Li, and Sven Schäge. “On the Impossibility
    of Tight Cryptographic Reductions.” In <i>Advances in Cryptology - EUROCRYPT 2016
    - 35th Annual International Conference on the Theory and Applications of Cryptographic
    Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i>, 273--304,
    2016. <a href="https://doi.org/10.1007/978-3-662-49896-5_10">https://doi.org/10.1007/978-3-662-49896-5_10</a>.
  ieee: C. Bader, T. Jager, Y. Li, and S. Schäge, “On the Impossibility of Tight Cryptographic
    Reductions,” in <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International
    Conference on the Theory and Applications of Cryptographic Techniques, Vienna,
    Austria, May 8-12, 2016, Proceedings, Part II</i>, 2016, pp. 273--304.
  mla: Bader, Christoph, et al. “On the Impossibility of Tight Cryptographic Reductions.”
    <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference
    on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May
    8-12, 2016, Proceedings, Part II</i>, 2016, pp. 273--304, doi:<a href="https://doi.org/10.1007/978-3-662-49896-5_10">10.1007/978-3-662-49896-5_10</a>.
  short: 'C. Bader, T. Jager, Y. Li, S. Schäge, in: Advances in Cryptology - EUROCRYPT
    2016 - 35th Annual International Conference on the Theory and Applications of
    Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II,
    2016, pp. 273--304.'
date_created: 2018-06-07T09:15:15Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-49896-5_10
extern: '1'
page: 273--304
publication: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference
  on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May
  8-12, 2016, Proceedings, Part II
status: public
title: On the Impossibility of Tight Cryptographic Reductions
type: conference
user_id: '38235'
year: '2016'
...
