---
_id: '65525'
author:
- first_name: Eileen
  full_name: Reckmann, Eileen
  id: '101166'
  last_name: Reckmann
- first_name: Katrin
  full_name: Temmen, Katrin
  id: '30086'
  last_name: Temmen
citation:
  ama: 'Reckmann E, Temmen K. Beforschung eines MINT Clusters – erste Ergebnisse und
    weitere Schritte. In: ; 2025.'
  apa: Reckmann, E., &#38; Temmen, K. (2025). <i>Beforschung eines MINT Clusters –
    erste Ergebnisse und weitere Schritte</i>. 20. LeLa-Jahrestagung, Oldenburg.
  bibtex: '@inproceedings{Reckmann_Temmen_2025, title={Beforschung eines MINT Clusters
    – erste Ergebnisse und weitere Schritte}, author={Reckmann, Eileen and Temmen,
    Katrin}, year={2025} }'
  chicago: Reckmann, Eileen, and Katrin Temmen. “Beforschung Eines MINT Clusters –
    Erste Ergebnisse Und Weitere Schritte,” 2025.
  ieee: E. Reckmann and K. Temmen, “Beforschung eines MINT Clusters – erste Ergebnisse
    und weitere Schritte,” presented at the 20. LeLa-Jahrestagung, Oldenburg, 2025.
  mla: Reckmann, Eileen, and Katrin Temmen. <i>Beforschung Eines MINT Clusters – Erste
    Ergebnisse Und Weitere Schritte</i>. 2025.
  short: 'E. Reckmann, K. Temmen, in: 2025.'
conference:
  end_date: 2025-03-11
  location: Oldenburg
  name: 20. LeLa-Jahrestagung
  start_date: 2025-03-09
date_created: 2026-04-30T08:19:03Z
date_updated: 2026-04-30T08:19:21Z
language:
- iso: eng
status: public
title: Beforschung eines MINT Clusters – erste Ergebnisse und weitere Schritte
type: conference_abstract
user_id: '101166'
year: '2025'
...
---
_id: '65528'
article_number: '104362'
author:
- first_name: Adam
  full_name: Janovsky, Adam
  last_name: Janovsky
- first_name: Łukasz
  full_name: Chmielewski, Łukasz
  last_name: Chmielewski
- first_name: Petr
  full_name: Svenda, Petr
  last_name: Svenda
- first_name: Jan
  full_name: Jancar, Jan
  last_name: Jancar
- first_name: Vashek
  full_name: Matyas, Vashek
  last_name: Matyas
citation:
  ama: Janovsky A, Chmielewski Ł, Svenda P, Jancar J, Matyas V. Revisiting the analysis
    of references among Common Criteria certified products. <i>Computers &#38;amp;
    Security</i>. 2025;152. doi:<a href="https://doi.org/10.1016/j.cose.2025.104362">10.1016/j.cose.2025.104362</a>
  apa: Janovsky, A., Chmielewski, Ł., Svenda, P., Jancar, J., &#38; Matyas, V. (2025).
    Revisiting the analysis of references among Common Criteria certified products.
    <i>Computers &#38;amp; Security</i>, <i>152</i>, Article 104362. <a href="https://doi.org/10.1016/j.cose.2025.104362">https://doi.org/10.1016/j.cose.2025.104362</a>
  bibtex: '@article{Janovsky_Chmielewski_Svenda_Jancar_Matyas_2025, title={Revisiting
    the analysis of references among Common Criteria certified products}, volume={152},
    DOI={<a href="https://doi.org/10.1016/j.cose.2025.104362">10.1016/j.cose.2025.104362</a>},
    number={104362}, journal={Computers &#38;amp; Security}, publisher={Elsevier BV},
    author={Janovsky, Adam and Chmielewski, Łukasz and Svenda, Petr and Jancar, Jan
    and Matyas, Vashek}, year={2025} }'
  chicago: Janovsky, Adam, Łukasz Chmielewski, Petr Svenda, Jan Jancar, and Vashek
    Matyas. “Revisiting the Analysis of References among Common Criteria Certified
    Products.” <i>Computers &#38;amp; Security</i> 152 (2025). <a href="https://doi.org/10.1016/j.cose.2025.104362">https://doi.org/10.1016/j.cose.2025.104362</a>.
  ieee: 'A. Janovsky, Ł. Chmielewski, P. Svenda, J. Jancar, and V. Matyas, “Revisiting
    the analysis of references among Common Criteria certified products,” <i>Computers
    &#38;amp; Security</i>, vol. 152, Art. no. 104362, 2025, doi: <a href="https://doi.org/10.1016/j.cose.2025.104362">10.1016/j.cose.2025.104362</a>.'
  mla: Janovsky, Adam, et al. “Revisiting the Analysis of References among Common
    Criteria Certified Products.” <i>Computers &#38;amp; Security</i>, vol. 152, 104362,
    Elsevier BV, 2025, doi:<a href="https://doi.org/10.1016/j.cose.2025.104362">10.1016/j.cose.2025.104362</a>.
  short: A. Janovsky, Ł. Chmielewski, P. Svenda, J. Jancar, V. Matyas, Computers &#38;amp;
    Security 152 (2025).
date_created: 2026-04-30T09:26:42Z
date_updated: 2026-04-30T09:32:20Z
doi: 10.1016/j.cose.2025.104362
intvolume: '       152'
language:
- iso: eng
publication: Computers &amp; Security
publication_identifier:
  issn:
  - 0167-4048
publication_status: published
publisher: Elsevier BV
status: public
title: Revisiting the analysis of references among Common Criteria certified products
type: journal_article
user_id: '125442'
volume: 152
year: '2025'
...
---
_id: '65526'
author:
- first_name: Jan
  full_name: JANCAR, Jan
  last_name: JANCAR
- first_name: Petr
  full_name: SVENDA, Petr
  last_name: SVENDA
- first_name: Marek
  full_name: SYS, Marek
  last_name: SYS
citation:
  ama: 'JANCAR J, SVENDA P, SYS M. ROCA and Minerva Vulnerabilities. In: <i>Embedded
    Cryptography 3</i>. Wiley; 2025. doi:<a href="https://doi.org/10.1002/9781394351930.ch10">10.1002/9781394351930.ch10</a>'
  apa: JANCAR, J., SVENDA, P., &#38; SYS, M. (2025). ROCA and Minerva Vulnerabilities.
    In <i>Embedded Cryptography 3</i>. Wiley. <a href="https://doi.org/10.1002/9781394351930.ch10">https://doi.org/10.1002/9781394351930.ch10</a>
  bibtex: '@inbook{JANCAR_SVENDA_SYS_2025, title={ROCA and Minerva Vulnerabilities},
    DOI={<a href="https://doi.org/10.1002/9781394351930.ch10">10.1002/9781394351930.ch10</a>},
    booktitle={Embedded Cryptography 3}, publisher={Wiley}, author={JANCAR, Jan and
    SVENDA, Petr and SYS, Marek}, year={2025} }'
  chicago: JANCAR, Jan, Petr SVENDA, and Marek SYS. “ROCA and Minerva Vulnerabilities.”
    In <i>Embedded Cryptography 3</i>. Wiley, 2025. <a href="https://doi.org/10.1002/9781394351930.ch10">https://doi.org/10.1002/9781394351930.ch10</a>.
  ieee: J. JANCAR, P. SVENDA, and M. SYS, “ROCA and Minerva Vulnerabilities,” in <i>Embedded
    Cryptography 3</i>, Wiley, 2025.
  mla: JANCAR, Jan, et al. “ROCA and Minerva Vulnerabilities.” <i>Embedded Cryptography
    3</i>, Wiley, 2025, doi:<a href="https://doi.org/10.1002/9781394351930.ch10">10.1002/9781394351930.ch10</a>.
  short: 'J. JANCAR, P. SVENDA, M. SYS, in: Embedded Cryptography 3, Wiley, 2025.'
date_created: 2026-04-30T09:26:23Z
date_updated: 2026-04-30T09:32:17Z
doi: 10.1002/9781394351930.ch10
language:
- iso: eng
publication: Embedded Cryptography 3
publication_identifier:
  isbn:
  - '9781789452150'
  - '9781394351930'
publication_status: published
publisher: Wiley
status: public
title: ROCA and Minerva Vulnerabilities
type: book_chapter
user_id: '125442'
year: '2025'
...
---
_id: '65537'
abstract:
- lang: eng
  text: '<jats:p>It is a widely accepted standard practice to implement cryptographic
    software so that secret inputs do not influence the cycle count. Software following
    this paradigm is often referred to as “constant-time” software and typically involves
    following three rules: 1) never branch on a secret-dependent condition, 2) never
    access memory at a secret-dependent location, and 3) avoid variable-time arithmetic
    operations on secret data. The third rule requires knowledge about such variable-time
    arithmetic instructions, or vice versa, which operations are safe to use on secret
    inputs. For a long time, this knowledge was based on either documentation or microbenchmarks,
    but critically, there were never any guarantees for future microarchitectures.
    This changed with the introduction of the data-operand-independent-timing (DOIT)
    mode on Intel CPUs and, to some extent, the data-independent-timing (DIT) mode
    on Arm CPUs. Both Intel and Arm document a subset of their respective instruction
    sets that are intended to leak no information about their inputs through timing,
    even on future microarchitectures if the CPU is set to run in a dedicated DOIT
    (or DIT) mode.In this paper, we present a principled solution that leverages DOIT
    to enable cryptographic software that is future-proof constant-time, in the sense
    that it ensures that only instructions from the DOIT subset are used to operate
    on secret data, even during speculative execution after a mispredicted branch
    or function return location. For this solution, we build on top of existing security
    type systems in the Jasmin framework for high-assurance cryptography.We then use
    our solution to evaluate the extent to which existing cryptographic software built
    to be “constant-time” is already secure in this stricter paradigm implied by DOIT
    and what the performance impact is to move from constant-time to future-proof
    constant-time.</jats:p>'
author:
- first_name: Santiago
  full_name: Arranz-Olmos, Santiago
  last_name: Arranz-Olmos
- first_name: Gilles
  full_name: Barthe, Gilles
  last_name: Barthe
- first_name: Benjamin
  full_name: Grégoire, Benjamin
  last_name: Grégoire
- first_name: Jan
  full_name: Jancar, Jan
  last_name: Jancar
- first_name: Vincent
  full_name: Laporte, Vincent
  last_name: Laporte
- first_name: Tiago
  full_name: Oliveira, Tiago
  last_name: Oliveira
- first_name: Peter
  full_name: Schwabe, Peter
  last_name: Schwabe
citation:
  ama: 'Arranz-Olmos S, Barthe G, Grégoire B, et al. Let’s DOIT: Using Intel’s Extended
    HW/SW Contract for Secure Compilation of Crypto Code. <i>IACR Transactions on
    Cryptographic Hardware and Embedded Systems</i>. 2025;2025(3):644-667. doi:<a
    href="https://doi.org/10.46586/tches.v2025.i3.644-667">10.46586/tches.v2025.i3.644-667</a>'
  apa: 'Arranz-Olmos, S., Barthe, G., Grégoire, B., Jancar, J., Laporte, V., Oliveira,
    T., &#38; Schwabe, P. (2025). Let’s DOIT: Using Intel’s Extended HW/SW Contract
    for Secure Compilation of Crypto Code. <i>IACR Transactions on Cryptographic Hardware
    and Embedded Systems</i>, <i>2025</i>(3), 644–667. <a href="https://doi.org/10.46586/tches.v2025.i3.644-667">https://doi.org/10.46586/tches.v2025.i3.644-667</a>'
  bibtex: '@article{Arranz-Olmos_Barthe_Grégoire_Jancar_Laporte_Oliveira_Schwabe_2025,
    title={Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation
    of Crypto Code}, volume={2025}, DOI={<a href="https://doi.org/10.46586/tches.v2025.i3.644-667">10.46586/tches.v2025.i3.644-667</a>},
    number={3}, journal={IACR Transactions on Cryptographic Hardware and Embedded
    Systems}, publisher={Universitatsbibliothek der Ruhr-Universitat Bochum}, author={Arranz-Olmos,
    Santiago and Barthe, Gilles and Grégoire, Benjamin and Jancar, Jan and Laporte,
    Vincent and Oliveira, Tiago and Schwabe, Peter}, year={2025}, pages={644–667}
    }'
  chicago: 'Arranz-Olmos, Santiago, Gilles Barthe, Benjamin Grégoire, Jan Jancar,
    Vincent Laporte, Tiago Oliveira, and Peter Schwabe. “Let’s DOIT: Using Intel’s
    Extended HW/SW Contract for Secure Compilation of Crypto Code.” <i>IACR Transactions
    on Cryptographic Hardware and Embedded Systems</i> 2025, no. 3 (2025): 644–67.
    <a href="https://doi.org/10.46586/tches.v2025.i3.644-667">https://doi.org/10.46586/tches.v2025.i3.644-667</a>.'
  ieee: 'S. Arranz-Olmos <i>et al.</i>, “Let’s DOIT: Using Intel’s Extended HW/SW
    Contract for Secure Compilation of Crypto Code,” <i>IACR Transactions on Cryptographic
    Hardware and Embedded Systems</i>, vol. 2025, no. 3, pp. 644–667, 2025, doi: <a
    href="https://doi.org/10.46586/tches.v2025.i3.644-667">10.46586/tches.v2025.i3.644-667</a>.'
  mla: 'Arranz-Olmos, Santiago, et al. “Let’s DOIT: Using Intel’s Extended HW/SW Contract
    for Secure Compilation of Crypto Code.” <i>IACR Transactions on Cryptographic
    Hardware and Embedded Systems</i>, vol. 2025, no. 3, Universitatsbibliothek der
    Ruhr-Universitat Bochum, 2025, pp. 644–67, doi:<a href="https://doi.org/10.46586/tches.v2025.i3.644-667">10.46586/tches.v2025.i3.644-667</a>.'
  short: S. Arranz-Olmos, G. Barthe, B. Grégoire, J. Jancar, V. Laporte, T. Oliveira,
    P. Schwabe, IACR Transactions on Cryptographic Hardware and Embedded Systems 2025
    (2025) 644–667.
date_created: 2026-04-30T09:31:53Z
date_updated: 2026-04-30T09:32:27Z
doi: 10.46586/tches.v2025.i3.644-667
intvolume: '      2025'
issue: '3'
page: 644-667
publication: IACR Transactions on Cryptographic Hardware and Embedded Systems
publication_identifier:
  issn:
  - 2569-2925
publication_status: published
publisher: Universitatsbibliothek der Ruhr-Universitat Bochum
status: public
title: 'Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of
  Crypto Code'
type: journal_article
user_id: '125442'
volume: 2025
year: '2025'
...
---
_id: '65538'
abstract:
- lang: eng
  text: <jats:p>Developers implementing elliptic curve cryptography (ECC) face a wide
    range of implementation choices created by decades of research into elliptic curves.
    The literature on elliptic curves offers a plethora of curve models, scalar multipliers,
    and addition formulas, but this comes with the price of enabling attacks to also
    use the rich structure of these techniques. Navigating through this area is not
    an easy task and developers often obscure their choices, especially in black-box
    hardware implementations. Since side-channel attackers rely on the knowledge of
    the implementation details, reverse engineering becomes a crucial part of attacks.This
    work presents ECTester – a tool for testing black-box ECC implementations. Through
    various test suites, ECTester observes the behavior of the target implementation
    against known attacks but also non-standard inputs and elliptic curve parameters.
    We analyze popular ECC libraries and smartcards and show that some libraries and
    most smartcards do not check the order of the input points and improperly handle
    the infinity point. Based on these observations, we design new techniques for
    reverse engineering scalar randomization countermeasures that are able to distinguish
    between group scalar randomization, additive, multiplicative or Euclidean splitting.
    Our techniques do not require side-channel measurements; they only require the
    ability to set custom domain parameters, and are able to extract not only the
    size but also the exact value of the random mask used. Using the techniques, we
    successfully reverse-engineered the countermeasures on 13 cryptographic smartcards
    from 5 major manufacturers – all but one we tested on. Finally, we discuss what
    mitigations can be applied to prevent such reverse engineering, and whether it
    is possible at all.</jats:p>
author:
- first_name: Vojtech
  full_name: Suchanek, Vojtech
  last_name: Suchanek
- first_name: Jan
  full_name: Jancar, Jan
  last_name: Jancar
- first_name: Jan
  full_name: Kvapil, Jan
  last_name: Kvapil
- first_name: Petr
  full_name: Svenda, Petr
  last_name: Svenda
- first_name: Łukasz
  full_name: Chmielewski, Łukasz
  last_name: Chmielewski
citation:
  ama: 'Suchanek V, Jancar J, Kvapil J, Svenda P, Chmielewski Ł. ECTester: Reverse-engineering
    side-channel countermeasures of ECC implementations. <i>IACR Transactions on Cryptographic
    Hardware and Embedded Systems</i>. 2025;2025(4):290-316. doi:<a href="https://doi.org/10.46586/tches.v2025.i4.290-316">10.46586/tches.v2025.i4.290-316</a>'
  apa: 'Suchanek, V., Jancar, J., Kvapil, J., Svenda, P., &#38; Chmielewski, Ł. (2025).
    ECTester: Reverse-engineering side-channel countermeasures of ECC implementations.
    <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>, <i>2025</i>(4),
    290–316. <a href="https://doi.org/10.46586/tches.v2025.i4.290-316">https://doi.org/10.46586/tches.v2025.i4.290-316</a>'
  bibtex: '@article{Suchanek_Jancar_Kvapil_Svenda_Chmielewski_2025, title={ECTester:
    Reverse-engineering side-channel countermeasures of ECC implementations}, volume={2025},
    DOI={<a href="https://doi.org/10.46586/tches.v2025.i4.290-316">10.46586/tches.v2025.i4.290-316</a>},
    number={4}, journal={IACR Transactions on Cryptographic Hardware and Embedded
    Systems}, publisher={Universitatsbibliothek der Ruhr-Universitat Bochum}, author={Suchanek,
    Vojtech and Jancar, Jan and Kvapil, Jan and Svenda, Petr and Chmielewski, Łukasz},
    year={2025}, pages={290–316} }'
  chicago: 'Suchanek, Vojtech, Jan Jancar, Jan Kvapil, Petr Svenda, and Łukasz Chmielewski.
    “ECTester: Reverse-Engineering Side-Channel Countermeasures of ECC Implementations.”
    <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i> 2025,
    no. 4 (2025): 290–316. <a href="https://doi.org/10.46586/tches.v2025.i4.290-316">https://doi.org/10.46586/tches.v2025.i4.290-316</a>.'
  ieee: 'V. Suchanek, J. Jancar, J. Kvapil, P. Svenda, and Ł. Chmielewski, “ECTester:
    Reverse-engineering side-channel countermeasures of ECC implementations,” <i>IACR
    Transactions on Cryptographic Hardware and Embedded Systems</i>, vol. 2025, no.
    4, pp. 290–316, 2025, doi: <a href="https://doi.org/10.46586/tches.v2025.i4.290-316">10.46586/tches.v2025.i4.290-316</a>.'
  mla: 'Suchanek, Vojtech, et al. “ECTester: Reverse-Engineering Side-Channel Countermeasures
    of ECC Implementations.” <i>IACR Transactions on Cryptographic Hardware and Embedded
    Systems</i>, vol. 2025, no. 4, Universitatsbibliothek der Ruhr-Universitat Bochum,
    2025, pp. 290–316, doi:<a href="https://doi.org/10.46586/tches.v2025.i4.290-316">10.46586/tches.v2025.i4.290-316</a>.'
  short: V. Suchanek, J. Jancar, J. Kvapil, P. Svenda, Ł. Chmielewski, IACR Transactions
    on Cryptographic Hardware and Embedded Systems 2025 (2025) 290–316.
date_created: 2026-04-30T09:31:59Z
date_updated: 2026-04-30T09:32:25Z
doi: 10.46586/tches.v2025.i4.290-316
intvolume: '      2025'
issue: '4'
page: 290-316
publication: IACR Transactions on Cryptographic Hardware and Embedded Systems
publication_identifier:
  issn:
  - 2569-2925
publication_status: published
publisher: Universitatsbibliothek der Ruhr-Universitat Bochum
status: public
title: 'ECTester: Reverse-engineering side-channel countermeasures of ECC implementations'
type: journal_article
user_id: '125442'
volume: 2025
year: '2025'
...
---
_id: '50272'
abstract:
- lang: eng
  text: "Despite the fundamental role the Quantum Satisfiability (QSAT) problem has\r\nplayed
    in quantum complexity theory, a central question remains open: At which\r\nlocal
    dimension does the complexity of QSAT transition from \"easy\" to \"hard\"?\r\nHere,
    we study QSAT with each constraint acting on a $k$-dimensional and\r\n$l$-dimensional
    qudit pair, denoted $(k,l)$-QSAT. Our first main result shows\r\nthat, surprisingly,
    QSAT on qubits can remain $\\mathsf{QMA}_1$-hard, in that\r\n$(2,5)$-QSAT is $\\mathsf{QMA}_1$-complete.
    In contrast, $2$-SAT on qubits is\r\nwell-known to be poly-time solvable [Bravyi,
    2006]. Our second main result\r\nproves that $(3,d)$-QSAT on the 1D line with
    $d\\in O(1)$ is also\r\n$\\mathsf{QMA}_1$-hard. Finally, we initiate the study
    of 1D $(2,d)$-QSAT by\r\ngiving a frustration-free 1D Hamiltonian with a unique,
    entangled ground state.\r\n  Our first result uses a direct embedding, combining
    a novel clock\r\nconstruction with the 2D circuit-to-Hamiltonian construction
    of [Gosset, Nagaj,\r\n2013]. Of note is a new simplified and analytic proof for
    the latter (as\r\nopposed to a partially numeric proof in [GN13]). This exploits
    Unitary Labelled\r\nGraphs [Bausch, Cubitt, Ozols, 2017] together with a new \"Nullspace
    Connection\r\nLemma\", allowing us to break low energy analyses into small patches
    of\r\nprojectors, and to improve the soundness analysis of [GN13] from\r\n$\\Omega(1/T^6)$
    to $\\Omega(1/T^2)$, for $T$ the number of gates. Our second\r\nresult goes via
    black-box reduction: Given an arbitrary 1D Hamiltonian $H$ on\r\n$d'$-dimensional
    qudits, we show how to embed it into an effective null-space\r\nof a 1D $(3,d)$-QSAT
    instance, for $d\\in O(1)$. Our approach may be viewed as a\r\nweaker notion of
    \"simulation\" (\\`a la [Bravyi, Hastings 2017], [Cubitt,\r\nMontanaro, Piddock
    2018]). As far as we are aware, this gives the first\r\n\"black-box simulation\"-based
    $\\mathsf{QMA}_1$-hardness result, i.e. for\r\nfrustration-free Hamiltonians."
author:
- first_name: Dorian
  full_name: Rudolph, Dorian
  id: '57863'
  last_name: Rudolph
- first_name: Sevag
  full_name: Gharibian, Sevag
  id: '71541'
  last_name: Gharibian
  orcid: 0000-0002-9992-3379
- first_name: Daniel
  full_name: Nagaj, Daniel
  last_name: Nagaj
citation:
  ama: 'Rudolph D, Gharibian S, Nagaj D. Quantum 2-SAT on low dimensional systems
    is $\mathsf{QMA}_1$-complete:  Direct embeddings and black-box simulation. In:
    <i>16th Innovations in Theoretical Computer Science (ITCS)</i>. Vol 325. ; 2025:1-24.
    doi:<a href="https://doi.org/10.4230/LIPIcs.ITCS.2025.85">10.4230/LIPIcs.ITCS.2025.85</a>'
  apa: Rudolph, D., Gharibian, S., &#38; Nagaj, D. (2025). Quantum 2-SAT on low dimensional
    systems is $\mathsf{QMA}_1$-complete:  Direct embeddings and black-box simulation.
    <i>16th Innovations in Theoretical Computer Science (ITCS)</i>, <i>325</i>(85),
    1–24. <a href="https://doi.org/10.4230/LIPIcs.ITCS.2025.85">https://doi.org/10.4230/LIPIcs.ITCS.2025.85</a>
  bibtex: '@inproceedings{Rudolph_Gharibian_Nagaj_2025, title={Quantum 2-SAT on low
    dimensional systems is $\mathsf{QMA}_1$-complete:  Direct embeddings and black-box
    simulation}, volume={325}, DOI={<a href="https://doi.org/10.4230/LIPIcs.ITCS.2025.85">10.4230/LIPIcs.ITCS.2025.85</a>},
    number={85}, booktitle={16th Innovations in Theoretical Computer Science (ITCS)},
    author={Rudolph, Dorian and Gharibian, Sevag and Nagaj, Daniel}, year={2025},
    pages={1–24} }'
  chicago: Rudolph, Dorian, Sevag Gharibian, and Daniel Nagaj. “Quantum 2-SAT on Low
    Dimensional Systems Is $\mathsf{QMA}_1$-Complete:  Direct Embeddings and Black-Box
    Simulation.” In <i>16th Innovations in Theoretical Computer Science (ITCS)</i>,
    325:1–24, 2025. <a href="https://doi.org/10.4230/LIPIcs.ITCS.2025.85">https://doi.org/10.4230/LIPIcs.ITCS.2025.85</a>.
  ieee: 'D. Rudolph, S. Gharibian, and D. Nagaj, “Quantum 2-SAT on low dimensional
    systems is $\mathsf{QMA}_1$-complete:  Direct embeddings and black-box simulation,”
    in <i>16th Innovations in Theoretical Computer Science (ITCS)</i>, 2025, vol.
    325, no. 85, pp. 1–24, doi: <a href="https://doi.org/10.4230/LIPIcs.ITCS.2025.85">10.4230/LIPIcs.ITCS.2025.85</a>.'
  mla: Rudolph, Dorian, et al. “Quantum 2-SAT on Low Dimensional Systems Is $\mathsf{QMA}_1$-Complete: 
    Direct Embeddings and Black-Box Simulation.” <i>16th Innovations in Theoretical
    Computer Science (ITCS)</i>, vol. 325, no. 85, 2025, pp. 1–24, doi:<a href="https://doi.org/10.4230/LIPIcs.ITCS.2025.85">10.4230/LIPIcs.ITCS.2025.85</a>.
  short: 'D. Rudolph, S. Gharibian, D. Nagaj, in: 16th Innovations in Theoretical
    Computer Science (ITCS), 2025, pp. 1–24.'
date_created: 2024-01-07T20:09:13Z
date_updated: 2026-04-30T14:10:03Z
doi: 10.4230/LIPIcs.ITCS.2025.85
external_id:
  arxiv:
  - '2401.02368'
intvolume: '       325'
issue: '85'
language:
- iso: eng
page: 1-24
publication: 16th Innovations in Theoretical Computer Science (ITCS)
publication_status: published
status: public
title: 'Quantum 2-SAT on low dimensional systems is $\mathsf{QMA}_1$-complete:  Direct
  embeddings and black-box simulation'
type: conference
user_id: '71541'
volume: 325
year: '2025'
...
---
_id: '61776'
abstract:
- lang: eng
  text: "We investigate the role of energy, i.e. average photon number, as a resource\r\nin
    the computational complexity of bosonic systems. We show three sets of\r\nresults:
    (1. Energy growth rates) There exist bosonic gate sets which increase\r\nenergy
    incredibly rapidly, obtaining e.g. infinite energy in finite/constant\r\ntime.
    We prove these high energies can make computing properties of bosonic\r\ncomputations,
    such as deciding whether a given computation will attain infinite\r\nenergy, extremely
    difficult, formally undecidable. (2. Lower bounds on\r\ncomputational power) More
    energy ``='' more computational power. For example,\r\ncertain gate sets allow
    poly-time bosonic computations to simulate PTOWER, the\r\nset of deterministic
    computations whose runtime scales as a tower of\r\nexponentials with polynomial
    height. Even just exponential energy and $O(1)$\r\nmodes suffice to simulate NP,
    which, importantly, is a setup similar to that of\r\nthe recent bosonic factoring
    algorithm of [Brenner, Caha, Coiteux-Roy and\r\nKoenig (2024)]. For simpler gate
    sets, we show an energy hierarchy theorem. (3.\r\nUpper bounds on computational
    power) Bosonic computations with polynomial\r\nenergy can be simulated in BQP,
    ``physical'' bosonic computations with\r\narbitrary finite energy are decidable,
    and the gate set consisting of Gaussian\r\ngates and the cubic phase gate can
    be simulated in PP, with exponential bound\r\non energy, improving upon the previous
    PSPACE upper bound. Finally, combining\r\nupper and lower bounds yields no-go
    theorems for a continuous-variable\r\nSolovay--Kitaev theorem for gate sets such
    as the Gaussian and cubic phase\r\ngates."
author:
- first_name: Ulysse
  full_name: Chabaud, Ulysse
  last_name: Chabaud
- first_name: Sevag
  full_name: Gharibian, Sevag
  id: '71541'
  last_name: Gharibian
  orcid: 0000-0002-9992-3379
- first_name: Saeed
  full_name: Mehraban, Saeed
  last_name: Mehraban
- first_name: Arsalan
  full_name: Motamedi, Arsalan
  last_name: Motamedi
- first_name: Hamid Reza
  full_name: Naeij, Hamid Reza
  last_name: Naeij
- first_name: Dorian
  full_name: Rudolph, Dorian
  id: '57863'
  last_name: Rudolph
- first_name: Dhruva
  full_name: Sambrani, Dhruva
  last_name: Sambrani
citation:
  ama: Chabaud U, Gharibian S, Mehraban S, et al. Energy, Bosons and Computational
    Complexity. <i>arXiv:251008545</i>. Published online 2025.
  apa: Chabaud, U., Gharibian, S., Mehraban, S., Motamedi, A., Naeij, H. R., Rudolph,
    D., &#38; Sambrani, D. (2025). Energy, Bosons and Computational Complexity. In
    <i>arXiv:2510.08545</i>.
  bibtex: '@article{Chabaud_Gharibian_Mehraban_Motamedi_Naeij_Rudolph_Sambrani_2025,
    title={Energy, Bosons and Computational Complexity}, journal={arXiv:2510.08545},
    author={Chabaud, Ulysse and Gharibian, Sevag and Mehraban, Saeed and Motamedi,
    Arsalan and Naeij, Hamid Reza and Rudolph, Dorian and Sambrani, Dhruva}, year={2025}
    }'
  chicago: Chabaud, Ulysse, Sevag Gharibian, Saeed Mehraban, Arsalan Motamedi, Hamid
    Reza Naeij, Dorian Rudolph, and Dhruva Sambrani. “Energy, Bosons and Computational
    Complexity.” <i>ArXiv:2510.08545</i>, 2025.
  ieee: U. Chabaud <i>et al.</i>, “Energy, Bosons and Computational Complexity,” <i>arXiv:2510.08545</i>.
    2025.
  mla: Chabaud, Ulysse, et al. “Energy, Bosons and Computational Complexity.” <i>ArXiv:2510.08545</i>,
    2025.
  short: U. Chabaud, S. Gharibian, S. Mehraban, A. Motamedi, H.R. Naeij, D. Rudolph,
    D. Sambrani, ArXiv:2510.08545 (2025).
date_created: 2025-10-10T13:44:52Z
date_updated: 2026-04-30T14:08:24Z
external_id:
  arxiv:
  - '2510.08545'
language:
- iso: eng
publication: arXiv:2510.08545
status: public
title: Energy, Bosons and Computational Complexity
type: preprint
user_id: '71541'
year: '2025'
...
---
_id: '61778'
abstract:
- lang: eng
  text: "Understanding the entanglement structure of local Hamiltonian ground spaces\r\nis
    a physically motivated problem, with applications ranging from tensor\r\nnetwork
    design to quantum error-correcting codes. To this end, we study the\r\ncomplexity
    of estimating ground state entanglement, and more generally entropy\r\nestimation
    for low energy states and Gibbs states. We find, in particular, that\r\nthe classes
    qq-QAM [Kobayashi, le Gall, Nishimura, SICOMP 2019] (a quantum\r\nanalogue of
    public-coin AM) and QMA(2) (QMA with unentangled proofs) play a\r\ncrucial role
    for such problems, showing: (1) Detecting a high-entanglement\r\nground state
    is qq-QAM-complete, (2) computing an additive error approximation\r\nto the Helmholtz
    free energy (equivalently, a multiplicative error\r\napproximation to the partition
    function) is in qq-QAM, (3) detecting a\r\nlow-entanglement ground state is QMA(2)-hard,
    and (4) detecting low energy\r\nstates which are close to product states can range
    from QMA-complete to\r\nQMA(2)-complete. Our results make progress on an open
    question of [Bravyi,\r\nChowdhury, Gosset and Wocjan, Nature Physics 2022] on
    free energy, and yield\r\nthe first QMA(2)-complete Hamiltonian problem using
    local Hamiltonians (cf. the\r\nsparse QMA(2)-complete Hamiltonian problem of [Chailloux,
    Sattath, CCC 2012])."
author:
- first_name: Sevag
  full_name: Gharibian, Sevag
  id: '71541'
  last_name: Gharibian
  orcid: 0000-0002-9992-3379
- first_name: Jonas
  full_name: Kamminga, Jonas
  last_name: Kamminga
citation:
  ama: Gharibian S, Kamminga J. On the complexity of estimating ground state entanglement
    and free  energy. <i>arXiv:251006796</i>. Published online 2025.
  apa: Gharibian, S., &#38; Kamminga, J. (2025). On the complexity of estimating ground
    state entanglement and free  energy. In <i>arXiv:2510.06796</i>.
  bibtex: '@article{Gharibian_Kamminga_2025, title={On the complexity of estimating
    ground state entanglement and free  energy}, journal={arXiv:2510.06796}, author={Gharibian,
    Sevag and Kamminga, Jonas}, year={2025} }'
  chicago: Gharibian, Sevag, and Jonas Kamminga. “On the Complexity of Estimating
    Ground State Entanglement and Free  Energy.” <i>ArXiv:2510.06796</i>, 2025.
  ieee: S. Gharibian and J. Kamminga, “On the complexity of estimating ground state
    entanglement and free  energy,” <i>arXiv:2510.06796</i>. 2025.
  mla: Gharibian, Sevag, and Jonas Kamminga. “On the Complexity of Estimating Ground
    State Entanglement and Free  Energy.” <i>ArXiv:2510.06796</i>, 2025.
  short: S. Gharibian, J. Kamminga, ArXiv:2510.06796 (2025).
date_created: 2025-10-10T13:45:28Z
date_updated: 2026-04-30T14:08:44Z
department:
- _id: '7'
- _id: '623'
external_id:
  arxiv:
  - '2510.06796'
language:
- iso: eng
publication: arXiv:2510.06796
status: public
title: On the complexity of estimating ground state entanglement and free  energy
type: preprint
user_id: '71541'
year: '2025'
...
---
_id: '61164'
abstract:
- lang: eng
  text: <jats:p>Building on and methodologically extending conceptual metaphor theory,
    the article examines how personal agency as a discursively produced sociopsychological
    phenomenon can be studied in elicited metaphors through a discourse-analytical
    approach. More concretely, the study illustrates how early-career researchers
    experience and express their agency in research writing through personal metaphors
    of academic writing such as riding a roller coaster or baking a wedding cake.
    A two-step discursive analysis adapts Hopper and Thompson's multidimensional approach
    to linguistic transitivity to study agency in language. The analytical approach
    involves both an in-depth parametrized analysis of all metaphors in the sample
    and a qualitative cross-analysis of the data. The results show that the participants'
    metaphors reflect both nuanced personal experiences and cultural expectations
    of academic writing, the writer, and the text. This emphasizes that research writing
    is not only a highly subjective practice but also one that is socially and culturally
    influenced. The article argues that research on agency thus needs elaborate methodological
    tools to trace discursive and sociopsychological trajectories of complex socio-cognitive
    practices like academic writing. This has implications not only for the nexus
    of research writing, identity, and academic enculturation but also for other fields
    focusing on agency in language.</jats:p>
article_number: '1567498'
author:
- first_name: Andrea
  full_name: Karsten, Andrea
  last_name: Karsten
citation:
  ama: Karsten A. Understanding personal agency through metaphor, or Why academic
    writing is (not) like a roller-coaster ride. <i>Frontiers in Language Sciences</i>.
    2025;4. doi:<a href="https://doi.org/10.3389/flang.2025.1567498">10.3389/flang.2025.1567498</a>
  apa: Karsten, A. (2025). Understanding personal agency through metaphor, or Why
    academic writing is (not) like a roller-coaster ride. <i>Frontiers in Language
    Sciences</i>, <i>4</i>, Article 1567498. <a href="https://doi.org/10.3389/flang.2025.1567498">https://doi.org/10.3389/flang.2025.1567498</a>
  bibtex: '@article{Karsten_2025, title={Understanding personal agency through metaphor,
    or Why academic writing is (not) like a roller-coaster ride}, volume={4}, DOI={<a
    href="https://doi.org/10.3389/flang.2025.1567498">10.3389/flang.2025.1567498</a>},
    number={1567498}, journal={Frontiers in Language Sciences}, publisher={Frontiers
    Media SA}, author={Karsten, Andrea}, year={2025} }'
  chicago: Karsten, Andrea. “Understanding Personal Agency through Metaphor, or Why
    Academic Writing Is (Not) like a Roller-Coaster Ride.” <i>Frontiers in Language
    Sciences</i> 4 (2025). <a href="https://doi.org/10.3389/flang.2025.1567498">https://doi.org/10.3389/flang.2025.1567498</a>.
  ieee: 'A. Karsten, “Understanding personal agency through metaphor, or Why academic
    writing is (not) like a roller-coaster ride,” <i>Frontiers in Language Sciences</i>,
    vol. 4, Art. no. 1567498, 2025, doi: <a href="https://doi.org/10.3389/flang.2025.1567498">10.3389/flang.2025.1567498</a>.'
  mla: Karsten, Andrea. “Understanding Personal Agency through Metaphor, or Why Academic
    Writing Is (Not) like a Roller-Coaster Ride.” <i>Frontiers in Language Sciences</i>,
    vol. 4, 1567498, Frontiers Media SA, 2025, doi:<a href="https://doi.org/10.3389/flang.2025.1567498">10.3389/flang.2025.1567498</a>.
  short: A. Karsten, Frontiers in Language Sciences 4 (2025).
date_created: 2025-09-10T10:50:30Z
date_updated: 2026-05-06T08:37:28Z
doi: 10.3389/flang.2025.1567498
intvolume: '         4'
publication: Frontiers in Language Sciences
publication_identifier:
  issn:
  - 2813-4605
publication_status: published
publisher: Frontiers Media SA
status: public
title: Understanding personal agency through metaphor, or Why academic writing is
  (not) like a roller-coaster ride
type: journal_article
user_id: '53917'
volume: 4
year: '2025'
...
---
_id: '65564'
author:
- first_name: Stefan Teodorov
  full_name: Lazarov, Stefan Teodorov
  id: '90345'
  last_name: Lazarov
  orcid: 0009-0009-0892-9483
- first_name: Olcay
  full_name: Türk, Olcay
  last_name: Türk
- first_name: Angela
  full_name: Grimminger, Angela
  id: '57578'
  last_name: Grimminger
- first_name: 'Petra '
  full_name: 'Wagner, Petra '
  last_name: Wagner
- first_name: Hendrik
  full_name: Buschmeier, Hendrik
  last_name: Buschmeier
citation:
  ama: Lazarov ST, Türk O, Grimminger A, Wagner P, Buschmeier H. <i>Annotation Schemes
    Project A02 “Monitoring the Understanding of Explanations.”</i> LibreCat University;
    2025. doi:<a href="https://doi.org/10.17605/OSF.IO/J2DHA">10.17605/OSF.IO/J2DHA</a>
  apa: Lazarov, S. T., Türk, O., Grimminger, A., Wagner, P., &#38; Buschmeier, H.
    (2025). <i>Annotation Schemes Project A02 “Monitoring the understanding of explanations.”</i>
    LibreCat University. <a href="https://doi.org/10.17605/OSF.IO/J2DHA">https://doi.org/10.17605/OSF.IO/J2DHA</a>
  bibtex: '@book{Lazarov_Türk_Grimminger_Wagner_Buschmeier_2025, title={Annotation
    Schemes Project A02 “Monitoring the understanding of explanations”}, DOI={<a href="https://doi.org/10.17605/OSF.IO/J2DHA">10.17605/OSF.IO/J2DHA</a>},
    publisher={LibreCat University}, author={Lazarov, Stefan Teodorov and Türk, Olcay
    and Grimminger, Angela and Wagner, Petra  and Buschmeier, Hendrik}, year={2025}
    }'
  chicago: Lazarov, Stefan Teodorov, Olcay Türk, Angela Grimminger, Petra  Wagner,
    and Hendrik Buschmeier. <i>Annotation Schemes Project A02 “Monitoring the Understanding
    of Explanations.”</i> LibreCat University, 2025. <a href="https://doi.org/10.17605/OSF.IO/J2DHA">https://doi.org/10.17605/OSF.IO/J2DHA</a>.
  ieee: S. T. Lazarov, O. Türk, A. Grimminger, P. Wagner, and H. Buschmeier, <i>Annotation
    Schemes Project A02 “Monitoring the understanding of explanations.”</i> LibreCat
    University, 2025.
  mla: Lazarov, Stefan Teodorov, et al. <i>Annotation Schemes Project A02 “Monitoring
    the Understanding of Explanations.”</i> LibreCat University, 2025, doi:<a href="https://doi.org/10.17605/OSF.IO/J2DHA">10.17605/OSF.IO/J2DHA</a>.
  short: S.T. Lazarov, O. Türk, A. Grimminger, P. Wagner, H. Buschmeier, Annotation
    Schemes Project A02 “Monitoring the Understanding of Explanations,” LibreCat University,
    2025.
date_created: 2026-05-05T14:09:18Z
date_updated: 2026-05-05T14:18:35Z
doi: 10.17605/OSF.IO/J2DHA
language:
- iso: eng
project:
- _id: '112'
  name: 'TRR 318; TP A02: Verstehensprozess einer Erklärung beobachten und auswerten'
publication_status: published
publisher: LibreCat University
status: public
title: Annotation Schemes Project A02 "Monitoring the understanding of explanations"
type: misc
user_id: '90345'
year: '2025'
...
---
_id: '61165'
abstract:
- lang: eng
  text: <jats:p>Building on and methodologically extending conceptual metaphor theory,
    the article examines how personal agency as a discursively produced sociopsychological
    phenomenon can be studied in elicited metaphors through a discourse-analytical
    approach. More concretely, the study illustrates how early-career researchers
    experience and express their agency in research writing through personal metaphors
    of academic writing such as riding a roller coaster or baking a wedding cake.
    A two-step discursive analysis adapts Hopper and Thompson's multidimensional approach
    to linguistic transitivity to study agency in language. The analytical approach
    involves both an in-depth parametrized analysis of all metaphors in the sample
    and a qualitative cross-analysis of the data. The results show that the participants'
    metaphors reflect both nuanced personal experiences and cultural expectations
    of academic writing, the writer, and the text. This emphasizes that research writing
    is not only a highly subjective practice but also one that is socially and culturally
    influenced. The article argues that research on agency thus needs elaborate methodological
    tools to trace discursive and sociopsychological trajectories of complex socio-cognitive
    practices like academic writing. This has implications not only for the nexus
    of research writing, identity, and academic enculturation but also for other fields
    focusing on agency in language.</jats:p>
article_number: '1567498'
author:
- first_name: Andrea Ramona
  full_name: Karsten, Andrea Ramona
  id: '53917'
  last_name: Karsten
  orcid: 0000-0003-0194-2000
citation:
  ama: Karsten AR. Understanding personal agency through metaphor, or Why academic
    writing is (not) like a roller-coaster ride. <i>Frontiers in Language Sciences</i>.
    2025;4. doi:<a href="https://doi.org/10.3389/flang.2025.1567498">10.3389/flang.2025.1567498</a>
  apa: Karsten, A. R. (2025). Understanding personal agency through metaphor, or Why
    academic writing is (not) like a roller-coaster ride. <i>Frontiers in Language
    Sciences</i>, <i>4</i>, Article 1567498. <a href="https://doi.org/10.3389/flang.2025.1567498">https://doi.org/10.3389/flang.2025.1567498</a>
  bibtex: '@article{Karsten_2025, title={Understanding personal agency through metaphor,
    or Why academic writing is (not) like a roller-coaster ride}, volume={4}, DOI={<a
    href="https://doi.org/10.3389/flang.2025.1567498">10.3389/flang.2025.1567498</a>},
    number={1567498}, journal={Frontiers in Language Sciences}, publisher={Frontiers
    Media SA}, author={Karsten, Andrea Ramona}, year={2025} }'
  chicago: Karsten, Andrea Ramona. “Understanding Personal Agency through Metaphor,
    or Why Academic Writing Is (Not) like a Roller-Coaster Ride.” <i>Frontiers in
    Language Sciences</i> 4 (2025). <a href="https://doi.org/10.3389/flang.2025.1567498">https://doi.org/10.3389/flang.2025.1567498</a>.
  ieee: 'A. R. Karsten, “Understanding personal agency through metaphor, or Why academic
    writing is (not) like a roller-coaster ride,” <i>Frontiers in Language Sciences</i>,
    vol. 4, Art. no. 1567498, 2025, doi: <a href="https://doi.org/10.3389/flang.2025.1567498">10.3389/flang.2025.1567498</a>.'
  mla: Karsten, Andrea Ramona. “Understanding Personal Agency through Metaphor, or
    Why Academic Writing Is (Not) like a Roller-Coaster Ride.” <i>Frontiers in Language
    Sciences</i>, vol. 4, 1567498, Frontiers Media SA, 2025, doi:<a href="https://doi.org/10.3389/flang.2025.1567498">10.3389/flang.2025.1567498</a>.
  short: A.R. Karsten, Frontiers in Language Sciences 4 (2025).
date_created: 2025-09-10T10:51:29Z
date_updated: 2026-05-06T08:42:08Z
doi: 10.3389/flang.2025.1567498
intvolume: '         4'
language:
- iso: eng
project:
- _id: '120'
  name: 'TRR 318: Project Area RTG - Integriertes Graduiertenkolleg'
publication: Frontiers in Language Sciences
publication_identifier:
  issn:
  - 2813-4605
publication_status: published
publisher: Frontiers Media SA
related_material:
  link:
  - relation: confirmation
    url: https://www.frontiersin.org/articles/10.3389/flang.2025.1567498/full#supplementary-material
status: public
title: Understanding personal agency through metaphor, or Why academic writing is
  (not) like a roller-coaster ride
type: journal_article
user_id: '53917'
volume: 4
year: '2025'
...
---
_id: '61149'
abstract:
- lang: eng
  text: The use of continuous fiber-reinforced thermoplastics (FRTP) in automotive
    industry increases due to their excellent material properties and possibility
    of rapid processing. The scale spanning heterogeneity of their material structure
    and its influence on the material behavior, however, presents significant challenges
    for most joining technologies, such as self-piercing riveting (SPR). During mechanical
    joining, the material structure is significantly altered within and around the
    joining zone, heavily influencing the material behavior. A comprehensive understanding
    of the underlying phenomena of material alteration during the SPR process is essential
    as basis for validating numerical simulations. This study examines the material
    structure at ten stages of a step-setting test of SPR with two FRTP sheets with
    glass-fiber reinforcement. Utilizing X-ray computed tomography (CT), the damage
    phenomena within different areas of the setting test are analyzed three-dimensionally
    and key parameters are quantified. Dominating phenomena during the penetration
    of the rivet into the laminate are fiber failure (FF), interfiber failure (IFF)
    and fiber bending, while delamination, fiber kinking and roving splitting are
    also observed. At the final stages, the bottom layers of the second sheet collapse
    and form a bulge into the cavity of the die.
author:
- first_name: Alrik
  full_name: Dargel, Alrik
  id: '114764'
  last_name: Dargel
- first_name: Benjamin
  full_name: Gröger, Benjamin
  last_name: Gröger
- first_name: Malte Christian
  full_name: Schlichter, Malte Christian
  id: '61977'
  last_name: Schlichter
- first_name: Johannes
  full_name: Gerritzen, Johannes
  id: '105344'
  last_name: Gerritzen
  orcid: 0000-0002-0169-8602
- first_name: Daniel
  full_name: Köhler, Daniel
  id: '83408'
  last_name: Köhler
- first_name: Gerson
  full_name: Meschut, Gerson
  id: '32056'
  last_name: Meschut
  orcid: 0000-0002-2763-1246
- first_name: Maik
  full_name: Gude, Maik
  last_name: Gude
- first_name: Robert
  full_name: Kupfer, Robert
  last_name: Kupfer
citation:
  ama: 'Dargel A, Gröger B, Schlichter MC, et al. Local Deformation and Failure of
    Composites during Self-Piercing Riveting: A CT-Based Microstructure Investigation.
    In: Gomes JFS, Meguid SA, eds. <i>Proceedings of the 8th International Conference
    on Integrity-Reliability-Failure (IRF2025)</i>. FEUP; 2025. doi:<a href="https://doi.org/10.24840/978-972-752-323-8">10.24840/978-972-752-323-8</a>'
  apa: 'Dargel, A., Gröger, B., Schlichter, M. C., Gerritzen, J., Köhler, D., Meschut,
    G., Gude, M., &#38; Kupfer, R. (2025). Local Deformation and Failure of Composites
    during Self-Piercing Riveting: A CT-Based Microstructure Investigation. In J.
    F. S. Gomes &#38; S. A. Meguid (Eds.), <i>Proceedings of the 8th International
    Conference on Integrity-Reliability-Failure (IRF2025)</i>. FEUP. <a href="https://doi.org/10.24840/978-972-752-323-8">https://doi.org/10.24840/978-972-752-323-8</a>'
  bibtex: '@inproceedings{Dargel_Gröger_Schlichter_Gerritzen_Köhler_Meschut_Gude_Kupfer_2025,
    place={Porto}, title={Local Deformation and Failure of Composites during Self-Piercing
    Riveting: A CT-Based Microstructure Investigation}, DOI={<a href="https://doi.org/10.24840/978-972-752-323-8">10.24840/978-972-752-323-8</a>},
    booktitle={Proceedings of the 8th International Conference on Integrity-Reliability-Failure
    (IRF2025)}, publisher={FEUP}, author={Dargel, Alrik and Gröger, Benjamin and Schlichter,
    Malte Christian and Gerritzen, Johannes and Köhler, Daniel and Meschut, Gerson
    and Gude, Maik and Kupfer, Robert}, editor={Gomes, J.F. Silva and Meguid, Shaker
    A.}, year={2025} }'
  chicago: 'Dargel, Alrik, Benjamin Gröger, Malte Christian Schlichter, Johannes Gerritzen,
    Daniel Köhler, Gerson Meschut, Maik Gude, and Robert Kupfer. “Local Deformation
    and Failure of Composites during Self-Piercing Riveting: A CT-Based Microstructure
    Investigation.” In <i>Proceedings of the 8th International Conference on Integrity-Reliability-Failure
    (IRF2025)</i>, edited by J.F. Silva Gomes and Shaker A. Meguid. Porto: FEUP, 2025.
    <a href="https://doi.org/10.24840/978-972-752-323-8">https://doi.org/10.24840/978-972-752-323-8</a>.'
  ieee: 'A. Dargel <i>et al.</i>, “Local Deformation and Failure of Composites during
    Self-Piercing Riveting: A CT-Based Microstructure Investigation,” in <i>Proceedings
    of the 8th International Conference on Integrity-Reliability-Failure (IRF2025)</i>,
    Porto, 2025, doi: <a href="https://doi.org/10.24840/978-972-752-323-8">10.24840/978-972-752-323-8</a>.'
  mla: 'Dargel, Alrik, et al. “Local Deformation and Failure of Composites during
    Self-Piercing Riveting: A CT-Based Microstructure Investigation.” <i>Proceedings
    of the 8th International Conference on Integrity-Reliability-Failure (IRF2025)</i>,
    edited by J.F. Silva Gomes and Shaker A. Meguid, FEUP, 2025, doi:<a href="https://doi.org/10.24840/978-972-752-323-8">10.24840/978-972-752-323-8</a>.'
  short: 'A. Dargel, B. Gröger, M.C. Schlichter, J. Gerritzen, D. Köhler, G. Meschut,
    M. Gude, R. Kupfer, in: J.F.S. Gomes, S.A. Meguid (Eds.), Proceedings of the 8th
    International Conference on Integrity-Reliability-Failure (IRF2025), FEUP, Porto,
    2025.'
conference:
  end_date: 2025-07-18
  location: Porto
  name: 8th International Conference on Integrity-Reliability-Failure (IRF2025)
  start_date: 2025-07-15
date_created: 2025-09-08T11:52:45Z
date_updated: 2026-05-07T08:40:51Z
doi: 10.24840/978-972-752-323-8
editor:
- first_name: J.F. Silva
  full_name: Gomes, J.F. Silva
  last_name: Gomes
- first_name: Shaker A.
  full_name: Meguid, Shaker A.
  last_name: Meguid
keyword:
- self-piercing riveting
- computed tomography
- thermoplastic composites
- process-structure-interaction
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://www.researchgate.net/publication/395593556_LOCAL_DEFORMATION_AND_FAILURE_OF_COMPOSITES_DURING_SELF-PIERCING_RIVETING_A_CT_BASED_MICROSTRUCTURE_INVESTIGATION
oa: '1'
place: Porto
project:
- _id: '133'
  name: TRR 285 - Project Area C
- _id: '148'
  name: TRR 285 - Subproject C04
- _id: '130'
  name: 'TRR 285:  Methodenentwicklung zur mechanischen Fügbarkeit in wandlungsfähigen
    Prozessketten'
- _id: '131'
  name: TRR 285 - Project Area A
- _id: '137'
  name: TRR 285 - Subproject A03
- _id: '135'
  name: TRR 285 - Subproject A01
publication: Proceedings of the 8th International Conference on Integrity-Reliability-Failure
  (IRF2025)
publication_identifier:
  isbn:
  - '9789727523238'
publication_status: published
publisher: FEUP
status: public
title: 'Local Deformation and Failure of Composites during Self-Piercing Riveting:
  A CT-Based Microstructure Investigation'
type: conference
user_id: '114764'
year: '2025'
...
---
_id: '62108'
author:
- first_name: Lars
  full_name: Luchterhandt, Lars
  last_name: Luchterhandt
- first_name: Vivek
  full_name: Govindasamy, Vivek
  last_name: Govindasamy
- first_name: Yutong
  full_name: Wang, Yutong
  last_name: Wang
- first_name: Christoph
  full_name: Scheytt, Christoph
  last_name: Scheytt
- first_name: Wolfgang
  full_name: Mueller, Wolfgang
  last_name: Mueller
- first_name: Rainer
  full_name: Dömer, Rainer
  last_name: Dömer
citation:
  ama: 'Luchterhandt L, Govindasamy V, Wang Y, Scheytt C, Mueller W, Dömer R. A Quantitative
    Guide to Navigate Speed/Accuracy Tradeoffs in System Level Design of RISC-V Processor
    Grids. In: <i>2025 Forum on Specification &#38; Design Languages (FDL)</i>. IEEE;
    2025. doi:<a href="https://doi.org/10.1109/fdl68117.2025.11165408">10.1109/fdl68117.2025.11165408</a>'
  apa: Luchterhandt, L., Govindasamy, V., Wang, Y., Scheytt, C., Mueller, W., &#38;
    Dömer, R. (2025). A Quantitative Guide to Navigate Speed/Accuracy Tradeoffs in
    System Level Design of RISC-V Processor Grids. <i>2025 Forum on Specification
    &#38; Design Languages (FDL)</i>. <a href="https://doi.org/10.1109/fdl68117.2025.11165408">https://doi.org/10.1109/fdl68117.2025.11165408</a>
  bibtex: '@inproceedings{Luchterhandt_Govindasamy_Wang_Scheytt_Mueller_Dömer_2025,
    title={A Quantitative Guide to Navigate Speed/Accuracy Tradeoffs in System Level
    Design of RISC-V Processor Grids}, DOI={<a href="https://doi.org/10.1109/fdl68117.2025.11165408">10.1109/fdl68117.2025.11165408</a>},
    booktitle={2025 Forum on Specification &#38; Design Languages (FDL)}, publisher={IEEE},
    author={Luchterhandt, Lars and Govindasamy, Vivek and Wang, Yutong and Scheytt,
    Christoph and Mueller, Wolfgang and Dömer, Rainer}, year={2025} }'
  chicago: Luchterhandt, Lars, Vivek Govindasamy, Yutong Wang, Christoph Scheytt,
    Wolfgang Mueller, and Rainer Dömer. “A Quantitative Guide to Navigate Speed/Accuracy
    Tradeoffs in System Level Design of RISC-V Processor Grids.” In <i>2025 Forum
    on Specification &#38; Design Languages (FDL)</i>. IEEE, 2025. <a href="https://doi.org/10.1109/fdl68117.2025.11165408">https://doi.org/10.1109/fdl68117.2025.11165408</a>.
  ieee: 'L. Luchterhandt, V. Govindasamy, Y. Wang, C. Scheytt, W. Mueller, and R.
    Dömer, “A Quantitative Guide to Navigate Speed/Accuracy Tradeoffs in System Level
    Design of RISC-V Processor Grids,” 2025, doi: <a href="https://doi.org/10.1109/fdl68117.2025.11165408">10.1109/fdl68117.2025.11165408</a>.'
  mla: Luchterhandt, Lars, et al. “A Quantitative Guide to Navigate Speed/Accuracy
    Tradeoffs in System Level Design of RISC-V Processor Grids.” <i>2025 Forum on
    Specification &#38; Design Languages (FDL)</i>, IEEE, 2025, doi:<a href="https://doi.org/10.1109/fdl68117.2025.11165408">10.1109/fdl68117.2025.11165408</a>.
  short: 'L. Luchterhandt, V. Govindasamy, Y. Wang, C. Scheytt, W. Mueller, R. Dömer,
    in: 2025 Forum on Specification &#38; Design Languages (FDL), IEEE, 2025.'
date_created: 2025-11-06T09:47:40Z
date_updated: 2026-05-08T09:12:31Z
department:
- _id: '58'
doi: 10.1109/fdl68117.2025.11165408
language:
- iso: eng
publication: 2025 Forum on Specification & Design Languages (FDL)
publication_status: published
publisher: IEEE
status: public
title: A Quantitative Guide to Navigate Speed/Accuracy Tradeoffs in System Level Design
  of RISC-V Processor Grids
type: conference
user_id: '16243'
year: '2025'
...
---
_id: '65559'
abstract:
- lang: ger
  text: Dieser Artikel spiegelt die dreißigjährige Geschichte der Zeitschrift Tertium
    Comparationis, indem er eine der zentralen Vergleichseinheiten Vergleichender
    Erziehungswissenschaft in den Blick nimmt. Themenhefte und Einzelbeiträge der
    Zeitschrift Tertium Comparationis haben über die Jahrzehnte immer wieder reflexive
    Blicke auf die Vergleichseinheit Land und/oder Nation geworfen, aber auch – ohne
    Bezüge zu solchen Diskursen – Länder- und Nationenvergleiche in unterschiedlichen
    Vorgehensweisen präsentiert. Bei der intensiven und analytischen Lektüre der Themen
    und Inhalte ergeben sich Cluster der Perspektivsetzungen und damit verbundene
    Diskurse, von denen einige aufgrund ihrer Häufigkeit und Intensität besonders
    relevant erscheinen. Die aufzufindenden Diskurse und Cluster werden im Beitrag
    präsentiert und anhand normativer, kritischer und innovativer Beiträge verifiziert.
    Trotz konstant wiederholter Kritik und konzeptueller Änderungen, bleiben Land
    und Nation zentrale Kategorien Vergleichender Erziehungswissenschaft.
author:
- first_name: Christine
  full_name: Freitag, Christine
  id: '20560'
  last_name: Freitag
citation:
  ama: 'Freitag C. Land und Nation: Perspektiven vergleichender Forschung in ausgewählten 
    Diskursen der Zeitschrift Tertium Comparationis. <i>Tertium Comparationis</i>.
    2025;31(2):156-167. doi:<a href="https://doi.org/10.31244/tc.2025.02.02">10.31244/tc.2025.02.02</a>'
  apa: 'Freitag, C. (2025). Land und Nation: Perspektiven vergleichender Forschung
    in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis. <i>Tertium Comparationis</i>,
    <i>31</i>(2), 156–167. <a href="https://doi.org/10.31244/tc.2025.02.02">https://doi.org/10.31244/tc.2025.02.02</a>'
  bibtex: '@article{Freitag_2025, title={Land und Nation: Perspektiven vergleichender
    Forschung in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis}, volume={31},
    DOI={<a href="https://doi.org/10.31244/tc.2025.02.02">10.31244/tc.2025.02.02</a>},
    number={2}, journal={Tertium Comparationis}, publisher={Waxmann}, author={Freitag,
    Christine}, year={2025}, pages={156–167} }'
  chicago: 'Freitag, Christine. “Land und Nation: Perspektiven vergleichender Forschung
    in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis.” <i>Tertium
    Comparationis</i> 31, no. 2 (2025): 156–67. <a href="https://doi.org/10.31244/tc.2025.02.02">https://doi.org/10.31244/tc.2025.02.02</a>.'
  ieee: 'C. Freitag, “Land und Nation: Perspektiven vergleichender Forschung in ausgewählten 
    Diskursen der Zeitschrift Tertium Comparationis,” <i>Tertium Comparationis</i>,
    vol. 31, no. 2, pp. 156–167, 2025, doi: <a href="https://doi.org/10.31244/tc.2025.02.02">10.31244/tc.2025.02.02</a>.'
  mla: 'Freitag, Christine. “Land und Nation: Perspektiven vergleichender Forschung
    in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis.” <i>Tertium
    Comparationis</i>, vol. 31, no. 2, Waxmann, 2025, pp. 156–67, doi:<a href="https://doi.org/10.31244/tc.2025.02.02">10.31244/tc.2025.02.02</a>.'
  short: C. Freitag, Tertium Comparationis 31 (2025) 156–167.
date_created: 2026-05-05T12:12:35Z
date_updated: 2026-05-08T11:47:40Z
department:
- _id: '453'
doi: 10.31244/tc.2025.02.02
intvolume: '        31'
issue: '2'
keyword:
- Tertium Comparationis
- Land
- Nation
- Vergleichende Erziehungswissenschaft
- Diskurse
language:
- iso: ger
main_file_link:
- open_access: '1'
  url: https://www.waxmann.com/shop/download?tx_p2waxmann_download%5Baction%5D=download&tx_p2waxmann_download%5Bcontroller%5D=Zeitschrift&tx_p2waxmann_download%5Bid_artikel%5D=ART106580&tx_p2waxmann_download%5Buid%5D=frei&cHash=8bebe3e88a1eab177e7c65196dbb1715
oa: '1'
page: 156-167
publication: Tertium Comparationis
publication_identifier:
  issn:
  - 0947-9732
  - 1434-1697
publication_status: published
publisher: Waxmann
status: public
title: 'Land und Nation: Perspektiven vergleichender Forschung in ausgewählten  Diskursen
  der Zeitschrift Tertium Comparationis'
type: journal_article
user_id: '10831'
volume: 31
year: '2025'
...
---
_id: '59671'
author:
- first_name: Mohammed
  full_name: Abdelrahem, Mohammed
  id: '95179'
  last_name: Abdelrahem
  orcid: 0000-0002-0545-9799
citation:
  ama: Abdelrahem M. <i>Die Menschheitsfamilie und der Begriff der Umma – Islamische
    Perspektiven im interreligiösen Dialog</i>. Zekk-Bolg; 2025.
  apa: Abdelrahem, M. (2025). <i>Die Menschheitsfamilie und der Begriff der Umma –
    Islamische Perspektiven im interreligiösen Dialog</i>. Zekk-Bolg.
  bibtex: '@book{Abdelrahem_2025, place={Paderborn}, title={Die Menschheitsfamilie
    und der Begriff der Umma – Islamische Perspektiven im interreligiösen Dialog},
    publisher={Zekk-Bolg}, author={Abdelrahem, Mohammed}, year={2025} }'
  chicago: 'Abdelrahem, Mohammed. <i>Die Menschheitsfamilie und der Begriff der Umma
    – Islamische Perspektiven im interreligiösen Dialog</i>. Paderborn: Zekk-Bolg,
    2025.'
  ieee: 'M. Abdelrahem, <i>Die Menschheitsfamilie und der Begriff der Umma – Islamische
    Perspektiven im interreligiösen Dialog</i>. Paderborn: Zekk-Bolg, 2025.'
  mla: Abdelrahem, Mohammed. <i>Die Menschheitsfamilie und der Begriff der Umma –
    Islamische Perspektiven im interreligiösen Dialog</i>. Zekk-Bolg, 2025.
  short: M. Abdelrahem, Die Menschheitsfamilie und der Begriff der Umma – Islamische
    Perspektiven im interreligiösen Dialog, Zekk-Bolg, Paderborn, 2025.
date_created: 2025-04-25T00:06:45Z
date_updated: 2026-05-08T13:34:20Z
department:
- _id: '469'
language:
- iso: ger
main_file_link:
- url: https://blogs.uni-paderborn.de/zekkblog/2025/04/18/die-menschheitsfamilie-und-der-begriff-der-umma-islamische-perspektiven-im-interreligioesen-dialog/
place: Paderborn
publisher: Zekk-Bolg
status: public
title: Die Menschheitsfamilie und der Begriff der Umma – Islamische Perspektiven im
  interreligiösen Dialog
type: misc
user_id: '95179'
year: '2025'
...
