[{"publication_status":"published","publication_identifier":{"issn":["1865-5114","1860-4633"]},"issue":"3–4","year":"2025","citation":{"chicago":"Rossmann, Felix Konstantin. “Forschungsperspektiven Zu Sustainable Finance in Kleinen Und Mittleren Unternehmen.” <i>ZfKE – Zeitschrift Für KMU Und Entrepreneurship</i> 72, no. 3–4 (2025): 251–56. <a href=\"https://doi.org/10.3790/zfke.2024.1465308\">https://doi.org/10.3790/zfke.2024.1465308</a>.","ieee":"F. K. Rossmann, “Forschungsperspektiven zu Sustainable Finance in kleinen und mittleren Unternehmen,” <i>ZfKE – Zeitschrift für KMU und Entrepreneurship</i>, vol. 72, no. 3–4, pp. 251–256, 2025, doi: <a href=\"https://doi.org/10.3790/zfke.2024.1465308\">10.3790/zfke.2024.1465308</a>.","ama":"Rossmann FK. Forschungsperspektiven zu Sustainable Finance in kleinen und mittleren Unternehmen. <i>ZfKE – Zeitschrift für KMU und Entrepreneurship</i>. 2025;72(3–4):251-256. doi:<a href=\"https://doi.org/10.3790/zfke.2024.1465308\">10.3790/zfke.2024.1465308</a>","apa":"Rossmann, F. K. (2025). Forschungsperspektiven zu Sustainable Finance in kleinen und mittleren Unternehmen. <i>ZfKE – Zeitschrift Für KMU Und Entrepreneurship</i>, <i>72</i>(3–4), 251–256. <a href=\"https://doi.org/10.3790/zfke.2024.1465308\">https://doi.org/10.3790/zfke.2024.1465308</a>","bibtex":"@article{Rossmann_2025, title={Forschungsperspektiven zu Sustainable Finance in kleinen und mittleren Unternehmen}, volume={72}, DOI={<a href=\"https://doi.org/10.3790/zfke.2024.1465308\">10.3790/zfke.2024.1465308</a>}, number={3–4}, journal={ZfKE – Zeitschrift für KMU und Entrepreneurship}, publisher={Duncker &#38; Humblot GmbH}, author={Rossmann, Felix Konstantin}, year={2025}, pages={251–256} }","mla":"Rossmann, Felix Konstantin. “Forschungsperspektiven Zu Sustainable Finance in Kleinen Und Mittleren Unternehmen.” <i>ZfKE – Zeitschrift Für KMU Und Entrepreneurship</i>, vol. 72, no. 3–4, Duncker &#38; Humblot GmbH, 2025, pp. 251–56, doi:<a href=\"https://doi.org/10.3790/zfke.2024.1465308\">10.3790/zfke.2024.1465308</a>.","short":"F.K. Rossmann, ZfKE – Zeitschrift Für KMU Und Entrepreneurship 72 (2025) 251–256."},"intvolume":"        72","page":"251-256","date_updated":"2026-04-29T07:28:58Z","publisher":"Duncker & Humblot GmbH","author":[{"last_name":"Rossmann","full_name":"Rossmann, Felix Konstantin","first_name":"Felix Konstantin"}],"date_created":"2026-04-29T07:23:39Z","volume":72,"title":"Forschungsperspektiven zu Sustainable Finance in kleinen und mittleren Unternehmen","doi":"10.3790/zfke.2024.1465308","type":"journal_article","publication":"ZfKE – Zeitschrift für KMU und Entrepreneurship","status":"public","_id":"65509","user_id":"98531"},{"publication":"2025 IEEE 28th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)","type":"conference","status":"public","user_id":"110924","_id":"64610","language":[{"iso":"eng"}],"publication_status":"published","citation":{"short":"A.H. Hadipour, A. Jafari, M. Awais, M. Platzner, in: 2025 IEEE 28th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), IEEE, 2025.","bibtex":"@inproceedings{Hadipour_Jafari_Awais_Platzner_2025, title={A Two-Stage Approximation Methodology for Efficient DNN Hardware Implementation}, DOI={<a href=\"https://doi.org/10.1109/ddecs63720.2025.11006769\">10.1109/ddecs63720.2025.11006769</a>}, booktitle={2025 IEEE 28th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)}, publisher={IEEE}, author={Hadipour, Amir Hossein and Jafari, Atousa and Awais, Muhammad and Platzner, Marco}, year={2025} }","mla":"Hadipour, Amir Hossein, et al. “A Two-Stage Approximation Methodology for Efficient DNN Hardware Implementation.” <i>2025 IEEE 28th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)</i>, IEEE, 2025, doi:<a href=\"https://doi.org/10.1109/ddecs63720.2025.11006769\">10.1109/ddecs63720.2025.11006769</a>.","apa":"Hadipour, A. H., Jafari, A., Awais, M., &#38; Platzner, M. (2025). A Two-Stage Approximation Methodology for Efficient DNN Hardware Implementation. <i>2025 IEEE 28th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)</i>. <a href=\"https://doi.org/10.1109/ddecs63720.2025.11006769\">https://doi.org/10.1109/ddecs63720.2025.11006769</a>","ama":"Hadipour AH, Jafari A, Awais M, Platzner M. A Two-Stage Approximation Methodology for Efficient DNN Hardware Implementation. In: <i>2025 IEEE 28th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)</i>. IEEE; 2025. doi:<a href=\"https://doi.org/10.1109/ddecs63720.2025.11006769\">10.1109/ddecs63720.2025.11006769</a>","ieee":"A. H. Hadipour, A. Jafari, M. Awais, and M. Platzner, “A Two-Stage Approximation Methodology for Efficient DNN Hardware Implementation,” 2025, doi: <a href=\"https://doi.org/10.1109/ddecs63720.2025.11006769\">10.1109/ddecs63720.2025.11006769</a>.","chicago":"Hadipour, Amir Hossein, Atousa Jafari, Muhammad Awais, and Marco Platzner. “A Two-Stage Approximation Methodology for Efficient DNN Hardware Implementation.” In <i>2025 IEEE 28th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)</i>. IEEE, 2025. <a href=\"https://doi.org/10.1109/ddecs63720.2025.11006769\">https://doi.org/10.1109/ddecs63720.2025.11006769</a>."},"year":"2025","author":[{"first_name":"Amir Hossein","last_name":"Hadipour","full_name":"Hadipour, Amir Hossein","id":"110924"},{"full_name":"Jafari, Atousa","id":"99966","last_name":"Jafari","first_name":"Atousa"},{"first_name":"Muhammad","id":"64665","full_name":"Awais, Muhammad","last_name":"Awais","orcid":"https://orcid.org/0000-0003-4148-2969"},{"first_name":"Marco","last_name":"Platzner","id":"398","full_name":"Platzner, Marco"}],"date_created":"2026-02-24T11:50:01Z","date_updated":"2026-04-29T13:13:41Z","publisher":"IEEE","doi":"10.1109/ddecs63720.2025.11006769","title":"A Two-Stage Approximation Methodology for Efficient DNN Hardware Implementation"},{"author":[{"full_name":"Kress, Christian","id":"13256","last_name":"Kress","orcid":"0000-0002-4403-2237","first_name":"Christian"},{"full_name":"Mihaylov, Martin Miroslavov","id":"42449","last_name":"Mihaylov","first_name":"Martin Miroslavov"},{"first_name":"Tobias","last_name":"Schwabe","full_name":"Schwabe, Tobias","id":"39217"},{"id":"26263","full_name":"Silberhorn, Christine","last_name":"Silberhorn","first_name":"Christine"},{"first_name":"J. Christoph","last_name":"Scheytt","orcid":"0000-0002-5950-6618 ","full_name":"Scheytt, J. Christoph","id":"37144"}],"date_created":"2025-05-14T09:59:50Z","publisher":"PhotonIcs and Electromagnetics Research Symposium (PIERS)","date_updated":"2026-04-29T14:27:08Z","conference":{"start_date":"2025-05-03","name":"PhotonIcs and Electromagnetics Research Symposium (PIERS)","location":"Abu Dhabi","end_date":"2025-05-09"},"doi":"10.1109/PIERS-Spring66516.2025.11276835","title":"Broadband Nyquist Pulse Generation on TFLN Platform for Integrated Quantum Source","publication_status":"accepted","citation":{"bibtex":"@inproceedings{Kress_Mihaylov_Schwabe_Silberhorn_Scheytt, title={Broadband Nyquist Pulse Generation on TFLN Platform for Integrated Quantum Source}, DOI={<a href=\"https://doi.org/10.1109/PIERS-Spring66516.2025.11276835\">10.1109/PIERS-Spring66516.2025.11276835</a>}, booktitle={PIERS Proceedings }, publisher={PhotonIcs and Electromagnetics Research Symposium (PIERS)}, author={Kress, Christian and Mihaylov, Martin Miroslavov and Schwabe, Tobias and Silberhorn, Christine and Scheytt, J. Christoph} }","short":"C. Kress, M.M. Mihaylov, T. Schwabe, C. Silberhorn, J.C. Scheytt, in: PIERS Proceedings , PhotonIcs and Electromagnetics Research Symposium (PIERS), n.d.","mla":"Kress, Christian, et al. “Broadband Nyquist Pulse Generation on TFLN Platform for Integrated Quantum Source.” <i>PIERS Proceedings </i>, PhotonIcs and Electromagnetics Research Symposium (PIERS), doi:<a href=\"https://doi.org/10.1109/PIERS-Spring66516.2025.11276835\">10.1109/PIERS-Spring66516.2025.11276835</a>.","apa":"Kress, C., Mihaylov, M. M., Schwabe, T., Silberhorn, C., &#38; Scheytt, J. C. (n.d.). Broadband Nyquist Pulse Generation on TFLN Platform for Integrated Quantum Source. <i>PIERS Proceedings </i>. PhotonIcs and Electromagnetics Research Symposium (PIERS), Abu Dhabi. <a href=\"https://doi.org/10.1109/PIERS-Spring66516.2025.11276835\">https://doi.org/10.1109/PIERS-Spring66516.2025.11276835</a>","ama":"Kress C, Mihaylov MM, Schwabe T, Silberhorn C, Scheytt JC. Broadband Nyquist Pulse Generation on TFLN Platform for Integrated Quantum Source. In: <i>PIERS Proceedings </i>. PhotonIcs and Electromagnetics Research Symposium (PIERS). doi:<a href=\"https://doi.org/10.1109/PIERS-Spring66516.2025.11276835\">10.1109/PIERS-Spring66516.2025.11276835</a>","ieee":"C. Kress, M. M. Mihaylov, T. Schwabe, C. Silberhorn, and J. C. Scheytt, “Broadband Nyquist Pulse Generation on TFLN Platform for Integrated Quantum Source,” presented at the PhotonIcs and Electromagnetics Research Symposium (PIERS), Abu Dhabi, doi: <a href=\"https://doi.org/10.1109/PIERS-Spring66516.2025.11276835\">10.1109/PIERS-Spring66516.2025.11276835</a>.","chicago":"Kress, Christian, Martin Miroslavov Mihaylov, Tobias Schwabe, Christine Silberhorn, and J. Christoph Scheytt. “Broadband Nyquist Pulse Generation on TFLN Platform for Integrated Quantum Source.” In <i>PIERS Proceedings </i>. PhotonIcs and Electromagnetics Research Symposium (PIERS), n.d. <a href=\"https://doi.org/10.1109/PIERS-Spring66516.2025.11276835\">https://doi.org/10.1109/PIERS-Spring66516.2025.11276835</a>."},"year":"2025","department":[{"_id":"58"},{"_id":"623"}],"user_id":"13256","_id":"59895","project":[{"name":"PONyDAC: SPP 2111 - PONyDAC II - Präziser Optischer Nyquist-Puls-Synthesizer DAC","_id":"302"},{"_id":"175","name":"TRR 142 - C11: TRR 142 - Kompakte Photonenpaar-Quelle mit ultraschnellen Modulatoren auf Basis von CMOS und LNOI (C11*)"}],"language":[{"iso":"eng"}],"publication":"PIERS Proceedings ","type":"conference","status":"public","abstract":[{"text":"The generation of optically broadband Nyquist pulse sequences using an integrated Mach-Zehnder modulator (MZM) in a thin-film lithium-niobate (TFLN) platform with repetition rates of 5 to 32 GHz and optical bandwidths of up to 160 GHz is demonstrated. Nyquist pulse sequences with high optical bandwidth can be used as synchronization and control signals in quantum sources based on photon pair generation.","lang":"eng"}]},{"type":"conference_abstract","year":"2025","status":"public","citation":{"ieee":"E. Reckmann and K. Temmen, “Beforschung eines MINT Clusters – erste Ergebnisse und weitere Schritte,” presented at the 20. LeLa-Jahrestagung, Oldenburg, 2025.","chicago":"Reckmann, Eileen, and Katrin Temmen. “Beforschung Eines MINT Clusters – Erste Ergebnisse Und Weitere Schritte,” 2025.","apa":"Reckmann, E., &#38; Temmen, K. (2025). <i>Beforschung eines MINT Clusters – erste Ergebnisse und weitere Schritte</i>. 20. LeLa-Jahrestagung, Oldenburg.","ama":"Reckmann E, Temmen K. Beforschung eines MINT Clusters – erste Ergebnisse und weitere Schritte. In: ; 2025.","mla":"Reckmann, Eileen, and Katrin Temmen. <i>Beforschung Eines MINT Clusters – Erste Ergebnisse Und Weitere Schritte</i>. 2025.","short":"E. Reckmann, K. Temmen, in: 2025.","bibtex":"@inproceedings{Reckmann_Temmen_2025, title={Beforschung eines MINT Clusters – erste Ergebnisse und weitere Schritte}, author={Reckmann, Eileen and Temmen, Katrin}, year={2025} }"},"_id":"65525","date_updated":"2026-04-30T08:19:21Z","author":[{"first_name":"Eileen","last_name":"Reckmann","id":"101166","full_name":"Reckmann, Eileen"},{"last_name":"Temmen","full_name":"Temmen, Katrin","id":"30086","first_name":"Katrin"}],"user_id":"101166","date_created":"2026-04-30T08:19:03Z","title":"Beforschung eines MINT Clusters – erste Ergebnisse und weitere Schritte","conference":{"location":"Oldenburg","end_date":"2025-03-11","start_date":"2025-03-09","name":"20. LeLa-Jahrestagung"},"language":[{"iso":"eng"}]},{"year":"2025","intvolume":"       152","citation":{"short":"A. Janovsky, Ł. Chmielewski, P. Svenda, J. Jancar, V. Matyas, Computers &#38;amp; Security 152 (2025).","mla":"Janovsky, Adam, et al. “Revisiting the Analysis of References among Common Criteria Certified Products.” <i>Computers &#38;amp; Security</i>, vol. 152, 104362, Elsevier BV, 2025, doi:<a href=\"https://doi.org/10.1016/j.cose.2025.104362\">10.1016/j.cose.2025.104362</a>.","bibtex":"@article{Janovsky_Chmielewski_Svenda_Jancar_Matyas_2025, title={Revisiting the analysis of references among Common Criteria certified products}, volume={152}, DOI={<a href=\"https://doi.org/10.1016/j.cose.2025.104362\">10.1016/j.cose.2025.104362</a>}, number={104362}, journal={Computers &#38;amp; Security}, publisher={Elsevier BV}, author={Janovsky, Adam and Chmielewski, Łukasz and Svenda, Petr and Jancar, Jan and Matyas, Vashek}, year={2025} }","apa":"Janovsky, A., Chmielewski, Ł., Svenda, P., Jancar, J., &#38; Matyas, V. (2025). Revisiting the analysis of references among Common Criteria certified products. <i>Computers &#38;amp; Security</i>, <i>152</i>, Article 104362. <a href=\"https://doi.org/10.1016/j.cose.2025.104362\">https://doi.org/10.1016/j.cose.2025.104362</a>","ieee":"A. Janovsky, Ł. Chmielewski, P. Svenda, J. Jancar, and V. Matyas, “Revisiting the analysis of references among Common Criteria certified products,” <i>Computers &#38;amp; Security</i>, vol. 152, Art. no. 104362, 2025, doi: <a href=\"https://doi.org/10.1016/j.cose.2025.104362\">10.1016/j.cose.2025.104362</a>.","chicago":"Janovsky, Adam, Łukasz Chmielewski, Petr Svenda, Jan Jancar, and Vashek Matyas. “Revisiting the Analysis of References among Common Criteria Certified Products.” <i>Computers &#38;amp; Security</i> 152 (2025). <a href=\"https://doi.org/10.1016/j.cose.2025.104362\">https://doi.org/10.1016/j.cose.2025.104362</a>.","ama":"Janovsky A, Chmielewski Ł, Svenda P, Jancar J, Matyas V. Revisiting the analysis of references among Common Criteria certified products. <i>Computers &#38;amp; Security</i>. 2025;152. doi:<a href=\"https://doi.org/10.1016/j.cose.2025.104362\">10.1016/j.cose.2025.104362</a>"},"publication_identifier":{"issn":["0167-4048"]},"publication_status":"published","title":"Revisiting the analysis of references among Common Criteria certified products","doi":"10.1016/j.cose.2025.104362","date_updated":"2026-04-30T09:32:20Z","publisher":"Elsevier BV","volume":152,"date_created":"2026-04-30T09:26:42Z","author":[{"last_name":"Janovsky","full_name":"Janovsky, Adam","first_name":"Adam"},{"last_name":"Chmielewski","full_name":"Chmielewski, Łukasz","first_name":"Łukasz"},{"last_name":"Svenda","full_name":"Svenda, Petr","first_name":"Petr"},{"first_name":"Jan","last_name":"Jancar","full_name":"Jancar, Jan"},{"last_name":"Matyas","full_name":"Matyas, Vashek","first_name":"Vashek"}],"status":"public","publication":"Computers &amp; Security","type":"journal_article","article_number":"104362","language":[{"iso":"eng"}],"_id":"65528","user_id":"125442"},{"author":[{"full_name":"JANCAR, Jan","last_name":"JANCAR","first_name":"Jan"},{"full_name":"SVENDA, Petr","last_name":"SVENDA","first_name":"Petr"},{"first_name":"Marek","last_name":"SYS","full_name":"SYS, Marek"}],"date_created":"2026-04-30T09:26:23Z","date_updated":"2026-04-30T09:32:17Z","publisher":"Wiley","doi":"10.1002/9781394351930.ch10","title":"ROCA and Minerva Vulnerabilities","publication_status":"published","publication_identifier":{"isbn":["9781789452150","9781394351930"]},"citation":{"chicago":"JANCAR, Jan, Petr SVENDA, and Marek SYS. “ROCA and Minerva Vulnerabilities.” In <i>Embedded Cryptography 3</i>. Wiley, 2025. <a href=\"https://doi.org/10.1002/9781394351930.ch10\">https://doi.org/10.1002/9781394351930.ch10</a>.","ieee":"J. JANCAR, P. SVENDA, and M. SYS, “ROCA and Minerva Vulnerabilities,” in <i>Embedded Cryptography 3</i>, Wiley, 2025.","ama":"JANCAR J, SVENDA P, SYS M. ROCA and Minerva Vulnerabilities. In: <i>Embedded Cryptography 3</i>. Wiley; 2025. doi:<a href=\"https://doi.org/10.1002/9781394351930.ch10\">10.1002/9781394351930.ch10</a>","apa":"JANCAR, J., SVENDA, P., &#38; SYS, M. (2025). ROCA and Minerva Vulnerabilities. In <i>Embedded Cryptography 3</i>. Wiley. <a href=\"https://doi.org/10.1002/9781394351930.ch10\">https://doi.org/10.1002/9781394351930.ch10</a>","short":"J. JANCAR, P. SVENDA, M. SYS, in: Embedded Cryptography 3, Wiley, 2025.","bibtex":"@inbook{JANCAR_SVENDA_SYS_2025, title={ROCA and Minerva Vulnerabilities}, DOI={<a href=\"https://doi.org/10.1002/9781394351930.ch10\">10.1002/9781394351930.ch10</a>}, booktitle={Embedded Cryptography 3}, publisher={Wiley}, author={JANCAR, Jan and SVENDA, Petr and SYS, Marek}, year={2025} }","mla":"JANCAR, Jan, et al. “ROCA and Minerva Vulnerabilities.” <i>Embedded Cryptography 3</i>, Wiley, 2025, doi:<a href=\"https://doi.org/10.1002/9781394351930.ch10\">10.1002/9781394351930.ch10</a>."},"year":"2025","user_id":"125442","_id":"65526","language":[{"iso":"eng"}],"type":"book_chapter","publication":"Embedded Cryptography 3","status":"public"},{"author":[{"first_name":"Santiago","last_name":"Arranz-Olmos","full_name":"Arranz-Olmos, Santiago"},{"last_name":"Barthe","full_name":"Barthe, Gilles","first_name":"Gilles"},{"first_name":"Benjamin","full_name":"Grégoire, Benjamin","last_name":"Grégoire"},{"first_name":"Jan","last_name":"Jancar","full_name":"Jancar, Jan"},{"first_name":"Vincent","full_name":"Laporte, Vincent","last_name":"Laporte"},{"full_name":"Oliveira, Tiago","last_name":"Oliveira","first_name":"Tiago"},{"last_name":"Schwabe","full_name":"Schwabe, Peter","first_name":"Peter"}],"date_created":"2026-04-30T09:31:53Z","volume":2025,"publisher":"Universitatsbibliothek der Ruhr-Universitat Bochum","date_updated":"2026-04-30T09:32:27Z","doi":"10.46586/tches.v2025.i3.644-667","title":"Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code","issue":"3","publication_status":"published","publication_identifier":{"issn":["2569-2925"]},"citation":{"apa":"Arranz-Olmos, S., Barthe, G., Grégoire, B., Jancar, J., Laporte, V., Oliveira, T., &#38; Schwabe, P. (2025). Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code. <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>, <i>2025</i>(3), 644–667. <a href=\"https://doi.org/10.46586/tches.v2025.i3.644-667\">https://doi.org/10.46586/tches.v2025.i3.644-667</a>","mla":"Arranz-Olmos, Santiago, et al. “Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code.” <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>, vol. 2025, no. 3, Universitatsbibliothek der Ruhr-Universitat Bochum, 2025, pp. 644–67, doi:<a href=\"https://doi.org/10.46586/tches.v2025.i3.644-667\">10.46586/tches.v2025.i3.644-667</a>.","short":"S. Arranz-Olmos, G. Barthe, B. Grégoire, J. Jancar, V. Laporte, T. Oliveira, P. Schwabe, IACR Transactions on Cryptographic Hardware and Embedded Systems 2025 (2025) 644–667.","bibtex":"@article{Arranz-Olmos_Barthe_Grégoire_Jancar_Laporte_Oliveira_Schwabe_2025, title={Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code}, volume={2025}, DOI={<a href=\"https://doi.org/10.46586/tches.v2025.i3.644-667\">10.46586/tches.v2025.i3.644-667</a>}, number={3}, journal={IACR Transactions on Cryptographic Hardware and Embedded Systems}, publisher={Universitatsbibliothek der Ruhr-Universitat Bochum}, author={Arranz-Olmos, Santiago and Barthe, Gilles and Grégoire, Benjamin and Jancar, Jan and Laporte, Vincent and Oliveira, Tiago and Schwabe, Peter}, year={2025}, pages={644–667} }","chicago":"Arranz-Olmos, Santiago, Gilles Barthe, Benjamin Grégoire, Jan Jancar, Vincent Laporte, Tiago Oliveira, and Peter Schwabe. “Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code.” <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i> 2025, no. 3 (2025): 644–67. <a href=\"https://doi.org/10.46586/tches.v2025.i3.644-667\">https://doi.org/10.46586/tches.v2025.i3.644-667</a>.","ieee":"S. Arranz-Olmos <i>et al.</i>, “Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code,” <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>, vol. 2025, no. 3, pp. 644–667, 2025, doi: <a href=\"https://doi.org/10.46586/tches.v2025.i3.644-667\">10.46586/tches.v2025.i3.644-667</a>.","ama":"Arranz-Olmos S, Barthe G, Grégoire B, et al. Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code. <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>. 2025;2025(3):644-667. doi:<a href=\"https://doi.org/10.46586/tches.v2025.i3.644-667\">10.46586/tches.v2025.i3.644-667</a>"},"intvolume":"      2025","page":"644-667","year":"2025","user_id":"125442","_id":"65537","type":"journal_article","publication":"IACR Transactions on Cryptographic Hardware and Embedded Systems","status":"public","abstract":[{"lang":"eng","text":"<jats:p>It is a widely accepted standard practice to implement cryptographic software so that secret inputs do not influence the cycle count. Software following this paradigm is often referred to as “constant-time” software and typically involves following three rules: 1) never branch on a secret-dependent condition, 2) never access memory at a secret-dependent location, and 3) avoid variable-time arithmetic operations on secret data. The third rule requires knowledge about such variable-time arithmetic instructions, or vice versa, which operations are safe to use on secret inputs. For a long time, this knowledge was based on either documentation or microbenchmarks, but critically, there were never any guarantees for future microarchitectures. This changed with the introduction of the data-operand-independent-timing (DOIT) mode on Intel CPUs and, to some extent, the data-independent-timing (DIT) mode on Arm CPUs. Both Intel and Arm document a subset of their respective instruction sets that are intended to leak no information about their inputs through timing, even on future microarchitectures if the CPU is set to run in a dedicated DOIT (or DIT) mode.In this paper, we present a principled solution that leverages DOIT to enable cryptographic software that is future-proof constant-time, in the sense that it ensures that only instructions from the DOIT subset are used to operate on secret data, even during speculative execution after a mispredicted branch or function return location. For this solution, we build on top of existing security type systems in the Jasmin framework for high-assurance cryptography.We then use our solution to evaluate the extent to which existing cryptographic software built to be “constant-time” is already secure in this stricter paradigm implied by DOIT and what the performance impact is to move from constant-time to future-proof constant-time.</jats:p>"}]},{"user_id":"125442","_id":"65538","type":"journal_article","publication":"IACR Transactions on Cryptographic Hardware and Embedded Systems","status":"public","abstract":[{"lang":"eng","text":"<jats:p>Developers implementing elliptic curve cryptography (ECC) face a wide range of implementation choices created by decades of research into elliptic curves. The literature on elliptic curves offers a plethora of curve models, scalar multipliers, and addition formulas, but this comes with the price of enabling attacks to also use the rich structure of these techniques. Navigating through this area is not an easy task and developers often obscure their choices, especially in black-box hardware implementations. Since side-channel attackers rely on the knowledge of the implementation details, reverse engineering becomes a crucial part of attacks.This work presents ECTester – a tool for testing black-box ECC implementations. Through various test suites, ECTester observes the behavior of the target implementation against known attacks but also non-standard inputs and elliptic curve parameters. We analyze popular ECC libraries and smartcards and show that some libraries and most smartcards do not check the order of the input points and improperly handle the infinity point. Based on these observations, we design new techniques for reverse engineering scalar randomization countermeasures that are able to distinguish between group scalar randomization, additive, multiplicative or Euclidean splitting. Our techniques do not require side-channel measurements; they only require the ability to set custom domain parameters, and are able to extract not only the size but also the exact value of the random mask used. Using the techniques, we successfully reverse-engineered the countermeasures on 13 cryptographic smartcards from 5 major manufacturers – all but one we tested on. Finally, we discuss what mitigations can be applied to prevent such reverse engineering, and whether it is possible at all.</jats:p>"}],"author":[{"first_name":"Vojtech","full_name":"Suchanek, Vojtech","last_name":"Suchanek"},{"first_name":"Jan","full_name":"Jancar, Jan","last_name":"Jancar"},{"first_name":"Jan","full_name":"Kvapil, Jan","last_name":"Kvapil"},{"first_name":"Petr","full_name":"Svenda, Petr","last_name":"Svenda"},{"first_name":"Łukasz","full_name":"Chmielewski, Łukasz","last_name":"Chmielewski"}],"date_created":"2026-04-30T09:31:59Z","volume":2025,"publisher":"Universitatsbibliothek der Ruhr-Universitat Bochum","date_updated":"2026-04-30T09:32:25Z","doi":"10.46586/tches.v2025.i4.290-316","title":"ECTester: Reverse-engineering side-channel countermeasures of ECC implementations","issue":"4","publication_status":"published","publication_identifier":{"issn":["2569-2925"]},"citation":{"apa":"Suchanek, V., Jancar, J., Kvapil, J., Svenda, P., &#38; Chmielewski, Ł. (2025). ECTester: Reverse-engineering side-channel countermeasures of ECC implementations. <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>, <i>2025</i>(4), 290–316. <a href=\"https://doi.org/10.46586/tches.v2025.i4.290-316\">https://doi.org/10.46586/tches.v2025.i4.290-316</a>","short":"V. Suchanek, J. Jancar, J. Kvapil, P. Svenda, Ł. Chmielewski, IACR Transactions on Cryptographic Hardware and Embedded Systems 2025 (2025) 290–316.","bibtex":"@article{Suchanek_Jancar_Kvapil_Svenda_Chmielewski_2025, title={ECTester: Reverse-engineering side-channel countermeasures of ECC implementations}, volume={2025}, DOI={<a href=\"https://doi.org/10.46586/tches.v2025.i4.290-316\">10.46586/tches.v2025.i4.290-316</a>}, number={4}, journal={IACR Transactions on Cryptographic Hardware and Embedded Systems}, publisher={Universitatsbibliothek der Ruhr-Universitat Bochum}, author={Suchanek, Vojtech and Jancar, Jan and Kvapil, Jan and Svenda, Petr and Chmielewski, Łukasz}, year={2025}, pages={290–316} }","mla":"Suchanek, Vojtech, et al. “ECTester: Reverse-Engineering Side-Channel Countermeasures of ECC Implementations.” <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>, vol. 2025, no. 4, Universitatsbibliothek der Ruhr-Universitat Bochum, 2025, pp. 290–316, doi:<a href=\"https://doi.org/10.46586/tches.v2025.i4.290-316\">10.46586/tches.v2025.i4.290-316</a>.","chicago":"Suchanek, Vojtech, Jan Jancar, Jan Kvapil, Petr Svenda, and Łukasz Chmielewski. “ECTester: Reverse-Engineering Side-Channel Countermeasures of ECC Implementations.” <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i> 2025, no. 4 (2025): 290–316. <a href=\"https://doi.org/10.46586/tches.v2025.i4.290-316\">https://doi.org/10.46586/tches.v2025.i4.290-316</a>.","ieee":"V. Suchanek, J. Jancar, J. Kvapil, P. Svenda, and Ł. Chmielewski, “ECTester: Reverse-engineering side-channel countermeasures of ECC implementations,” <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>, vol. 2025, no. 4, pp. 290–316, 2025, doi: <a href=\"https://doi.org/10.46586/tches.v2025.i4.290-316\">10.46586/tches.v2025.i4.290-316</a>.","ama":"Suchanek V, Jancar J, Kvapil J, Svenda P, Chmielewski Ł. ECTester: Reverse-engineering side-channel countermeasures of ECC implementations. <i>IACR Transactions on Cryptographic Hardware and Embedded Systems</i>. 2025;2025(4):290-316. doi:<a href=\"https://doi.org/10.46586/tches.v2025.i4.290-316\">10.46586/tches.v2025.i4.290-316</a>"},"intvolume":"      2025","page":"290-316","year":"2025"},{"external_id":{"arxiv":["2401.02368"]},"_id":"50272","user_id":"71541","language":[{"iso":"eng"}],"publication":"16th Innovations in Theoretical Computer Science (ITCS)","type":"conference","abstract":[{"lang":"eng","text":"Despite the fundamental role the Quantum Satisfiability (QSAT) problem has\r\nplayed in quantum complexity theory, a central question remains open: At which\r\nlocal dimension does the complexity of QSAT transition from \"easy\" to \"hard\"?\r\nHere, we study QSAT with each constraint acting on a $k$-dimensional and\r\n$l$-dimensional qudit pair, denoted $(k,l)$-QSAT. Our first main result shows\r\nthat, surprisingly, QSAT on qubits can remain $\\mathsf{QMA}_1$-hard, in that\r\n$(2,5)$-QSAT is $\\mathsf{QMA}_1$-complete. In contrast, $2$-SAT on qubits is\r\nwell-known to be poly-time solvable [Bravyi, 2006]. Our second main result\r\nproves that $(3,d)$-QSAT on the 1D line with $d\\in O(1)$ is also\r\n$\\mathsf{QMA}_1$-hard. Finally, we initiate the study of 1D $(2,d)$-QSAT by\r\ngiving a frustration-free 1D Hamiltonian with a unique, entangled ground state.\r\n  Our first result uses a direct embedding, combining a novel clock\r\nconstruction with the 2D circuit-to-Hamiltonian construction of [Gosset, Nagaj,\r\n2013]. Of note is a new simplified and analytic proof for the latter (as\r\nopposed to a partially numeric proof in [GN13]). This exploits Unitary Labelled\r\nGraphs [Bausch, Cubitt, Ozols, 2017] together with a new \"Nullspace Connection\r\nLemma\", allowing us to break low energy analyses into small patches of\r\nprojectors, and to improve the soundness analysis of [GN13] from\r\n$\\Omega(1/T^6)$ to $\\Omega(1/T^2)$, for $T$ the number of gates. Our second\r\nresult goes via black-box reduction: Given an arbitrary 1D Hamiltonian $H$ on\r\n$d'$-dimensional qudits, we show how to embed it into an effective null-space\r\nof a 1D $(3,d)$-QSAT instance, for $d\\in O(1)$. Our approach may be viewed as a\r\nweaker notion of \"simulation\" (\\`a la [Bravyi, Hastings 2017], [Cubitt,\r\nMontanaro, Piddock 2018]). As far as we are aware, this gives the first\r\n\"black-box simulation\"-based $\\mathsf{QMA}_1$-hardness result, i.e. for\r\nfrustration-free Hamiltonians."}],"status":"public","date_updated":"2026-04-30T14:10:03Z","volume":325,"author":[{"first_name":"Dorian","last_name":"Rudolph","full_name":"Rudolph, Dorian","id":"57863"},{"full_name":"Gharibian, Sevag","id":"71541","orcid":"0000-0002-9992-3379","last_name":"Gharibian","first_name":"Sevag"},{"first_name":"Daniel","full_name":"Nagaj, Daniel","last_name":"Nagaj"}],"date_created":"2024-01-07T20:09:13Z","title":"Quantum 2-SAT on low dimensional systems is $\\mathsf{QMA}_1$-complete:  Direct embeddings and black-box simulation","doi":"10.4230/LIPIcs.ITCS.2025.85","publication_status":"published","issue":"85","year":"2025","intvolume":"       325","page":"1-24","citation":{"ieee":"D. Rudolph, S. Gharibian, and D. Nagaj, “Quantum 2-SAT on low dimensional systems is $\\mathsf{QMA}_1$-complete:  Direct embeddings and black-box simulation,” in <i>16th Innovations in Theoretical Computer Science (ITCS)</i>, 2025, vol. 325, no. 85, pp. 1–24, doi: <a href=\"https://doi.org/10.4230/LIPIcs.ITCS.2025.85\">10.4230/LIPIcs.ITCS.2025.85</a>.","chicago":"Rudolph, Dorian, Sevag Gharibian, and Daniel Nagaj. “Quantum 2-SAT on Low Dimensional Systems Is $\\mathsf{QMA}_1$-Complete:  Direct Embeddings and Black-Box Simulation.” In <i>16th Innovations in Theoretical Computer Science (ITCS)</i>, 325:1–24, 2025. <a href=\"https://doi.org/10.4230/LIPIcs.ITCS.2025.85\">https://doi.org/10.4230/LIPIcs.ITCS.2025.85</a>.","mla":"Rudolph, Dorian, et al. “Quantum 2-SAT on Low Dimensional Systems Is $\\mathsf{QMA}_1$-Complete:  Direct Embeddings and Black-Box Simulation.” <i>16th Innovations in Theoretical Computer Science (ITCS)</i>, vol. 325, no. 85, 2025, pp. 1–24, doi:<a href=\"https://doi.org/10.4230/LIPIcs.ITCS.2025.85\">10.4230/LIPIcs.ITCS.2025.85</a>.","short":"D. Rudolph, S. Gharibian, D. Nagaj, in: 16th Innovations in Theoretical Computer Science (ITCS), 2025, pp. 1–24.","bibtex":"@inproceedings{Rudolph_Gharibian_Nagaj_2025, title={Quantum 2-SAT on low dimensional systems is $\\mathsf{QMA}_1$-complete:  Direct embeddings and black-box simulation}, volume={325}, DOI={<a href=\"https://doi.org/10.4230/LIPIcs.ITCS.2025.85\">10.4230/LIPIcs.ITCS.2025.85</a>}, number={85}, booktitle={16th Innovations in Theoretical Computer Science (ITCS)}, author={Rudolph, Dorian and Gharibian, Sevag and Nagaj, Daniel}, year={2025}, pages={1–24} }","ama":"Rudolph D, Gharibian S, Nagaj D. Quantum 2-SAT on low dimensional systems is $\\mathsf{QMA}_1$-complete:  Direct embeddings and black-box simulation. In: <i>16th Innovations in Theoretical Computer Science (ITCS)</i>. Vol 325. ; 2025:1-24. doi:<a href=\"https://doi.org/10.4230/LIPIcs.ITCS.2025.85\">10.4230/LIPIcs.ITCS.2025.85</a>","apa":"Rudolph, D., Gharibian, S., &#38; Nagaj, D. (2025). Quantum 2-SAT on low dimensional systems is $\\mathsf{QMA}_1$-complete:  Direct embeddings and black-box simulation. <i>16th Innovations in Theoretical Computer Science (ITCS)</i>, <i>325</i>(85), 1–24. <a href=\"https://doi.org/10.4230/LIPIcs.ITCS.2025.85\">https://doi.org/10.4230/LIPIcs.ITCS.2025.85</a>"}},{"language":[{"iso":"eng"}],"user_id":"71541","external_id":{"arxiv":["2510.08545"]},"_id":"61776","status":"public","abstract":[{"text":"We investigate the role of energy, i.e. average photon number, as a resource\r\nin the computational complexity of bosonic systems. We show three sets of\r\nresults: (1. Energy growth rates) There exist bosonic gate sets which increase\r\nenergy incredibly rapidly, obtaining e.g. infinite energy in finite/constant\r\ntime. We prove these high energies can make computing properties of bosonic\r\ncomputations, such as deciding whether a given computation will attain infinite\r\nenergy, extremely difficult, formally undecidable. (2. Lower bounds on\r\ncomputational power) More energy ``='' more computational power. For example,\r\ncertain gate sets allow poly-time bosonic computations to simulate PTOWER, the\r\nset of deterministic computations whose runtime scales as a tower of\r\nexponentials with polynomial height. Even just exponential energy and $O(1)$\r\nmodes suffice to simulate NP, which, importantly, is a setup similar to that of\r\nthe recent bosonic factoring algorithm of [Brenner, Caha, Coiteux-Roy and\r\nKoenig (2024)]. For simpler gate sets, we show an energy hierarchy theorem. (3.\r\nUpper bounds on computational power) Bosonic computations with polynomial\r\nenergy can be simulated in BQP, ``physical'' bosonic computations with\r\narbitrary finite energy are decidable, and the gate set consisting of Gaussian\r\ngates and the cubic phase gate can be simulated in PP, with exponential bound\r\non energy, improving upon the previous PSPACE upper bound. Finally, combining\r\nupper and lower bounds yields no-go theorems for a continuous-variable\r\nSolovay--Kitaev theorem for gate sets such as the Gaussian and cubic phase\r\ngates.","lang":"eng"}],"publication":"arXiv:2510.08545","type":"preprint","title":"Energy, Bosons and Computational Complexity","date_created":"2025-10-10T13:44:52Z","author":[{"last_name":"Chabaud","full_name":"Chabaud, Ulysse","first_name":"Ulysse"},{"first_name":"Sevag","full_name":"Gharibian, Sevag","id":"71541","orcid":"0000-0002-9992-3379","last_name":"Gharibian"},{"first_name":"Saeed","last_name":"Mehraban","full_name":"Mehraban, Saeed"},{"first_name":"Arsalan","full_name":"Motamedi, Arsalan","last_name":"Motamedi"},{"full_name":"Naeij, Hamid Reza","last_name":"Naeij","first_name":"Hamid Reza"},{"last_name":"Rudolph","id":"57863","full_name":"Rudolph, Dorian","first_name":"Dorian"},{"last_name":"Sambrani","full_name":"Sambrani, Dhruva","first_name":"Dhruva"}],"date_updated":"2026-04-30T14:08:24Z","citation":{"apa":"Chabaud, U., Gharibian, S., Mehraban, S., Motamedi, A., Naeij, H. R., Rudolph, D., &#38; Sambrani, D. (2025). Energy, Bosons and Computational Complexity. In <i>arXiv:2510.08545</i>.","bibtex":"@article{Chabaud_Gharibian_Mehraban_Motamedi_Naeij_Rudolph_Sambrani_2025, title={Energy, Bosons and Computational Complexity}, journal={arXiv:2510.08545}, author={Chabaud, Ulysse and Gharibian, Sevag and Mehraban, Saeed and Motamedi, Arsalan and Naeij, Hamid Reza and Rudolph, Dorian and Sambrani, Dhruva}, year={2025} }","short":"U. Chabaud, S. Gharibian, S. Mehraban, A. Motamedi, H.R. Naeij, D. Rudolph, D. Sambrani, ArXiv:2510.08545 (2025).","mla":"Chabaud, Ulysse, et al. “Energy, Bosons and Computational Complexity.” <i>ArXiv:2510.08545</i>, 2025.","ama":"Chabaud U, Gharibian S, Mehraban S, et al. Energy, Bosons and Computational Complexity. <i>arXiv:251008545</i>. Published online 2025.","ieee":"U. Chabaud <i>et al.</i>, “Energy, Bosons and Computational Complexity,” <i>arXiv:2510.08545</i>. 2025.","chicago":"Chabaud, Ulysse, Sevag Gharibian, Saeed Mehraban, Arsalan Motamedi, Hamid Reza Naeij, Dorian Rudolph, and Dhruva Sambrani. “Energy, Bosons and Computational Complexity.” <i>ArXiv:2510.08545</i>, 2025."},"year":"2025"},{"language":[{"iso":"eng"}],"external_id":{"arxiv":["2510.06796"]},"_id":"61778","user_id":"71541","department":[{"_id":"7"},{"_id":"623"}],"abstract":[{"lang":"eng","text":"Understanding the entanglement structure of local Hamiltonian ground spaces\r\nis a physically motivated problem, with applications ranging from tensor\r\nnetwork design to quantum error-correcting codes. To this end, we study the\r\ncomplexity of estimating ground state entanglement, and more generally entropy\r\nestimation for low energy states and Gibbs states. We find, in particular, that\r\nthe classes qq-QAM [Kobayashi, le Gall, Nishimura, SICOMP 2019] (a quantum\r\nanalogue of public-coin AM) and QMA(2) (QMA with unentangled proofs) play a\r\ncrucial role for such problems, showing: (1) Detecting a high-entanglement\r\nground state is qq-QAM-complete, (2) computing an additive error approximation\r\nto the Helmholtz free energy (equivalently, a multiplicative error\r\napproximation to the partition function) is in qq-QAM, (3) detecting a\r\nlow-entanglement ground state is QMA(2)-hard, and (4) detecting low energy\r\nstates which are close to product states can range from QMA-complete to\r\nQMA(2)-complete. Our results make progress on an open question of [Bravyi,\r\nChowdhury, Gosset and Wocjan, Nature Physics 2022] on free energy, and yield\r\nthe first QMA(2)-complete Hamiltonian problem using local Hamiltonians (cf. the\r\nsparse QMA(2)-complete Hamiltonian problem of [Chailloux, Sattath, CCC 2012])."}],"status":"public","type":"preprint","publication":"arXiv:2510.06796","title":"On the complexity of estimating ground state entanglement and free  energy","date_updated":"2026-04-30T14:08:44Z","date_created":"2025-10-10T13:45:28Z","author":[{"orcid":"0000-0002-9992-3379","last_name":"Gharibian","id":"71541","full_name":"Gharibian, Sevag","first_name":"Sevag"},{"full_name":"Kamminga, Jonas","last_name":"Kamminga","first_name":"Jonas"}],"year":"2025","citation":{"chicago":"Gharibian, Sevag, and Jonas Kamminga. “On the Complexity of Estimating Ground State Entanglement and Free  Energy.” <i>ArXiv:2510.06796</i>, 2025.","ieee":"S. Gharibian and J. Kamminga, “On the complexity of estimating ground state entanglement and free  energy,” <i>arXiv:2510.06796</i>. 2025.","ama":"Gharibian S, Kamminga J. On the complexity of estimating ground state entanglement and free  energy. <i>arXiv:251006796</i>. Published online 2025.","apa":"Gharibian, S., &#38; Kamminga, J. (2025). On the complexity of estimating ground state entanglement and free  energy. In <i>arXiv:2510.06796</i>.","mla":"Gharibian, Sevag, and Jonas Kamminga. “On the Complexity of Estimating Ground State Entanglement and Free  Energy.” <i>ArXiv:2510.06796</i>, 2025.","short":"S. Gharibian, J. Kamminga, ArXiv:2510.06796 (2025).","bibtex":"@article{Gharibian_Kamminga_2025, title={On the complexity of estimating ground state entanglement and free  energy}, journal={arXiv:2510.06796}, author={Gharibian, Sevag and Kamminga, Jonas}, year={2025} }"}},{"issue":"2","year":"2025","date_created":"2026-05-05T12:12:35Z","publisher":"Waxmann","title":"Land und Nation: Perspektiven vergleichender Forschung in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis","publication":"Tertium Comparationis","abstract":[{"lang":"ger","text":"Dieser Artikel spiegelt die dreißigjährige Geschichte der Zeitschrift Tertium Comparationis, indem er eine der zentralen Vergleichseinheiten Vergleichender Erziehungswissenschaft in den Blick nimmt. Themenhefte und Einzelbeiträge der Zeitschrift Tertium Comparationis haben über die Jahrzehnte immer wieder reflexive Blicke auf die Vergleichseinheit Land und/oder Nation geworfen, aber auch – ohne Bezüge zu solchen Diskursen – Länder- und Nationenvergleiche in unterschiedlichen Vorgehensweisen präsentiert. Bei der intensiven und analytischen Lektüre der Themen und Inhalte ergeben sich Cluster der Perspektivsetzungen und damit verbundene Diskurse, von denen einige aufgrund ihrer Häufigkeit und Intensität besonders relevant erscheinen. Die aufzufindenden Diskurse und Cluster werden im Beitrag präsentiert und anhand normativer, kritischer und innovativer Beiträge verifiziert. Trotz konstant wiederholter Kritik und konzeptueller Änderungen, bleiben Land und Nation zentrale Kategorien Vergleichender Erziehungswissenschaft."}],"language":[{"iso":"ger"}],"keyword":["Tertium Comparationis","Land","Nation","Vergleichende Erziehungswissenschaft","Diskurse"],"publication_identifier":{"issn":["0947-9732","1434-1697"]},"publication_status":"published","intvolume":"      2025","page":"156-167","citation":{"ama":"Freitag C. Land und Nation: Perspektiven vergleichender Forschung in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis. <i>Tertium Comparationis</i>. 2025;2025(2):156-167. doi:<a href=\"https://doi.org/10.31244/tc.2025.02.02\">10.31244/tc.2025.02.02</a>","ieee":"C. Freitag, “Land und Nation: Perspektiven vergleichender Forschung in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis,” <i>Tertium Comparationis</i>, vol. 2025, no. 2, pp. 156–167, 2025, doi: <a href=\"https://doi.org/10.31244/tc.2025.02.02\">10.31244/tc.2025.02.02</a>.","chicago":"Freitag, Christine. “Land und Nation: Perspektiven vergleichender Forschung in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis.” <i>Tertium Comparationis</i> 2025, no. 2 (2025): 156–67. <a href=\"https://doi.org/10.31244/tc.2025.02.02\">https://doi.org/10.31244/tc.2025.02.02</a>.","apa":"Freitag, C. (2025). Land und Nation: Perspektiven vergleichender Forschung in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis. <i>Tertium Comparationis</i>, <i>2025</i>(2), 156–167. <a href=\"https://doi.org/10.31244/tc.2025.02.02\">https://doi.org/10.31244/tc.2025.02.02</a>","mla":"Freitag, Christine. “Land und Nation: Perspektiven vergleichender Forschung in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis.” <i>Tertium Comparationis</i>, vol. 2025, no. 2, Waxmann, 2025, pp. 156–67, doi:<a href=\"https://doi.org/10.31244/tc.2025.02.02\">10.31244/tc.2025.02.02</a>.","bibtex":"@article{Freitag_2025, title={Land und Nation: Perspektiven vergleichender Forschung in ausgewählten  Diskursen der Zeitschrift Tertium Comparationis}, volume={2025}, DOI={<a href=\"https://doi.org/10.31244/tc.2025.02.02\">10.31244/tc.2025.02.02</a>}, number={2}, journal={Tertium Comparationis}, publisher={Waxmann}, author={Freitag, Christine}, year={2025}, pages={156–167} }","short":"C. Freitag, Tertium Comparationis 2025 (2025) 156–167."},"volume":2025,"author":[{"id":"20560","full_name":"Freitag, Christine","last_name":"Freitag","first_name":"Christine"}],"oa":"1","date_updated":"2026-05-05T13:05:33Z","doi":"10.31244/tc.2025.02.02","main_file_link":[{"open_access":"1","url":"https://www.waxmann.com/shop/download?tx_p2waxmann_download%5Baction%5D=download&tx_p2waxmann_download%5Bcontroller%5D=Zeitschrift&tx_p2waxmann_download%5Bid_artikel%5D=ART106580&tx_p2waxmann_download%5Buid%5D=frei&cHash=8bebe3e88a1eab177e7c65196dbb1715"}],"type":"journal_article","status":"public","department":[{"_id":"453"}],"user_id":"10831","_id":"65559"},{"publication_status":"published","publication_identifier":{"issn":["2813-4605"]},"citation":{"ama":"Karsten A. Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride. <i>Frontiers in Language Sciences</i>. 2025;4. doi:<a href=\"https://doi.org/10.3389/flang.2025.1567498\">10.3389/flang.2025.1567498</a>","ieee":"A. Karsten, “Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride,” <i>Frontiers in Language Sciences</i>, vol. 4, Art. no. 1567498, 2025, doi: <a href=\"https://doi.org/10.3389/flang.2025.1567498\">10.3389/flang.2025.1567498</a>.","chicago":"Karsten, Andrea. “Understanding Personal Agency through Metaphor, or Why Academic Writing Is (Not) like a Roller-Coaster Ride.” <i>Frontiers in Language Sciences</i> 4 (2025). <a href=\"https://doi.org/10.3389/flang.2025.1567498\">https://doi.org/10.3389/flang.2025.1567498</a>.","apa":"Karsten, A. (2025). Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride. <i>Frontiers in Language Sciences</i>, <i>4</i>, Article 1567498. <a href=\"https://doi.org/10.3389/flang.2025.1567498\">https://doi.org/10.3389/flang.2025.1567498</a>","short":"A. Karsten, Frontiers in Language Sciences 4 (2025).","bibtex":"@article{Karsten_2025, title={Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride}, volume={4}, DOI={<a href=\"https://doi.org/10.3389/flang.2025.1567498\">10.3389/flang.2025.1567498</a>}, number={1567498}, journal={Frontiers in Language Sciences}, publisher={Frontiers Media SA}, author={Karsten, Andrea}, year={2025} }","mla":"Karsten, Andrea. “Understanding Personal Agency through Metaphor, or Why Academic Writing Is (Not) like a Roller-Coaster Ride.” <i>Frontiers in Language Sciences</i>, vol. 4, 1567498, Frontiers Media SA, 2025, doi:<a href=\"https://doi.org/10.3389/flang.2025.1567498\">10.3389/flang.2025.1567498</a>."},"intvolume":"         4","year":"2025","date_created":"2025-09-10T10:50:30Z","author":[{"full_name":"Karsten, Andrea","last_name":"Karsten","first_name":"Andrea"}],"volume":4,"publisher":"Frontiers Media SA","date_updated":"2026-05-06T08:37:28Z","doi":"10.3389/flang.2025.1567498","title":"Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride","type":"journal_article","publication":"Frontiers in Language Sciences","status":"public","abstract":[{"text":"<jats:p>Building on and methodologically extending conceptual metaphor theory, the article examines how personal agency as a discursively produced sociopsychological phenomenon can be studied in elicited metaphors through a discourse-analytical approach. More concretely, the study illustrates how early-career researchers experience and express their agency in research writing through personal metaphors of academic writing such as riding a roller coaster or baking a wedding cake. A two-step discursive analysis adapts Hopper and Thompson's multidimensional approach to linguistic transitivity to study agency in language. The analytical approach involves both an in-depth parametrized analysis of all metaphors in the sample and a qualitative cross-analysis of the data. The results show that the participants' metaphors reflect both nuanced personal experiences and cultural expectations of academic writing, the writer, and the text. This emphasizes that research writing is not only a highly subjective practice but also one that is socially and culturally influenced. The article argues that research on agency thus needs elaborate methodological tools to trace discursive and sociopsychological trajectories of complex socio-cognitive practices like academic writing. This has implications not only for the nexus of research writing, identity, and academic enculturation but also for other fields focusing on agency in language.</jats:p>","lang":"eng"}],"user_id":"53917","_id":"61164","article_number":"1567498"},{"author":[{"first_name":"Stefan Teodorov","orcid":"0009-0009-0892-9483","last_name":"Lazarov","id":"90345","full_name":"Lazarov, Stefan Teodorov"},{"last_name":"Türk","full_name":"Türk, Olcay","first_name":"Olcay"},{"first_name":"Angela","id":"57578","full_name":"Grimminger, Angela","last_name":"Grimminger"},{"last_name":"Wagner","full_name":"Wagner, Petra ","first_name":"Petra "},{"full_name":"Buschmeier, Hendrik","last_name":"Buschmeier","first_name":"Hendrik"}],"date_created":"2026-05-05T14:09:18Z","publisher":"LibreCat University","date_updated":"2026-05-05T14:18:35Z","doi":"10.17605/OSF.IO/J2DHA","title":"Annotation Schemes Project A02 \"Monitoring the understanding of explanations\"","publication_status":"published","citation":{"apa":"Lazarov, S. T., Türk, O., Grimminger, A., Wagner, P., &#38; Buschmeier, H. (2025). <i>Annotation Schemes Project A02 “Monitoring the understanding of explanations.”</i> LibreCat University. <a href=\"https://doi.org/10.17605/OSF.IO/J2DHA\">https://doi.org/10.17605/OSF.IO/J2DHA</a>","mla":"Lazarov, Stefan Teodorov, et al. <i>Annotation Schemes Project A02 “Monitoring the Understanding of Explanations.”</i> LibreCat University, 2025, doi:<a href=\"https://doi.org/10.17605/OSF.IO/J2DHA\">10.17605/OSF.IO/J2DHA</a>.","short":"S.T. Lazarov, O. Türk, A. Grimminger, P. Wagner, H. Buschmeier, Annotation Schemes Project A02 “Monitoring the Understanding of Explanations,” LibreCat University, 2025.","bibtex":"@book{Lazarov_Türk_Grimminger_Wagner_Buschmeier_2025, title={Annotation Schemes Project A02 “Monitoring the understanding of explanations”}, DOI={<a href=\"https://doi.org/10.17605/OSF.IO/J2DHA\">10.17605/OSF.IO/J2DHA</a>}, publisher={LibreCat University}, author={Lazarov, Stefan Teodorov and Türk, Olcay and Grimminger, Angela and Wagner, Petra  and Buschmeier, Hendrik}, year={2025} }","ieee":"S. T. Lazarov, O. Türk, A. Grimminger, P. Wagner, and H. Buschmeier, <i>Annotation Schemes Project A02 “Monitoring the understanding of explanations.”</i> LibreCat University, 2025.","chicago":"Lazarov, Stefan Teodorov, Olcay Türk, Angela Grimminger, Petra  Wagner, and Hendrik Buschmeier. <i>Annotation Schemes Project A02 “Monitoring the Understanding of Explanations.”</i> LibreCat University, 2025. <a href=\"https://doi.org/10.17605/OSF.IO/J2DHA\">https://doi.org/10.17605/OSF.IO/J2DHA</a>.","ama":"Lazarov ST, Türk O, Grimminger A, Wagner P, Buschmeier H. <i>Annotation Schemes Project A02 “Monitoring the Understanding of Explanations.”</i> LibreCat University; 2025. doi:<a href=\"https://doi.org/10.17605/OSF.IO/J2DHA\">10.17605/OSF.IO/J2DHA</a>"},"year":"2025","user_id":"90345","_id":"65564","project":[{"name":"TRR 318; TP A02: Verstehensprozess einer Erklärung beobachten und auswerten","_id":"112"}],"language":[{"iso":"eng"}],"type":"misc","status":"public"},{"citation":{"ama":"Karsten AR. Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride. <i>Frontiers in Language Sciences</i>. 2025;4. doi:<a href=\"https://doi.org/10.3389/flang.2025.1567498\">10.3389/flang.2025.1567498</a>","chicago":"Karsten, Andrea Ramona. “Understanding Personal Agency through Metaphor, or Why Academic Writing Is (Not) like a Roller-Coaster Ride.” <i>Frontiers in Language Sciences</i> 4 (2025). <a href=\"https://doi.org/10.3389/flang.2025.1567498\">https://doi.org/10.3389/flang.2025.1567498</a>.","ieee":"A. R. Karsten, “Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride,” <i>Frontiers in Language Sciences</i>, vol. 4, Art. no. 1567498, 2025, doi: <a href=\"https://doi.org/10.3389/flang.2025.1567498\">10.3389/flang.2025.1567498</a>.","bibtex":"@article{Karsten_2025, title={Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride}, volume={4}, DOI={<a href=\"https://doi.org/10.3389/flang.2025.1567498\">10.3389/flang.2025.1567498</a>}, number={1567498}, journal={Frontiers in Language Sciences}, publisher={Frontiers Media SA}, author={Karsten, Andrea Ramona}, year={2025} }","short":"A.R. Karsten, Frontiers in Language Sciences 4 (2025).","mla":"Karsten, Andrea Ramona. “Understanding Personal Agency through Metaphor, or Why Academic Writing Is (Not) like a Roller-Coaster Ride.” <i>Frontiers in Language Sciences</i>, vol. 4, 1567498, Frontiers Media SA, 2025, doi:<a href=\"https://doi.org/10.3389/flang.2025.1567498\">10.3389/flang.2025.1567498</a>.","apa":"Karsten, A. R. (2025). Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride. <i>Frontiers in Language Sciences</i>, <i>4</i>, Article 1567498. <a href=\"https://doi.org/10.3389/flang.2025.1567498\">https://doi.org/10.3389/flang.2025.1567498</a>"},"intvolume":"         4","year":"2025","related_material":{"link":[{"url":"https://www.frontiersin.org/articles/10.3389/flang.2025.1567498/full#supplementary-material","relation":"confirmation"}]},"publication_status":"published","publication_identifier":{"issn":["2813-4605"]},"doi":"10.3389/flang.2025.1567498","title":"Understanding personal agency through metaphor, or Why academic writing is (not) like a roller-coaster ride","date_created":"2025-09-10T10:51:29Z","author":[{"first_name":"Andrea Ramona","last_name":"Karsten","orcid":"0000-0003-0194-2000","id":"53917","full_name":"Karsten, Andrea Ramona"}],"volume":4,"publisher":"Frontiers Media SA","date_updated":"2026-05-06T08:42:08Z","status":"public","abstract":[{"lang":"eng","text":"<jats:p>Building on and methodologically extending conceptual metaphor theory, the article examines how personal agency as a discursively produced sociopsychological phenomenon can be studied in elicited metaphors through a discourse-analytical approach. More concretely, the study illustrates how early-career researchers experience and express their agency in research writing through personal metaphors of academic writing such as riding a roller coaster or baking a wedding cake. A two-step discursive analysis adapts Hopper and Thompson's multidimensional approach to linguistic transitivity to study agency in language. The analytical approach involves both an in-depth parametrized analysis of all metaphors in the sample and a qualitative cross-analysis of the data. The results show that the participants' metaphors reflect both nuanced personal experiences and cultural expectations of academic writing, the writer, and the text. This emphasizes that research writing is not only a highly subjective practice but also one that is socially and culturally influenced. The article argues that research on agency thus needs elaborate methodological tools to trace discursive and sociopsychological trajectories of complex socio-cognitive practices like academic writing. This has implications not only for the nexus of research writing, identity, and academic enculturation but also for other fields focusing on agency in language.</jats:p>"}],"type":"journal_article","publication":"Frontiers in Language Sciences","language":[{"iso":"eng"}],"article_number":"1567498","user_id":"53917","project":[{"name":"TRR 318: Project Area RTG - Integriertes Graduiertenkolleg","_id":"120"}],"_id":"61165"},{"citation":{"apa":"Cao, C., &#38; Steinrück, H.-G. (2024). Molecular-scale synchrotron X-ray investigations of solid-liquid interfaces in lithium-ion batteries. In <i>Reference Module in Chemistry, Molecular Sciences and Chemical Engineering</i> (pp. 391–416). Elsevier. <a href=\"https://doi.org/10.1016/b978-0-323-85669-0.00105-7\">https://doi.org/10.1016/b978-0-323-85669-0.00105-7</a>","short":"C. Cao, H.-G. Steinrück, in: Reference Module in Chemistry, Molecular Sciences and Chemical Engineering, Elsevier, 2024, pp. 391–416.","bibtex":"@inbook{Cao_Steinrück_2024, title={Molecular-scale synchrotron X-ray investigations of solid-liquid interfaces in lithium-ion batteries}, DOI={<a href=\"https://doi.org/10.1016/b978-0-323-85669-0.00105-7\">10.1016/b978-0-323-85669-0.00105-7</a>}, booktitle={Reference Module in Chemistry, Molecular Sciences and Chemical Engineering}, publisher={Elsevier}, author={Cao, Chuntian and Steinrück, Hans-Georg}, year={2024}, pages={391–416} }","mla":"Cao, Chuntian, and Hans-Georg Steinrück. “Molecular-Scale Synchrotron X-Ray Investigations of Solid-Liquid Interfaces in Lithium-Ion Batteries.” <i>Reference Module in Chemistry, Molecular Sciences and Chemical Engineering</i>, Elsevier, 2024, pp. 391–416, doi:<a href=\"https://doi.org/10.1016/b978-0-323-85669-0.00105-7\">10.1016/b978-0-323-85669-0.00105-7</a>.","ama":"Cao C, Steinrück H-G. Molecular-scale synchrotron X-ray investigations of solid-liquid interfaces in lithium-ion batteries. In: <i>Reference Module in Chemistry, Molecular Sciences and Chemical Engineering</i>. Elsevier; 2024:391-416. doi:<a href=\"https://doi.org/10.1016/b978-0-323-85669-0.00105-7\">10.1016/b978-0-323-85669-0.00105-7</a>","ieee":"C. Cao and H.-G. Steinrück, “Molecular-scale synchrotron X-ray investigations of solid-liquid interfaces in lithium-ion batteries,” in <i>Reference Module in Chemistry, Molecular Sciences and Chemical Engineering</i>, Elsevier, 2024, pp. 391–416.","chicago":"Cao, Chuntian, and Hans-Georg Steinrück. “Molecular-Scale Synchrotron X-Ray Investigations of Solid-Liquid Interfaces in Lithium-Ion Batteries.” In <i>Reference Module in Chemistry, Molecular Sciences and Chemical Engineering</i>, 391–416. Elsevier, 2024. <a href=\"https://doi.org/10.1016/b978-0-323-85669-0.00105-7\">https://doi.org/10.1016/b978-0-323-85669-0.00105-7</a>."},"page":"391-416","year":"2024","publication_status":"published","publication_identifier":{"isbn":["9780124095472"]},"doi":"10.1016/b978-0-323-85669-0.00105-7","title":"Molecular-scale synchrotron X-ray investigations of solid-liquid interfaces in lithium-ion batteries","date_created":"2023-07-01T15:48:53Z","author":[{"first_name":"Chuntian","last_name":"Cao","full_name":"Cao, Chuntian"},{"orcid":"0000-0001-6373-0877","last_name":"Steinrück","full_name":"Steinrück, Hans-Georg","id":"84268","first_name":"Hans-Georg"}],"date_updated":"2023-10-03T09:10:39Z","publisher":"Elsevier","status":"public","type":"book_chapter","publication":"Reference Module in Chemistry, Molecular Sciences and Chemical Engineering","language":[{"iso":"eng"}],"user_id":"84268","department":[{"_id":"633"}],"_id":"45827"},{"publication_status":"submitted","year":"2024","citation":{"apa":"Foerster, A. (n.d.). The Swineherd’s Wife who Scolded the King. In E. Butler &#38; I. Dumitrescu (Eds.), <i>Women in Early Medieval England</i>. Springer Textbook.","mla":"Foerster, Anne. “The Swineherd’s Wife Who Scolded the King.” <i>Women in Early Medieval England</i>, edited by Emily Butler and Irina Dumitrescu, Springer Textbook.","bibtex":"@inbook{Foerster, series={The New Middle Ages}, title={The Swineherd’s Wife who Scolded the King}, booktitle={Women in Early Medieval England}, publisher={Springer Textbook}, author={Foerster, Anne}, editor={Butler, Emily and Dumitrescu, Irina}, collection={The New Middle Ages} }","short":"A. Foerster, in: E. Butler, I. Dumitrescu (Eds.), Women in Early Medieval England, Springer Textbook, n.d.","ieee":"A. Foerster, “The Swineherd’s Wife who Scolded the King,” in <i>Women in Early Medieval England</i>, E. Butler and I. Dumitrescu, Eds. Springer Textbook.","chicago":"Foerster, Anne. “The Swineherd’s Wife Who Scolded the King.” In <i>Women in Early Medieval England</i>, edited by Emily Butler and Irina Dumitrescu. The New Middle Ages. Springer Textbook, n.d.","ama":"Foerster A. The Swineherd’s Wife who Scolded the King. In: Butler E, Dumitrescu I, eds. <i>Women in Early Medieval England</i>. The New Middle Ages. Springer Textbook."},"publisher":"Springer Textbook","date_updated":"2023-10-20T11:03:21Z","date_created":"2023-10-20T11:01:26Z","author":[{"first_name":"Anne","full_name":"Foerster, Anne","id":"67185","last_name":"Foerster"}],"title":"The Swineherd’s Wife who Scolded the King","publication":"Women in Early Medieval England","type":"encyclopedia_article","editor":[{"first_name":"Emily","last_name":"Butler","full_name":"Butler, Emily"},{"first_name":"Irina","full_name":"Dumitrescu, Irina","last_name":"Dumitrescu"}],"status":"public","_id":"48363","department":[{"_id":"6"}],"user_id":"67185","series_title":"The New Middle Ages","language":[{"iso":"eng"}]},{"department":[{"_id":"6"}],"series_title":"The New Middle Ages","user_id":"67185","_id":"48362","language":[{"iso":"eng"}],"publication":"Women in Early Medieval England","type":"encyclopedia_article","status":"public","editor":[{"first_name":"Emily","full_name":"Butler, Emily","last_name":"Butler"},{"first_name":"Irina","last_name":"Dumitrescu","full_name":"Dumitrescu, Irina"}],"author":[{"last_name":"Foerster","full_name":"Foerster, Anne","id":"67185","first_name":"Anne"}],"date_created":"2023-10-20T11:00:01Z","publisher":"Springer Textbook","date_updated":"2023-10-20T11:00:14Z","title":"Eadburh of Wessex","publication_status":"submitted","citation":{"short":"A. Foerster, in: E. Butler, I. Dumitrescu (Eds.), Women in Early Medieval England, Springer Textbook, n.d.","mla":"Foerster, Anne. “Eadburh of Wessex.” <i>Women in Early Medieval England</i>, edited by Emily Butler and Irina Dumitrescu, Springer Textbook.","bibtex":"@inbook{Foerster, series={The New Middle Ages}, title={Eadburh of Wessex}, booktitle={Women in Early Medieval England}, publisher={Springer Textbook}, author={Foerster, Anne}, editor={Butler, Emily and Dumitrescu, Irina}, collection={The New Middle Ages} }","apa":"Foerster, A. (n.d.). Eadburh of Wessex. In E. Butler &#38; I. Dumitrescu (Eds.), <i>Women in Early Medieval England</i>. Springer Textbook.","ieee":"A. Foerster, “Eadburh of Wessex,” in <i>Women in Early Medieval England</i>, E. Butler and I. Dumitrescu, Eds. Springer Textbook.","chicago":"Foerster, Anne. “Eadburh of Wessex.” In <i>Women in Early Medieval England</i>, edited by Emily Butler and Irina Dumitrescu. The New Middle Ages. Springer Textbook, n.d.","ama":"Foerster A. Eadburh of Wessex. In: Butler E, Dumitrescu I, eds. <i>Women in Early Medieval England</i>. The New Middle Ages. Springer Textbook."},"year":"2024"},{"title":"Seaxburh","author":[{"last_name":"Foerster","full_name":"Foerster, Anne","id":"67185","first_name":"Anne"}],"date_created":"2023-10-20T11:03:16Z","date_updated":"2023-10-20T11:03:20Z","publisher":"Springer Textbook","citation":{"mla":"Foerster, Anne. “Seaxburh.” <i>Women in Early Medieval England</i>, edited by Emily Butler and Irina Dumitrescu, Springer Textbook.","short":"A. Foerster, in: E. Butler, I. Dumitrescu (Eds.), Women in Early Medieval England, Springer Textbook, n.d.","bibtex":"@inbook{Foerster, series={The New Middle Ages}, title={Seaxburh}, booktitle={Women in Early Medieval England}, publisher={Springer Textbook}, author={Foerster, Anne}, editor={Butler, Emily and Dumitrescu, Irina}, collection={The New Middle Ages} }","apa":"Foerster, A. (n.d.). Seaxburh. In E. Butler &#38; I. Dumitrescu (Eds.), <i>Women in Early Medieval England</i>. Springer Textbook.","ieee":"A. Foerster, “Seaxburh,” in <i>Women in Early Medieval England</i>, E. Butler and I. Dumitrescu, Eds. Springer Textbook.","chicago":"Foerster, Anne. “Seaxburh.” In <i>Women in Early Medieval England</i>, edited by Emily Butler and Irina Dumitrescu. The New Middle Ages. Springer Textbook, n.d.","ama":"Foerster A. Seaxburh. In: Butler E, Dumitrescu I, eds. <i>Women in Early Medieval England</i>. The New Middle Ages. Springer Textbook."},"year":"2024","publication_status":"submitted","language":[{"iso":"eng"}],"department":[{"_id":"6"}],"series_title":"The New Middle Ages","user_id":"67185","_id":"48364","status":"public","editor":[{"first_name":"Emily","last_name":"Butler","full_name":"Butler, Emily"},{"full_name":"Dumitrescu, Irina","last_name":"Dumitrescu","first_name":"Irina"}],"publication":"Women in Early Medieval England","type":"encyclopedia_article"},{"citation":{"bibtex":"@inproceedings{Koldewey_Fichtler_Scholtysik_Biehler_Schreiner_Sommer_Schacht_Kaufmann_Rabe_Sedlmeier_et al._2024, title={Exploring Capabilities for the Smart Service Transformation in Manufacturing: Insights from Theory and Practice}, author={Koldewey, Christian and Fichtler, Timm and Scholtysik, Michel and Biehler, Jan and Schreiner, Nick and Sommer, Franziska and Schacht, Maximilian and Kaufmann, Jonas and Rabe, Martin and Sedlmeier, Joachim and et al.}, year={2024} }","short":"C. Koldewey, T. Fichtler, M. Scholtysik, J. Biehler, N. Schreiner, F. Sommer, M. Schacht, J. Kaufmann, M. Rabe, J. Sedlmeier, R. Dumitrescu, in: 2024.","mla":"Koldewey, Christian, et al. <i>Exploring Capabilities for the Smart Service Transformation in Manufacturing: Insights from Theory and Practice</i>. 2024.","apa":"Koldewey, C., Fichtler, T., Scholtysik, M., Biehler, J., Schreiner, N., Sommer, F., Schacht, M., Kaufmann, J., Rabe, M., Sedlmeier, J., &#38; Dumitrescu, R. (2024). <i>Exploring Capabilities for the Smart Service Transformation in Manufacturing: Insights from Theory and Practice</i>. Hawaii International Conference on System Sciences, Hawaii.","ama":"Koldewey C, Fichtler T, Scholtysik M, et al. Exploring Capabilities for the Smart Service Transformation in Manufacturing: Insights from Theory and Practice. In: ; 2024.","ieee":"C. Koldewey <i>et al.</i>, “Exploring Capabilities for the Smart Service Transformation in Manufacturing: Insights from Theory and Practice,” presented at the Hawaii International Conference on System Sciences, Hawaii, 2024.","chicago":"Koldewey, Christian, Timm Fichtler, Michel Scholtysik, Jan Biehler, Nick Schreiner, Franziska Sommer, Maximilian Schacht, et al. “Exploring Capabilities for the Smart Service Transformation in Manufacturing: Insights from Theory and Practice,” 2024."},"year":"2024","author":[{"first_name":"Christian","orcid":"https://orcid.org/0000-0001-7992-6399","last_name":"Koldewey","full_name":"Koldewey, Christian","id":"43136"},{"first_name":"Timm","orcid":"https://orcid.org/0000-0001-6034-4399","last_name":"Fichtler","id":"66731","full_name":"Fichtler, Timm"},{"first_name":"Michel","last_name":"Scholtysik","full_name":"Scholtysik, Michel","id":"50562"},{"last_name":"Biehler","full_name":"Biehler, Jan","first_name":"Jan"},{"first_name":"Nick","last_name":"Schreiner","full_name":"Schreiner, Nick"},{"last_name":"Sommer","full_name":"Sommer, Franziska","first_name":"Franziska"},{"last_name":"Schacht","full_name":"Schacht, Maximilian","first_name":"Maximilian"},{"last_name":"Kaufmann","full_name":"Kaufmann, Jonas","first_name":"Jonas"},{"full_name":"Rabe, Martin","last_name":"Rabe","first_name":"Martin"},{"first_name":"Joachim","full_name":"Sedlmeier, Joachim","last_name":"Sedlmeier"},{"first_name":"Roman","last_name":"Dumitrescu","id":"16190","full_name":"Dumitrescu, Roman"}],"date_created":"2023-11-06T15:31:32Z","date_updated":"2023-11-06T15:40:33Z","conference":{"location":"Hawaii","end_date":"2024-01-06","start_date":"2024-01-03","name":"Hawaii International Conference on System Sciences"},"title":"Exploring Capabilities for the Smart Service Transformation in Manufacturing: Insights from Theory and Practice","type":"conference","status":"public","abstract":[{"lang":"eng","text":"Digital Servitization is one of the significant trends affecting the manufacturing industry. Companies try to tackle challenges regarding their differentiation and profitability using digital services. One specific type of digital services are smart services, which are digital services built on data from smart products. Introducing these kinds of offerings into the portfolio of manufacturing companies is not trivial. Moreover, they require conscious action to align all relevant capabilities to realize the respective business goals. However, what capabilities are generally relevant for smart services remains opaque. We conducted a systematic literature review to identify them and extended the results through an interview study. Our analysis results in 78 capabilities clustered among 12 principles and six dimensions. These results provide significant support for the smart service transformation of manufacturing companies and for structuring the research field of smart services."}],"user_id":"66731","department":[{"_id":"563"},{"_id":"241"}],"_id":"48632","language":[{"iso":"eng"}],"keyword":["Digital Servitization","Transformation","Capabilities","Maturity","Smart Services"]}]
