Search Results - "Berndt, Sebastian"
-
1
Practical Access to Dynamic Programming on Tree Decompositions
Published in Algorithms (01-08-2019)“…Parameterized complexity theory has led to a wide range of algorithmic breakthroughs within the last few decades, but the practicability of these methods for…”
Get full text
Journal Article -
2
Recent Advances in Positive-Instance Driven Graph Searching
Published in Algorithms (01-01-2022)“…Research on the similarity of a graph to being a tree—called the treewidth of the graph—has seen an enormous rise within the last decade, but a practically…”
Get full text
Journal Article -
3
Polynomial sharings on two secrets: Buy one, get one free
Published in IACR transactions on cryptographic hardware and embedded systems (18-07-2024)“…While passive side-channel attacks and active fault attacks have been studied intensively in the last few decades, strong attackers combining these attacks…”
Get full text
Journal Article -
4
TeeJam: Sub-Cache-Line Leakages Strike Back
Published in IACR transactions on cryptographic hardware and embedded systems (04-12-2023)“…The microarchitectural behavior of modern CPUs is mostly hidden from developers and users of computer software. Due to a plethora of attacks exploiting…”
Get full text
Journal Article -
5
Side-Channel Protections for Picnic Signatures
Published in IACR transactions on cryptographic hardware and embedded systems (11-08-2021)“…We study masking countermeasures for side-channel attacks against signature schemes constructed from the MPC-in-the-head paradigm, specifically when the MPC…”
Get full text
Journal Article -
6
Online load balancing with general reassignment cost
Published in Operations research letters (01-05-2022)“…We investigate a semi-online variant of load balancing with restricted assignment. In this problem, we are given n jobs, which need to be processed by m…”
Get full text
Journal Article -
7
Fully dynamic bin packing revisited
Published in Mathematical programming (01-01-2020)“…We consider the fully dynamic bin packing problem, where items arrive and depart in an online fashion and repacking of previously packed items is allowed. The…”
Get full text
Journal Article -
8
On the universal steganography of optimal rate
Published in Information and computation (01-12-2020)“…In this work, we present the first secure stegosystem in the common computational model which, for any communication channel, is provably secure, reliable, and…”
Get full text
Journal Article -
9
Online bin covering with limited migration
Published in Journal of computer and system sciences (01-06-2023)“…Semi-online models where decisions may be revoked in a limited way have been studied extensively in the last years. A well-studied measure of the amount of…”
Get full text
Journal Article -
10
Learning residual alternating automata
Published in Information and computation (01-11-2022)“…Residuality plays an essential role for learning finite automata. While residual deterministic and nondeterministic automata have been understood quite well,…”
Get full text
Journal Article -
11
Resonant laser ionization of neptunium: investigation on excitation schemes and the first ionization potential
Published in The European physical journal. D, Atomic, molecular, and optical physics (01-05-2024)“…The atomic structure of neptunium (Np) was investigated by two-step resonance ionization spectroscopy. The study involved exploring ground-state transitions as…”
Get full text
Journal Article -
12
Positive-Instance Driven Dynamic Programming for Graph Searching
Published 03-05-2019“…Research on the similarity of a graph to being a tree - called the treewidth of the graph - has seen an enormous rise within the last decade, but a practically…”
Get full text
Journal Article -
13
"Act natural!": Exchanging Private Messages on Public Blockchains
Published in 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) (01-07-2023)“…Messengers have become an essential means of interpersonal interaction. Yet untraceable private communication remains an elusive goal, as most messengers hide…”
Get full text
Conference Proceeding -
14
New Support Size Bounds for Integer Programming, Applied to Makespan Minimization on Uniformly Related Machines
Published 15-05-2023“…Mixed-integer linear programming (MILP) is at the core of many advanced algorithms for solving fundamental problems in combinatorial optimization. The…”
Get full text
Journal Article -
15
Collaborative VR: Conveying a Complex Disease and Its Treatment
Published in 2023 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW) (01-03-2023)“…In medical research, there are constantly new findings that lead to new insights and novel treatments. Hence, physicians always need to stay up-to-date to…”
Get full text
Conference Proceeding -
16
Practical Access to Dynamic Programming on Tree Decompositions
Published 26-06-2018“…Parameterized complexity theory has lead to a wide range of algorithmic breakthroughs within the last decades, but the practicability of these methods for…”
Get full text
Journal Article -
17
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits
Published 13-02-2023“…The adoption of machine learning solutions is rapidly increasing across all parts of society. As the models grow larger, both training and inference of machine…”
Get full text
Journal Article -
18
Neural stem cell culture model for LRRK2 function determines regulation of dopaminergic and microtubule-associated genes
Published in Basal ganglia (01-11-2015)“…Leucine-rich repeat kinase 2 (Lrrk2) is a Parkinson’s disease (PD)-related protein involved in sporadic and familial cases of the disease. Lrrk2 is a kinase…”
Get full text
Journal Article -
19
On the Gold Standard for Security of Universal Steganography
Published 24-01-2018“…While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about…”
Get full text
Journal Article -
20
Algorithm Substitution Attacks from a Steganographic Perspective
Published 21-08-2017“…The goal of an algorithm substitution attack (ASA), also called a subversion attack (SA), is to replace an honest implementation of a cryptographic tool by a…”
Get full text
Journal Article