Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Dr. -Ing. Daniel Markthaler University of Stuttgart

Replication Data for: Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis, and . Dataset, (2024)Related to: Schneider, Andreas; Lystbæk, Thomas B.; Markthaler, Daniel; Hansen, Niels; Hauer, Bernhard (2024): Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis. In: Nature Communications, 15, 4925. doi: 10.1038/s41467-024-48993-9.

Daniel Klötzl University of Stuttgart

NMF-Based Analysis of Mobile Eye-Tracking Data, , , , , , and . Proceedings of the 2024 Symposium on Eye Tracking Research and Applications, page 1–9. New York, NY, USA, Association for Computing Machinery, (Jun 4, 2024)
NMF-Based Analysis of Mobile Eye-Tracking Data, , , , , , and . Proceedings of the 2024 Symposium on Eye Tracking Research and Applications, page 1–9. New York, NY, USA, Association for Computing Machinery, (Jun 4, 2024)Constrained Dynamic Mode Decomposition, , , and . IEEE Transactions on Visualization and Computer Graphics, (2022)
 

Other publications of authors with the same name

Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications., , and . EuroS&P, page 292-302. IEEE, (2016)Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version)., , , , , and . IACR Cryptology ePrint Archive, (2016)Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing., , and . IACR Cryptology ePrint Archive, (2015)Secure Application Continuity in Intermittent Systems., , , and . IGSC, page 1-8. IEEE, (2018)Optimal First-Order Boolean Masking for Embedded IoT Devices., , , and . CARDIS, volume 10728 of Lecture Notes in Computer Science, page 22-41. Springer, (2017)Design Strategies for ARX with Provable Bounds: Sparx and LAX., , , , , and . ASIACRYPT (1), volume 10031 of Lecture Notes in Computer Science, page 484-513. (2016)Triathlon of lightweight block ciphers for the Internet of things., , , , , and . J. Cryptographic Engineering, 9 (3): 283-302 (2019)SIA: Secure Intermittent Architecture for Off-the-Shelf Resource-Constrained Microcontrollers., , and . HOST, page 208-217. IEEE, (2019)Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors., , and . IACR Cryptology ePrint Archive, (2017)Triathlon of Lightweight Block Ciphers for the Internet of Things., , , , , and . IACR Cryptology ePrint Archive, (2015)