Author of the publication

A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers.

, , and . CoRR, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Dr. -Ing. Daniel Markthaler University of Stuttgart

Replication Data for: Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis, and . Dataset, (2024)Related to: Schneider, Andreas; Lystbæk, Thomas B.; Markthaler, Daniel; Hansen, Niels; Hauer, Bernhard (2024): Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis. In: Nature Communications, 15, 4925. doi: 10.1038/s41467-024-48993-9.

Daniel Klötzl University of Stuttgart

NMF-Based Analysis of Mobile Eye-Tracking Data, , , , , , and . Proceedings of the 2024 Symposium on Eye Tracking Research and Applications, page 1–9. New York, NY, USA, Association for Computing Machinery, (Jun 4, 2024)
NMF-Based Analysis of Mobile Eye-Tracking Data, , , , , , and . Proceedings of the 2024 Symposium on Eye Tracking Research and Applications, page 1–9. New York, NY, USA, Association for Computing Machinery, (Jun 4, 2024)Constrained Dynamic Mode Decomposition, , , and . IEEE Transactions on Visualization and Computer Graphics, (2022)
 

Other publications of authors with the same name

Studying the locator polynomials of minimum weight codewords of BCH codes., , and . IEEE Trans. Information Theory, 38 (3): 960-973 (1992)An Interpolation Procedure for List Decoding Reed--Solomon codes Based on Generalized Key Equations, , and . CoRR, (2011)A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem., and . EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, page 229-240. Springer, (2003)DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System., , and . ESORICS, volume 1485 of Lecture Notes in Computer Science, page 241-255. Springer, (1998)Editorial: Special issue on coding and cryptography., , , , and . Des. Codes Cryptogr., 87 (2-3): 183-184 (2019)Foreword., , and . J. Symb. Comput., 44 (12): 1605-1607 (2009)A Hensel lifting to replace factorization in list-decoding of algebraic-geometric and Reed-Solomon codes., and . IEEE Trans. Information Theory, 46 (7): 2605-2614 (2000)Generalized Gabidulin codes over fields of any characteristic., , and . Des. Codes Cryptogr., 86 (8): 1807-1848 (2018)A Family of Fast Syndrome Based Cryptographic Hash Functions., , and . Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 64-83. Springer, (2005)Practical Solutions to Save Bitcoins Applied to an Identity System Proposal., , and . ICISSP, page 511-518. SciTePress, (2019)