Florian Böhl

Learn More
RNA localization is a widespread mechanism to achieve localized protein synthesis. In budding yeast, localization of ASH1 mRNA controls daughter cell-specific accumulation of the transcriptional regulator Ash1p, which determines mating type switching. ASH1 mRNA localization depends on four independently acting sequences ('zipcodes') within the mRNA. In(More)
Class V myosins are motor proteins with functions in vesicle transport, organelle segregation, and RNA localization. Although they have been extensively studied, only little is known about the regulation of their spatial distribution. Here we demonstrate that a GFP fusion protein of the budding yeast class V myosin Myo4p accumulates at the bud cortex and is(More)
Cytoplasmic sorting of mRNAs by microtubule-based transport is widespread, yet very little is known at the molecular level about how specific transcripts are linked to motor complexes. In Drosophila, minus-end-directed transport of developmentally important transcripts by the dynein motor is mediated by seemingly divergent mRNA elements. Here we provide(More)
By complementation of a salt-sensitive mutant of Saccharomyces cerevisiae, we cloned the SOP1 gene, encoding a 114.5-kDa protein of 1033 amino acids. Cells deleted for SOP1 exhibited sensitivity to sodium stress, but showed no sensitivity to general osmotic stress. Following exposure of sop1Delta cells to NaCl stress, the intracellular Na+ level and the(More)
Assume that an adversary observes many ciphertexts, and may then ask for openings, i.e. the plaintext and the randomness used for encryption, of some of them. Do the unopened ciphertexts remain secure? There are several ways to formalize this question, and the ensuing security notions are not known to be implied by standard notions of encryption security.(More)
We put forward a new technique to construct very efficient and compact signature schemes. Our technique combines several instances of only a mildly secure signature scheme to obtain a fully secure scheme. Since the mild security notion we require is much easier to achieve than full security, we can combine our strategy with existing techniques to obtain a(More)
We put forward new techniques for designing signature schemes. As a result, we present practical signature schemes based on the CDH, the RSA, and the SIS assumptions. Our schemes compare favorably with existing schemes based on these assumptions. Our core idea is the use of tag-based signatures. Concretely, each signatures contains a tag which is uniformly(More)
BACKGROUND Viral load quantification is established in the clinical management of chronic Hepatitis B virus (HBV) infection for assessing efficacies and resistance developments in anti-viral drug treatment. OBJECTIVES The fully automated COBAS AmpliPrep/COBAS TaqMan HBV Test, v2.0 was evaluated for the linear measuring range and the inclusivity of HBV(More)
We introduce a variant of the Universal Composability framework (UC; Canetti, FOCS 2001) that uses symbolic cryptography. Two salient properties of the UC framework are secure composition and the possibility of easily defining security by giving an ideal functionality as specification. These advantages are now also available in a symbolic modeling of(More)
Most computational soundness theorems deal with a limited number of primitives, thereby limiting their applicability. The notion of deduction soundness of Cortier and Warinschi (CCS'11) aims to facilitate soundness theorems for richer frameworks via composition results: deduction soundness can be extended, generically, with asymmetric encryption and public(More)