Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




5784 Publications

2015 | Published | Conference Paper | IST-REx-ID: 1675 | OA
Dziembowski, Stefan, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Z Pietrzak. “Proofs of Space.” In 35th Annual Cryptology Conference, 9216:585–605. Springer, 2015. https://doi.org/10.1007/978-3-662-48000-7_29.
[Preprint] View | Files available | DOI | Download Preprint (ext.)
 
2015 | Published | Conference Paper | IST-REx-ID: 1646 | OA
Banerjee, Abishek, Georg Fuchsbauer, Chris Peikert, Krzysztof Z Pietrzak, and Sophie Stevens. “Key-Homomorphic Constrained Pseudorandom Functions.” In 12th Theory of Cryptography Conference, 9015:31–60. Springer Nature, 2015. https://doi.org/10.1007/978-3-662-46497-7_2.
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 
2015 | Published | Conference Paper | IST-REx-ID: 1654 | OA
Gazi, Peter, Krzysztof Z Pietrzak, and Stefano Tessaro. “Generic Security of NMAC and HMAC with Input Whitening.” Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-662-48800-3_4.
[Submitted Version] View | Files available | DOI
 
2015 | Published | Conference Paper | IST-REx-ID: 1648 | OA
Fuchsbauer, Georg, Zahra Jafargholi, and Krzysztof Z Pietrzak. “A Quasipolynomial Reduction for Generalized Selective Decryption on Trees,” 9215:601–20. Springer, 2015. https://doi.org/10.1007/978-3-662-47989-6_29.
[Submitted Version] View | Files available | DOI
 
2015 | Published | Conference Paper | IST-REx-ID: 1650 | OA
Skórski, Maciej, Alexander Golovnev, and Krzysztof Z Pietrzak. “Condensed Unpredictability ,” 9134:1046–57. Springer, 2015. https://doi.org/10.1007/978-3-662-47672-7_85.
[Published Version] View | Files available | DOI
 
2015 | Published | Conference Paper | IST-REx-ID: 1649 | OA
Benhamouda, Fabrice, Stephan Krenn, Vadim Lyubashevsky, and Krzysztof Z Pietrzak. “Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings.” Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-319-24174-6_16.
[Published Version] View | Files available | DOI
 
2015 | Published | Conference Paper | IST-REx-ID: 1652 | OA
Alwen, Joel F, and Vladimir Serbinenko. “High Parallel Complexity Graphs and Memory-Hard Functions.” In Proceedings of the 47th Annual ACM Symposium on Theory of Computing, 595–603. ACM, 2015. https://doi.org/10.1145/2746539.2746622.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2015 | Published | Conference Paper | IST-REx-ID: 1651 | OA
Baldimtsi, Foteini, Melissa Chase, Georg Fuchsbauer, and Markulf Kohlweiss. “Anonymous Transferable E-Cash.” In Public-Key Cryptography - PKC 2015, 9020:101–24. Springer, 2015. https://doi.org/10.1007/978-3-662-46447-2_5.
[Published Version] View | DOI | Download Published Version (ext.)
 
2015 | Published | Conference Paper | IST-REx-ID: 1644 | OA
Demay, Grégory, Peter Gazi, Ueli Maurer, and Björn Tackmann. “Query-Complexity Amplification for Random Oracles,” 9063:159–80. Springer, 2015. https://doi.org/10.1007/978-3-319-17470-9_10.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2015 | Published | Conference Paper | IST-REx-ID: 1672 | OA
Alwen, Joel F, Rafail Ostrovsky, Hongsheng Zhou, and Vassilis Zikas. “Incoercible Multi-Party Computation and Universally Composable Receipt-Free Voting.” In Advances in Cryptology - CRYPTO 2015, 9216:763–80. Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-662-48000-7_37.
[Submitted Version] View | Files available | DOI
 
2015 | Published | Conference Paper | IST-REx-ID: 1671 | OA
Gazi, Peter, Krzysztof Z Pietrzak, and Stefano Tessaro. “The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC,” 9215:368–87. Springer, 2015. https://doi.org/10.1007/978-3-662-47989-6_18.
[Submitted Version] View | Files available | DOI
 
2015 | Published | Conference Paper | IST-REx-ID: 1669 | OA
Pietrzak, Krzysztof Z, and Maciej Skórski. “The Chain Rule for HILL Pseudoentropy, Revisited.” Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-319-22174-8_5.
[Submitted Version] View | Files available | DOI
 
2015 | Published | Conference Paper | IST-REx-ID: 1668 | OA
Gazi, Peter, Jooyoung Lee, Yannick Seurin, John Steinberger, and Stefano Tessaro. “Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes.” Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-662-48116-5_16.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2015 | Published | Conference Paper | IST-REx-ID: 1474 | OA
Ferrara, Anna, Georg Fuchsbauer, Bin Liu, and Bogdan Warinschi. “Policy Privacy in Cryptographic Access Control,” 46–60. IEEE, 2015. https://doi.org/10.1109/CSF.2015.11.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2015 | Published | Conference Paper | IST-REx-ID: 1732 | OA
Chatterjee, Krishnendu, Martin Chmelik, Raghav Gupta, and Ayush Kanodia. “Qualitative Analysis of POMDPs with Temporal Logic Specifications for Robotics Applications,” 325–30. IEEE, 2015. https://doi.org/10.1109/ICRA.2015.7139019.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 
2015 | Published | Journal Article | IST-REx-ID: 1598 | OA
Chatterjee, Krishnendu, Manas Joglekar, and Nisarg Shah. “Average Case Analysis of the Classical Algorithm for Markov Decision Processes with Büchi Objectives.” Theoretical Computer Science. Elsevier, 2015. https://doi.org/10.1016/j.tcs.2015.01.050.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 
2015 | Published | Conference Paper | IST-REx-ID: 1498 | OA
Dragoi, Cezara, Thomas A Henzinger, and Damien Zufferey. “The Need for Language Support for Fault-Tolerant Distributed Systems.” Leibniz International Proceedings in Informatics. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2015. https://doi.org/10.4230/LIPIcs.SNAPL.2015.90.
[Published Version] View | Files available | DOI
 
2015 | Published | Journal Article | IST-REx-ID: 1823 | OA
Chevereau, Guillaume, and Mark Tobias Bollenbach. “Systematic Discovery of Drug Interaction Mechanisms.” Molecular Systems Biology. Nature Publishing Group, 2015. https://doi.org/10.15252/msb.20156098.
[Published Version] View | Files available | DOI
 
2015 | Published | Journal Article | IST-REx-ID: 1810 | OA
Bollenbach, Mark Tobias. “Antimicrobial Interactions: Mechanisms and Implications for Drug Discovery and Resistance Evolution.” Current Opinion in Microbiology. Elsevier, 2015. https://doi.org/10.1016/j.mib.2015.05.008.
[Published Version] View | Files available | DOI
 
2015 | Research Data Reference | IST-REx-ID: 9765
Chevereau, Guillaume, Marta Lukacisinova, Tugce Batur, Aysegul Guvenek, Dilay Hazal Ayhan, Erdal Toprak, and Mark Tobias Bollenbach. “Gene Ontology Enrichment Analysis for the Most Sensitive Gene Deletion Strains for All Drugs.” Public Library of Science, 2015. https://doi.org/10.1371/journal.pbio.1002299.s008.
[Published Version] View | Files available | DOI
 

Filters and Search Terms

type<>software

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed