Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
5784 Publications
2015 | Published | Conference Paper | IST-REx-ID: 1675 |

Dziembowski S, Faust S, Kolmogorov V, Pietrzak KZ. 2015. Proofs of space. 35th Annual Cryptology Conference. CRYPTO: International Cryptology Conference, LNCS, vol. 9216, 585–605.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
2015 | Published | Conference Paper | IST-REx-ID: 1646 |

Banerjee A, Fuchsbauer G, Peikert C, Pietrzak KZ, Stevens S. 2015. Key-homomorphic constrained pseudorandom functions. 12th Theory of Cryptography Conference. TCC: Theory of Cryptography Conference, LNCS, vol. 9015, 31–60.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
2015 | Published | Conference Paper | IST-REx-ID: 1654 |

Gazi P, Pietrzak KZ, Tessaro S. 2015. Generic security of NMAC and HMAC with input whitening. 9453, 85–109.
[Submitted Version]
View
| Files available
| DOI
2015 | Published | Conference Paper | IST-REx-ID: 1648 |

Fuchsbauer G, Jafargholi Z, Pietrzak KZ. 2015. A quasipolynomial reduction for generalized selective decryption on trees. CRYPTO: International Cryptology Conference, LNCS, vol. 9215, 601–620.
[Submitted Version]
View
| Files available
| DOI
2015 | Published | Conference Paper | IST-REx-ID: 1650 |

Skórski M, Golovnev A, Pietrzak KZ. 2015. Condensed unpredictability . ICALP: Automata, Languages and Programming, LNCS, vol. 9134, 1046–1057.
[Published Version]
View
| Files available
| DOI
2015 | Published | Conference Paper | IST-REx-ID: 1649 |

Benhamouda F, Krenn S, Lyubashevsky V, Pietrzak KZ. 2015. Efficient zero-knowledge proofs for commitments from learning with errors over rings. 9326, 305–325.
[Published Version]
View
| Files available
| DOI
2015 | Published | Conference Paper | IST-REx-ID: 1652 |

Alwen JF, Serbinenko V. 2015. High parallel complexity graphs and memory-hard functions. Proceedings of the 47th annual ACM symposium on Theory of computing. STOC: Symposium on the Theory of Computing, 595–603.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2015 | Published | Conference Paper | IST-REx-ID: 1651 |

Baldimtsi F, Chase M, Fuchsbauer G, Kohlweiss M. 2015. Anonymous transferable e-cash. Public-Key Cryptography - PKC 2015. PKC: Public Key Crypography, LNCS, vol. 9020, 101–124.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2015 | Published | Conference Paper | IST-REx-ID: 1644 |

Demay G, Gazi P, Maurer U, Tackmann B. 2015. Query-complexity amplification for random oracles. ICITS: International Conference on Information Theoretic Security, LNCS, vol. 9063, 159–180.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2015 | Published | Conference Paper | IST-REx-ID: 1672 |

Alwen JF, Ostrovsky R, Zhou H, Zikas V. 2015. Incoercible multi-party computation and universally composable receipt-free voting. Advances in Cryptology - CRYPTO 2015. CRYPTO: International Cryptology ConferenceLecture Notes in Computer Science, LNCS, vol. 9216, 763–780.
[Submitted Version]
View
| Files available
| DOI
2015 | Published | Conference Paper | IST-REx-ID: 1671 |

Gazi P, Pietrzak KZ, Tessaro S. 2015. The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC. CRYPTO: International Cryptology Conference, LNCS, vol. 9215, 368–387.
[Submitted Version]
View
| Files available
| DOI
2015 | Published | Conference Paper | IST-REx-ID: 1669 |

Pietrzak KZ, Skórski M. 2015. The chain rule for HILL pseudoentropy, revisited. 9230, 81–98.
[Submitted Version]
View
| Files available
| DOI
2015 | Published | Conference Paper | IST-REx-ID: 1668 |

Gazi P, Lee J, Seurin Y, Steinberger J, Tessaro S. 2015. Relaxing full-codebook security: A refined analysis of key-length extension schemes. 9054, 319–341.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2015 | Published | Conference Paper | IST-REx-ID: 1474 |

Ferrara A, Fuchsbauer G, Liu B, Warinschi B. 2015. Policy privacy in cryptographic access control. CSF: Computer Security Foundations, 46–60.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2015 | Published | Conference Paper | IST-REx-ID: 1732 |

Chatterjee K, Chmelik M, Gupta R, Kanodia A. 2015. Qualitative analysis of POMDPs with temporal logic specifications for robotics applications. ICRA: International Conference on Robotics and Automation, 325–330.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
2015 | Published | Journal Article | IST-REx-ID: 1598 |

Chatterjee K, Joglekar M, Shah N. 2015. Average case analysis of the classical algorithm for Markov decision processes with Büchi objectives. Theoretical Computer Science. 573(3), 71–89.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
2015 | Published | Conference Paper | IST-REx-ID: 1498 |

Dragoi C, Henzinger TA, Zufferey D. 2015. The need for language support for fault-tolerant distributed systems. 32, 90–102.
[Published Version]
View
| Files available
| DOI
2015 | Published | Journal Article | IST-REx-ID: 1823 |

Chevereau G, Bollenbach MT. 2015. Systematic discovery of drug interaction mechanisms. Molecular Systems Biology. 11(4), 807.
[Published Version]
View
| Files available
| DOI
2015 | Published | Journal Article | IST-REx-ID: 1810 |

Bollenbach MT. 2015. Antimicrobial interactions: Mechanisms and implications for drug discovery and resistance evolution. Current Opinion in Microbiology. 27, 1–9.
[Published Version]
View
| Files available
| DOI
2015 | Research Data Reference | IST-REx-ID: 9765
Chevereau G, Lukacisinova M, Batur T, Guvenek A, Ayhan DH, Toprak E, Bollenbach MT. 2015. Gene ontology enrichment analysis for the most sensitive gene deletion strains for all drugs, Public Library of Science, 10.1371/journal.pbio.1002299.s008.
[Published Version]
View
| Files available
| DOI