Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

174 Publications


2025 | Published | Conference Paper | IST-REx-ID: 19445 | OA
Křišťan JM, Svoboda J. Reconfiguration using generalized token jumping. In: 19th International Conference and Workshops on Algorithms and Computation. Vol 15411. Springer Nature; 2025:244-265. doi:10.1007/978-981-96-2845-2_16
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2025 | Published | Conference Paper | IST-REx-ID: 19375 | OA
Azeem M, Chakraborty D, Kanav S, et al. 1–2–3–Go! Policy synthesis for parameterized Markov decision processes via decision-tree learning and generalization. In: 26th International Conference on Verification, Model Checking, and Abstract Interpretation. Vol 15530. Springer Nature; 2025:97-120. doi:10.1007/978-3-031-82703-7_5
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2025 | Published | Conference Paper | IST-REx-ID: 19712 | OA
Cueto Noval M, Merz S-P, Stählin P, Ünal A. On the soundness of algebraic attacks against code-based assumptions. In: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Vol 15606. Springer Nature; 2025:385-415. doi:10.1007/978-3-031-91095-1_14
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2025 | Published | Conference Paper | IST-REx-ID: 19740 | OA
Chatterjee K, Jafariraviz M, Saona Urmeneta RJ, Svoboda J. Value iteration with guessing for Markov chains and Markov decision processes. In: 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Vol 15697. Springer Nature; 2025:217-236. doi:10.1007/978-3-031-90653-4_11
[Published Version] View | Files available | DOI | arXiv
 

2025 | Published | Conference Paper | IST-REx-ID: 19739 | OA
Chalupa M, Richter C. BUBAAK: Dynamic cooperative verification. In: 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Vol 15698. Springer Nature; 2025:212-216. doi:10.1007/978-3-031-90660-2_14
[Published Version] View | Files available | DOI
 

2025 | Conference Paper | IST-REx-ID: 19738 | OA
Acharya A, Azari K, Baig MA, Hofheinz D, Kamath C. Securely instantiating ‘Half Gates’ garbling in the standard model. In: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography. Vol 15677. Springer Nature; 2025:37-75. doi:10.1007/978-3-031-91829-2_2
[Preprint] View | DOI | Download Preprint (ext.)
 

2025 | Published | Conference Paper | IST-REx-ID: 19743 | OA
Chatterjee K, Quatmann T, Schäffeler M, Weininger M, Winkler T, Zilken D. Fixed point certificates for reachability and expected rewards in MDPs. In: 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Vol 15697. Springer Nature; 2025:130-151. doi:10.1007/978-3-031-90653-4_7
[Published Version] View | Files available | DOI | arXiv
 

2025 | Published | Conference Paper | IST-REx-ID: 19742 | OA
Budde CE, Hartmanns A, Meggendorfer T, Weininger M, Wienhöft P. Sound statistical model checking for probabilities and expected rewards. In: 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Vol 15696. Springer Nature; 2025:167-190. doi:10.1007/978-3-031-90643-5_9
[Published Version] View | Files available | DOI | arXiv
 

2025 | Published | Conference Paper | IST-REx-ID: 19744 | OA
Chatterjee K, Goharshady E, Novotný P, Zikelic D. Refuting equivalence in probabilistic programs with conditioning. In: 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Vol 15697. Springer Nature; 2025:279-300. doi:10.1007/978-3-031-90653-4_14
[Published Version] View | Files available | DOI | arXiv
 

2025 | Published | Conference Paper | IST-REx-ID: 19778 | OA
Hoffmann C, Pietrzak KZ. Watermarkable and zero-knowledge Verifiable Delay Functions from any proof of exponentiation. In: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography. Vol 15674. Springer Nature; 2025:36-66. doi:10.1007/978-3-031-91820-9_2
[Preprint] View | DOI | Download Preprint (ext.)
 

2025 | Published | Conference Paper | IST-REx-ID: 19600
Avarikioti Z, Bastankhah M, Maddah-Ali MA, Pietrzak KZ, Svoboda J, Yeo MX. Route discovery in private payment channel networks. In: Computer Security. ESORICS 2024 International Workshops. Vol 15263. Springer Nature; 2025:207-223. doi:10.1007/978-3-031-82349-7_15
View | DOI
 

2025 | Published | Conference Paper | IST-REx-ID: 19741 | OA
Chalupa M, Henzinger TA, Mazzocchi NA, Sarac NE. Automating the analysis of quantitative automata with QuAK. In: 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Vol 15696. Springer Nature; 2025:303-312. doi:10.1007/978-3-031-90643-5_16
[Published Version] View | Files available | DOI | arXiv
 

2024 | Published | Conference Paper | IST-REx-ID: 14888 | OA
De Nooijer P, Terziadis S, Weinberger A, et al. Removing popular faces in curve arrangements. In: 31st International Symposium on Graph Drawing and Network Visualization. Vol 14466. Springer Nature; 2024:18-33. doi:10.1007/978-3-031-49275-4_2
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2024 | Published | Conference Paper | IST-REx-ID: 18206
Rave G, Fordham DE, Bronstein AM, Silver DH. Enhancing predictive accuracy in embryo implantation: The Bonna algorithm and its clinical implications. In: First International Conference on Artificial Intelligence in Healthcare. Vol 14976. Springer Nature; 2024:160-171. doi:10.1007/978-3-031-67285-9_12
View | DOI
 

2024 | Published | Conference Paper | IST-REx-ID: 18702 | OA
Anastos M, Auerbach B, Baig MA, et al. The cost of maintaining keys in dynamic groups with applications to multicast encryption and group messaging. In: 22nd International Conference on Theory of Cryptography. Vol 15364. Springer Nature; 2024:413-443. doi:10.1007/978-3-031-78011-0_14
[Preprint] View | DOI | Download Preprint (ext.)
 

2024 | Published | Conference Paper | IST-REx-ID: 18755 | OA
Ebrahimi E, Yadav A. Strongly secure universal thresholdizer. In: 30th International Conference on the Theory and Application of Cryptology and Information Security. Vol 15486. Springer Nature; 2024:207-239. doi:10.1007/978-981-96-0891-1_7
[Preprint] View | DOI | Download Preprint (ext.)
 

2024 | Published | Conference Paper | IST-REx-ID: 18756 | OA
Brzuska C, Ünal A, Woo IKY. Evasive LWE assumptions: Definitions, classes, and counterexamples. In: 30th International Conference on the Theory and Application of Cryptology and Information Security. Vol 15487. Springer Nature; 2024:418-449. doi:10.1007/978-981-96-0894-2_14
[Preprint] View | DOI | Download Preprint (ext.)
 

2024 | Published | Conference Paper | IST-REx-ID: 18521 | OA
Bonakdarpour B, Momtaz A, Nickovic D, Sarac NE. Approximate distributed monitoring under partial synchrony: Balancing speed & accuracy. In: 24th International Conference on Runtime Verification. Vol 15191. Springer Nature; 2024:282-301. doi:10.1007/978-3-031-74234-7_18
[Published Version] View | Files available | DOI | arXiv
 

2024 | Published | Conference Paper | IST-REx-ID: 17413 | OA
Froleyks N, Yu E, Biere A, Heljanko K. Certifying phase abstraction. In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol 14739. Springer Nature; 2024:284-303. doi:10.1007/978-3-031-63498-7_17
[Published Version] View | Files available | DOI | arXiv
 

2024 | Published | Conference Paper | IST-REx-ID: 15376 | OA
Avni G, Mallik K, Sadhukhan S. Auction-based scheduling. In: 30th International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Vol 14572. Springer Nature; 2024:153-172. doi:10.1007/978-3-031-57256-2_8
[Published Version] View | Files available | DOI | arXiv
 

Filters and Search Terms

eissn=1611-3349

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed