Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

174 Publications


2025 | Published | Conference Paper | IST-REx-ID: 19445 | OA
J. M. Křišťan and J. Svoboda, “Reconfiguration using generalized token jumping,” in 19th International Conference and Workshops on Algorithms and Computation, Chengdu, China, 2025, vol. 15411, pp. 244–265.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2025 | Published | Conference Paper | IST-REx-ID: 19375 | OA
M. Azeem et al., “1–2–3–Go! Policy synthesis for parameterized Markov decision processes via decision-tree learning and generalization,” in 26th International Conference on Verification, Model Checking, and Abstract Interpretation, Denver, CO, United States, 2025, vol. 15530, pp. 97–120.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2025 | Published | Conference Paper | IST-REx-ID: 19712 | OA
M. Cueto Noval, S.-P. Merz, P. Stählin, and A. Ünal, “On the soundness of algebraic attacks against code-based assumptions,” in 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, 2025, vol. 15606, pp. 385–415.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2025 | Published | Conference Paper | IST-REx-ID: 19740 | OA
K. Chatterjee, M. Jafariraviz, R. J. Saona Urmeneta, and J. Svoboda, “Value iteration with guessing for Markov chains and Markov decision processes,” in 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Hamilton, ON, Canada, 2025, vol. 15697, pp. 217–236.
[Published Version] View | Files available | DOI | arXiv
 

2025 | Published | Conference Paper | IST-REx-ID: 19739 | OA
M. Chalupa and C. Richter, “BUBAAK: Dynamic cooperative verification,” in 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Hamilton, ON, Canada, 2025, vol. 15698, pp. 212–216.
[Published Version] View | Files available | DOI
 

2025 | Conference Paper | IST-REx-ID: 19738 | OA
A. Acharya, K. Azari, M. A. Baig, D. Hofheinz, and C. Kamath, “Securely instantiating ‘Half Gates’ garbling in the standard model,” in 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Roros, Norway, 2025, vol. 15677, pp. 37–75.
[Preprint] View | DOI | Download Preprint (ext.)
 

2025 | Published | Conference Paper | IST-REx-ID: 19743 | OA
K. Chatterjee, T. Quatmann, M. Schäffeler, M. Weininger, T. Winkler, and D. Zilken, “Fixed point certificates for reachability and expected rewards in MDPs,” in 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Hamilton, ON, Canada, 2025, vol. 15697, pp. 130–151.
[Published Version] View | Files available | DOI | arXiv
 

2025 | Published | Conference Paper | IST-REx-ID: 19742 | OA
C. E. Budde, A. Hartmanns, T. Meggendorfer, M. Weininger, and P. Wienhöft, “Sound statistical model checking for probabilities and expected rewards,” in 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Hamilton, ON, Canada, 2025, vol. 15696, pp. 167–190.
[Published Version] View | Files available | DOI | arXiv
 

2025 | Published | Conference Paper | IST-REx-ID: 19744 | OA
K. Chatterjee, E. Goharshady, P. Novotný, and D. Zikelic, “Refuting equivalence in probabilistic programs with conditioning,” in 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Hamilton, ON, Canada, 2025, vol. 15697, pp. 279–300.
[Published Version] View | Files available | DOI | arXiv
 

2025 | Published | Conference Paper | IST-REx-ID: 19778 | OA
C. Hoffmann and K. Z. Pietrzak, “Watermarkable and zero-knowledge Verifiable Delay Functions from any proof of exponentiation,” in 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Roros, Norway, 2025, vol. 15674, pp. 36–66.
[Preprint] View | DOI | Download Preprint (ext.)
 

2025 | Published | Conference Paper | IST-REx-ID: 19600
Z. Avarikioti, M. Bastankhah, M. A. Maddah-Ali, K. Z. Pietrzak, J. Svoboda, and M. X. Yeo, “Route discovery in private payment channel networks,” in Computer Security. ESORICS 2024 International Workshops, Bydgoszcz, Poland, 2025, vol. 15263, pp. 207–223.
View | DOI
 

2025 | Published | Conference Paper | IST-REx-ID: 19741 | OA
M. Chalupa, T. A. Henzinger, N. A. Mazzocchi, and N. E. Sarac, “Automating the analysis of quantitative automata with QuAK,” in 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, 2025, vol. 15696, pp. 303–312.
[Published Version] View | Files available | DOI | arXiv
 

2024 | Published | Conference Paper | IST-REx-ID: 14888 | OA
P. De Nooijer et al., “Removing popular faces in curve arrangements,” in 31st International Symposium on Graph Drawing and Network Visualization, Isola delle Femmine, Palermo, Italy, 2024, vol. 14466, pp. 18–33.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2024 | Published | Conference Paper | IST-REx-ID: 18206
G. Rave, D. E. Fordham, A. M. Bronstein, and D. H. Silver, “Enhancing predictive accuracy in embryo implantation: The Bonna algorithm and its clinical implications,” in First International Conference on Artificial Intelligence in Healthcare, Swansea, United Kingdom, 2024, vol. 14976, pp. 160–171.
View | DOI
 

2024 | Published | Conference Paper | IST-REx-ID: 18702 | OA
M. Anastos et al., “The cost of maintaining keys in dynamic groups with applications to multicast encryption and group messaging,” in 22nd International Conference on Theory of Cryptography, Milan, Italy, 2024, vol. 15364, pp. 413–443.
[Preprint] View | DOI | Download Preprint (ext.)
 

2024 | Published | Conference Paper | IST-REx-ID: 18755 | OA
E. Ebrahimi and A. Yadav, “Strongly secure universal thresholdizer,” in 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, 2024, vol. 15486, pp. 207–239.
[Preprint] View | DOI | Download Preprint (ext.)
 

2024 | Published | Conference Paper | IST-REx-ID: 18756 | OA
C. Brzuska, A. Ünal, and I. K. Y. Woo, “Evasive LWE assumptions: Definitions, classes, and counterexamples,” in 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, 2024, vol. 15487, pp. 418–449.
[Preprint] View | DOI | Download Preprint (ext.)
 

2024 | Published | Conference Paper | IST-REx-ID: 18521 | OA
B. Bonakdarpour, A. Momtaz, D. Nickovic, and N. E. Sarac, “Approximate distributed monitoring under partial synchrony: Balancing speed & accuracy,” in 24th International Conference on Runtime Verification, Istanbul, Turkey, 2024, vol. 15191, pp. 282–301.
[Published Version] View | Files available | DOI | arXiv
 

2024 | Published | Conference Paper | IST-REx-ID: 17413 | OA
N. Froleyks, E. Yu, A. Biere, and K. Heljanko, “Certifying phase abstraction,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Nancy, France, 2024, vol. 14739, pp. 284–303.
[Published Version] View | Files available | DOI | arXiv
 

2024 | Published | Conference Paper | IST-REx-ID: 15376 | OA
G. Avni, K. Mallik, and S. Sadhukhan, “Auction-based scheduling,” in 30th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Luxembourg City, Luxembourg, 2024, vol. 14572, pp. 153–172.
[Published Version] View | Files available | DOI | arXiv
 

Filters and Search Terms

eissn=1611-3349

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed