Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
18 Publications
2021 | Conference Paper | IST-REx-ID: 9825 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Laarhoven, T., & Walter, M. (2021). Dual lattice attacks for closest vector problems (with preprocessing). In Topics in Cryptology – CT-RSA 2021 (Vol. 12704, pp. 478–502). Virtual Event: Springer Nature. https://doi.org/10.1007/978-3-030-75539-3_20
[Preprint]
View
| DOI
| Download Preprint (ext.)
2021 | Conference Paper | IST-REx-ID: 9823 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Alistarh, D.-A., Ellen, F., & Rybicki, J. (2021). Wait-free approximate agreement on graphs. In Structural Information and Communication Complexity (Vol. 12810, pp. 87–105). Wrocław, Poland: Springer Nature. https://doi.org/10.1007/978-3-030-79527-6_6
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2021 | Conference Paper | IST-REx-ID: 9824
Čomić, L., Zrour, R., Largeteau-Skapin, G., Biswas, R., & Andres, E. (2021). Body centered cubic grid - coordinate system and discrete analytical plane definition. In Discrete Geometry and Mathematical Morphology (Vol. 12708, pp. 152–163). Uppsala, Sweden: Springer Nature. https://doi.org/10.1007/978-3-030-76657-3_10
View
| DOI
2020 | Conference Paper | IST-REx-ID: 8322 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Chakraborty, S., Dziembowski, S., & Nielsen, J. B. (2020). Reverse firewalls for actively secure MPCs. In Advances in Cryptology – CRYPTO 2020 (Vol. 12171, pp. 732–762). Santa Barbara, CA, United States: Springer Nature. https://doi.org/10.1007/978-3-030-56880-1_26
[Preprint]
View
| DOI
| Download Preprint (ext.)
2020 | Conference Paper | IST-REx-ID: 8339 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Genise, N., Micciancio, D., Peikert, C., & Walter, M. (2020). Improved discrete Gaussian and subgaussian analysis for lattice cryptography. In 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography (Vol. 12110, pp. 623–651). Edinburgh, United Kingdom: Springer Nature. https://doi.org/10.1007/978-3-030-45374-9_21
[Preprint]
View
| DOI
| Download Preprint (ext.)
2020 | Conference Paper | IST-REx-ID: 7808 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Giacobbe, M., Henzinger, T. A., & Lechner, M. (2020). How many bits does it take to quantize your neural network? In International Conference on Tools and Algorithms for the Construction and Analysis of Systems (Vol. 12079, pp. 79–97). Dublin, Ireland: Springer Nature. https://doi.org/10.1007/978-3-030-45237-7_5
[Published Version]
View
| Files available
| DOI
2020 | Conference Paper | IST-REx-ID: 8194 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Baranowski, M., He, S., Lechner, M., Nguyen, T. S., & Rakamarić, Z. (2020). An SMT theory of fixed-point arithmetic. In Automated Reasoning (Vol. 12166, pp. 13–31). Paris, France: Springer Nature. https://doi.org/10.1007/978-3-030-51074-9_2
[Published Version]
View
| DOI
| Download Published Version (ext.)
| WoS
2020 | Conference Paper | IST-REx-ID: 8987 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Pietrzak, K. Z. (2020). Delayed authentication: Preventing replay and relay attacks in private contact tracing. In Progress in Cryptology (Vol. 12578, pp. 3–15). Bangalore, India: Springer Nature. https://doi.org/10.1007/978-3-030-65277-7_1
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
2020 | Conference Paper | IST-REx-ID: 8272 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Chatterjee, K., Katoen, J. P., Weininger, M., & Winkler, T. (2020). Stochastic games with lexicographic reachability-safety objectives. In International Conference on Computer Aided Verification (Vol. 12225, pp. 398–420). Springer Nature. https://doi.org/10.1007/978-3-030-53291-8_21
[Published Version]
View
| Files available
| DOI
| WoS
| arXiv
2020 | Conference Paper | IST-REx-ID: 7810 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Chatterjee, K., Goharshady, A. K., Ibsen-Jensen, R., & Pavlogiannis, A. (2020). Optimal and perfectly parallel algorithms for on-demand data-flow analysis. In European Symposium on Programming (Vol. 12075, pp. 112–140). Dublin, Ireland: Springer Nature. https://doi.org/10.1007/978-3-030-44914-8_5
[Published Version]
View
| Files available
| DOI
| WoS
2019 | Conference Paper | IST-REx-ID: 7183 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Brázdil, T., Chatterjee, K., Kucera, A., Novotný, P., & Velan, D. (2019). Deciding fast termination for probabilistic VASS with nondeterminism. In International Symposium on Automated Technology for Verification and Analysis (Vol. 11781, pp. 462–478). Taipei, Taiwan: Springer Nature. https://doi.org/10.1007/978-3-030-31784-3_27
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
2019 | Conference Paper | IST-REx-ID: 6430 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Fuchsbauer, G., Kamath Hosdurg, C., Klein, K., & Pietrzak, K. Z. (2019). Adaptively secure proxy re-encryption (Vol. 11443, pp. 317–346). Presented at the PKC: Public-Key Cryptograhy, Beijing, China: Springer Nature. https://doi.org/10.1007/978-3-030-17259-6_11
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
2011 | Conference Paper | IST-REx-ID: 9648 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Gonzalez-Diaz, R., Ion, A., Jimenez, M. J., & Poyatos, R. (2011). Incremental-decremental algorithm for computing AT-models and persistent homology. In Computer Analysis of Images and Patterns (Vol. 6854, pp. 286–293). Seville, Spain: Springer Nature. https://doi.org/10.1007/978-3-642-23672-3_35
[Published Version]
View
| DOI
| Download Published Version (ext.)