Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5995 Publications


2012 | Published | Conference Paper | IST-REx-ID: 3281
Pietrzak KZ, Rosen A, Segev G. 2012. Lossy functions do not amplify well. TCC: Theory of Cryptography Conference, LNCS, vol. 7194, 458–475.
View | DOI | Download None (ext.)
 

2012 | Published | Conference Paper | IST-REx-ID: 3282 | OA
Dodis Y, Pietrzak KZ, Kiltz E, Wichs D. 2012. Message authentication, revisited. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 7237, 355–374.
[Submitted Version] View | Files available | DOI
 

2012 | Published | Conference Paper | IST-REx-ID: 3280 | OA
Pietrzak KZ. 2012. Subspace LWE. TCC: Theory of Cryptography Conference, LNCS, vol. 7194, 548–563.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2012 | Published | Conference Paper | IST-REx-ID: 3279
Jain A, Pietrzak KZ, Tentes A. 2012. Hardness preserving constructions of pseudorandom functions. TCC: Theory of Cryptography Conference, LNCS, vol. 7194, 369–382.
View | DOI | Download None (ext.)
 

2012 | Published | Conference Paper | IST-REx-ID: 2974 | OA
Jain A, Krenn S, Pietrzak KZ, Tentes A. 2012. Commitments and efficient zero knowledge proofs from learning parity with noise. ASIACRYPT: Theory and Application of Cryptology and Information Security, LNCS, vol. 7658, 663–680.
[Submitted Version] View | Files available | DOI
 

2012 | Published | Conference Paper | IST-REx-ID: 2048 | OA
Faust S, Pietrzak KZ, Schipper J. 2012. Practical leakage-resilient symmetric cryptography. Conference proceedings CHES 2012. CHES: Cryptographic Hardware and Embedded Systems, LNCS, vol. 7428, 213–232.
[Preprint] View | DOI | Download Preprint (ext.)
 

2012 | Published | Conference Paper | IST-REx-ID: 2049 | OA
Heyse S, Kiltz E, Lyubashevsky V, Paar C, Pietrzak KZ. 2012. Lapin: An efficient authentication protocol based on ring-LPN. Conference proceedings FSE 2012. FSE: Fast Software Encryption, LNCS, vol. 7549, 346–365.
[Preprint] View | DOI | Download Preprint (ext.)
 

2012 | Published | Conference Paper | IST-REx-ID: 5745 | OA
Gupta A. 2012. Improved single pass algorithms for resolution proof reduction. 10th International Symposium on Automated Technology for Verification and Analysis. ATVA: Automated Technology for Verification and Analysis, LNCS, vol. 7561, 107–121.
[Submitted Version] View | Files available | DOI
 

2012 | Published | Conference Paper | IST-REx-ID: 3136
Guet CC, Gupta A, Henzinger TA, Mateescu M, Sezgin A. 2012. Delayed continuous time Markov chains for genetic regulatory circuits. CAV: Computer Aided Verification, LNCS, vol. 7358, 294–309.
View | DOI
 

2012 | Published | Conference Paper | IST-REx-ID: 2891 | OA
Boker U, Henzinger TA. 2012. Approximate determinization of quantitative automata. Leibniz International Proceedings in Informatics. FSTTCS: Foundations of Software Technology and Theoretical Computer Science, LIPIcs, vol. 18, 362–373.
[Published Version] View | Files available | DOI
 

2012 | Published | Conference Paper | IST-REx-ID: 3251 | OA
Zufferey D, Wies T, Henzinger TA. 2012. Ideal abstractions for well structured transition systems. VMCAI: Verification, Model Checking and Abstract Interpretation, LNCS, vol. 7148, 445–460.
[Submitted Version] View | Files available | DOI
 

2012 | Published | Conference Paper | IST-REx-ID: 2890
Cerny P, Gopi S, Henzinger TA, Radhakrishna A, Totla N. 2012. Synthesis from incompatible specifications. Proceedings of the tenth ACM international conference on Embedded software. EMSOFT: Embedded Software , 53–62.
View | DOI
 

2012 | Published | Conference Paper | IST-REx-ID: 2942
Henzinger TA, Nickovic D. 2012. Independent implementability of viewpoints. Conference proceedings Monterey Workshop 2012. Monterey Workshop 2012, LNCS, vol. 7539, 380–395.
View | DOI
 

2012 | Published | Conference Paper | IST-REx-ID: 3255 | OA
Chatterjee K, Doyen L. 2012. Games and Markov decision processes with mean payoff parity and energy parity objectives. MEMICS: Mathematical and Engineering Methods in Computer Science, LNCS, vol. 7119, 37–46.
[Submitted Version] View | Files available | DOI
 

2012 | Published | Conference Paper | IST-REx-ID: 495 | OA
Kruckman A, Rubin S, Sheridan J, Zax B. 2012. A Myhill Nerode theorem for automata with advice. Proceedings GandALF 2012. GandALF: Games, Automata, Logics and Formal Verification, EPTCS, vol. 96, 238–246.
[Published Version] View | Files available | DOI
 

2012 | Published | Conference Paper | IST-REx-ID: 3341 | OA
Chatterjee K. 2012. Robustness of structurally equivalent concurrent parity games. FoSSaCS: Foundations of Software Science and Computation Structures, LNCS, vol. 7213, 270–285.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 

2012 | Published | Conference Paper | IST-REx-ID: 497 | OA
Chatterjee K, Chaubal S, Kamath P. 2012. Faster algorithms for alternating refinement relations. EACSL: European Association for Computer Science Logic, LIPIcs, vol. 16, 167–182.
[Published Version] View | Files available | DOI
 

2012 | Published | Technical Report | IST-REx-ID: 5378 | OA
Chatterjee K, Chaubal S, Kamath P. 2012. Faster algorithms for alternating refinement relations, IST Austria, 21p.
[Published Version] View | Files available | DOI
 

2012 | Published | Conference Paper | IST-REx-ID: 2888
Henzinger TA. 2012. Quantitative reactive models. 15th International Conference on Model Driven Engineering Languages and Systems. MODELS: Model-driven Engineering Languages and Systems, LNCS, vol. 7590, 1–2.
View | DOI
 

2012 | Published | Conference Paper | IST-REx-ID: 2971
Zankl G, Haxhimusa Y, Ion A. 2012. Interactive labeling of image segmentation hierarchies. 34th DAGM and 36th OAGM Symposium. Pattern Recognition, LNCS, vol. 7476, 11–20.
View | DOI
 

Filters and Search Terms

extern<>1

Search

Filter Publications

Display / Sort

Citation Style: ISTA Annual Report

Export / Embed