Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
1850 Publications
2015 |Published| Conference Paper | IST-REx-ID: 1644 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
G. Demay, P. Gazi, U. Maurer, and B. Tackmann, “Query-complexity amplification for random oracles,” presented at the ICITS: International Conference on Information Theoretic Security, Lugano, Switzerland, 2015, vol. 9063, pp. 159–180.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1647 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
G. Fuchsbauer, C. Hanser, and D. Slamanig, “Practical round-optimal blind signatures in the standard model,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States, 2015, vol. 9216, pp. 233–253.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1654 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
P. Gazi, K. Z. Pietrzak, and S. Tessaro, “Generic security of NMAC and HMAC with input whitening,” vol. 9453. Springer, pp. 85–109, 2015.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1650 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
M. Skórski, A. Golovnev, and K. Z. Pietrzak, “Condensed unpredictability ,” presented at the ICALP: Automata, Languages and Programming, Kyoto, Japan, 2015, vol. 9134, pp. 1046–1057.
[Published Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1651 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
F. Baldimtsi, M. Chase, G. Fuchsbauer, and M. Kohlweiss, “Anonymous transferable e-cash,” in Public-Key Cryptography - PKC 2015, Gaithersburg, MD, United States, 2015, vol. 9020, pp. 101–124.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1658
S. Bogomolov, T. A. Henzinger, A. Podelski, J. Ruess, and C. Schilling, “Adaptive moment closure for parameter inference of biochemical reaction networks,” vol. 9308. Springer, pp. 77–89, 2015.
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1667 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
T. Brázdil, L. Korenčiak, J. Krčál, P. Novotný, and V. Řehák, “Optimizing performance of continuous-time stochastic systems using timeout synthesis,” vol. 9259. Springer, pp. 141–159, 2015.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1672 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
J. F. Alwen, R. Ostrovsky, H. Zhou, and V. Zikas, “Incoercible multi-party computation and universally composable receipt-free voting,” in Advances in Cryptology - CRYPTO 2015, Santa Barbara, CA, United States, 2015, vol. 9216, pp. 763–780.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1669 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
K. Z. Pietrzak and M. Skórski, “The chain rule for HILL pseudoentropy, revisited,” vol. 9230. Springer, pp. 81–98, 2015.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1671 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
P. Gazi, K. Z. Pietrzak, and S. Tessaro, “The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States, 2015, vol. 9215, pp. 368–387.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1668 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, and S. Tessaro, “Relaxing full-codebook security: A refined analysis of key-length extension schemes,” vol. 9054. Springer, pp. 319–341, 2015.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1685 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
V. Cohen Addad and A. N. de Mesmay, “A fixed parameter tractable approximation scheme for the optimal cut graph of a surface,” presented at the ESA: European Symposium on Algorithms, Patras, Greece, 2015, vol. 9294, pp. 386–398.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2015 |Published| Journal Article | IST-REx-ID: 1682 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
P. Franek and M. Krcál, “Robust satisfiability of systems of equations,” Journal of the ACM, vol. 62, no. 4. ACM, 2015.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2015 |Published| Journal Article | IST-REx-ID: 1693 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
P. Amaro et al., “Quantum interference effects in laser spectroscopy of muonic hydrogen, deuterium, and helium-3,” Physical Review A, vol. 92, no. 2. American Physical Society, 2015.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1706 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
A. Pentina and S. Ben David, “Multi-task and lifelong learning of kernels,” presented at the ALT: Algorithmic Learning Theory, Banff, AB, Canada, 2015, vol. 9355, pp. 194–208.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2015 |Published| Journal Article | IST-REx-ID: 1730 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
É. Colin De Verdière, A. Hubard, and A. N. de Mesmay, “Discrete systolic inequalities and decompositions of triangulated surfaces,” Discrete & Computational Geometry, vol. 53, no. 3. Springer, pp. 587–620, 2015.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2015 |Published| Journal Article | IST-REx-ID: 1789 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Kuechler A, Zink A, Wieland T, Lüdecke H, Cremer K, Salviati L, Magini P, Najafi K, Zweier C, Czeschik J, Aretz S, Endele S, Tamburrino F, Pinato C, Clementi M, Gundlach J, Maylahn C, Mazzanti L, Wohlleber E, Schwarzmayr T, Kariminejad R, Schlessinger A, Wieczorek D, Strom T, Novarino G, Engels H. 2015. Loss-of-function variants of SETD5 cause intellectual disability and the core phenotype of microdeletion 3p25.3 syndrome. European Journal of Human Genetics. 23(6), 753–760.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| PubMed | Europe PMC
2015 |Published| Conference Paper | IST-REx-ID: 1838 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
R. Bloem, K. Chatterjee, S. Jacobs, and R. Könighofer, “Assume-guarantee synthesis for concurrent reactive programs with partial information,” presented at the TACAS: Tools and Algorithms for the Construction and Analysis of Systems, London, United Kingdom, 2015, vol. 9035, pp. 517–532.
[Preprint]
View
| DOI
| Download Preprint (ext.)