Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

1850 Publications


2015 |Published| Conference Paper | IST-REx-ID: 1644 | OA
G. Demay, P. Gazi, U. Maurer, and B. Tackmann, “Query-complexity amplification for random oracles,” presented at the ICITS: International Conference on Information Theoretic Security, Lugano, Switzerland, 2015, vol. 9063, pp. 159–180.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1647 | OA
G. Fuchsbauer, C. Hanser, and D. Slamanig, “Practical round-optimal blind signatures in the standard model,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States, 2015, vol. 9216, pp. 233–253.
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1654 | OA
P. Gazi, K. Z. Pietrzak, and S. Tessaro, “Generic security of NMAC and HMAC with input whitening,” vol. 9453. Springer, pp. 85–109, 2015.
[Submitted Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1650 | OA
M. Skórski, A. Golovnev, and K. Z. Pietrzak, “Condensed unpredictability ,” presented at the ICALP: Automata, Languages and Programming, Kyoto, Japan, 2015, vol. 9134, pp. 1046–1057.
[Published Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1651 | OA
F. Baldimtsi, M. Chase, G. Fuchsbauer, and M. Kohlweiss, “Anonymous transferable e-cash,” in Public-Key Cryptography - PKC 2015, Gaithersburg, MD, United States, 2015, vol. 9020, pp. 101–124.
[Published Version] View | DOI | Download Published Version (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1658
S. Bogomolov, T. A. Henzinger, A. Podelski, J. Ruess, and C. Schilling, “Adaptive moment closure for parameter inference of biochemical reaction networks,” vol. 9308. Springer, pp. 77–89, 2015.
View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1667 | OA
T. Brázdil, L. Korenčiak, J. Krčál, P. Novotný, and V. Řehák, “Optimizing performance of continuous-time stochastic systems using timeout synthesis,” vol. 9259. Springer, pp. 141–159, 2015.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1672 | OA
J. F. Alwen, R. Ostrovsky, H. Zhou, and V. Zikas, “Incoercible multi-party computation and universally composable receipt-free voting,” in Advances in Cryptology - CRYPTO 2015, Santa Barbara, CA, United States, 2015, vol. 9216, pp. 763–780.
[Submitted Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1669 | OA
K. Z. Pietrzak and M. Skórski, “The chain rule for HILL pseudoentropy, revisited,” vol. 9230. Springer, pp. 81–98, 2015.
[Submitted Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1671 | OA
P. Gazi, K. Z. Pietrzak, and S. Tessaro, “The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States, 2015, vol. 9215, pp. 368–387.
[Submitted Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1668 | OA
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, and S. Tessaro, “Relaxing full-codebook security: A refined analysis of key-length extension schemes,” vol. 9054. Springer, pp. 319–341, 2015.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1685 | OA
V. Cohen Addad and A. N. de Mesmay, “A fixed parameter tractable approximation scheme for the optimal cut graph of a surface,” presented at the ESA: European Symposium on Algorithms, Patras, Greece, 2015, vol. 9294, pp. 386–398.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 |Published| Journal Article | IST-REx-ID: 1682 | OA
P. Franek and M. Krcál, “Robust satisfiability of systems of equations,” Journal of the ACM, vol. 62, no. 4. ACM, 2015.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 |Published| Journal Article | IST-REx-ID: 1693 | OA
P. Amaro et al., “Quantum interference effects in laser spectroscopy of muonic hydrogen, deuterium, and helium-3,” Physical Review A, vol. 92, no. 2. American Physical Society, 2015.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 |Published| Journal Article | IST-REx-ID: 1694
K. Chatterjee and V. Prabhu, “Quantitative temporal simulation and refinement distances for timed systems,” IEEE Transactions on Automatic Control, vol. 60, no. 9. IEEE, pp. 2291–2306, 2015.
View | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1706 | OA
A. Pentina and S. Ben David, “Multi-task and lifelong learning of kernels,” presented at the ALT: Algorithmic Learning Theory, Banff, AB, Canada, 2015, vol. 9355, pp. 194–208.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 |Published| Journal Article | IST-REx-ID: 1730 | OA
É. Colin De Verdière, A. Hubard, and A. N. de Mesmay, “Discrete systolic inequalities and decompositions of triangulated surfaces,” Discrete & Computational Geometry, vol. 53, no. 3. Springer, pp. 587–620, 2015.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 |Published| Journal Article | IST-REx-ID: 1789 | OA
Kuechler A, Zink A, Wieland T, Lüdecke H, Cremer K, Salviati L, Magini P, Najafi K, Zweier C, Czeschik J, Aretz S, Endele S, Tamburrino F, Pinato C, Clementi M, Gundlach J, Maylahn C, Mazzanti L, Wohlleber E, Schwarzmayr T, Kariminejad R, Schlessinger A, Wieczorek D, Strom T, Novarino G, Engels H. 2015. Loss-of-function variants of SETD5 cause intellectual disability and the core phenotype of microdeletion 3p25.3 syndrome. European Journal of Human Genetics. 23(6), 753–760.
[Submitted Version] View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 

2015 |Published| Conference Paper | IST-REx-ID: 1836
P. Cerny, T. A. Henzinger, L. Kovács, A. Radhakrishna, and J. Zwirchmayr, “Segment abstraction for worst-case execution time analysis,” vol. 9032. Springer, pp. 105–131, 2015.
View | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1838 | OA
R. Bloem, K. Chatterjee, S. Jacobs, and R. Könighofer, “Assume-guarantee synthesis for concurrent reactive programs with partial information,” presented at the TACAS: Tools and Algorithms for the Construction and Analysis of Systems, London, United Kingdom, 2015, vol. 9035, pp. 517–532.
[Preprint] View | DOI | Download Preprint (ext.)
 

Filters and Search Terms

isbn%3D978-3-030-00150-6

Search

Filter Publications