Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
1790 Publications
2017 |Published| Journal Article | IST-REx-ID: 94 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
E. Rosenthal, B. Chapman, A. P. Higginbotham, J. Kerckhoff, and K. Lehnert, “Breaking Lorentz reciprocity with frequency conversion and delay,” APS Physics, Physical Review Letters, vol. 119, no. 14. American Physical Society, 2017.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| arXiv
2017 |Published| Journal Article | IST-REx-ID: 12610 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
E. S. Miles et al., “Pond dynamics and supraglacial-englacial connectivity on debris-covered Lirung Glacier, Nepal,” Frontiers in Earth Science, vol. 5. Frontiers Media, 2017.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2017 |Published| Conference Paper | IST-REx-ID: 13160 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
J. Kretinsky, T. Meggendorfer, C. Waldmann, and M. Weininger, “Index appearance record for transforming Rabin automata into parity automata,” in Tools and Algorithms for the Construction and Analysis of Systems, Uppsala, Sweden, 2017, vol. 10205, pp. 443–460.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2017 |Published| Journal Article | IST-REx-ID: 13477 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
E. Zapartas et al., “Delay-time distribution of core-collapse supernovae with late events resulting from binary interaction,” Astronomy & Astrophysics, vol. 601, no. A&A. EDP Sciences, 2017.
[Published Version]
View
| DOI
| Download Published Version (ext.)
| arXiv
2017 |Published| Thesis | IST-REx-ID: 818 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
K. Mitosch, “Timing, variability and cross-protection in bacteria – insights from dynamic gene expression responses to antibiotics,” Institute of Science and Technology Austria, 2017.
[Published Version]
View
| Files available
| DOI
2017 |Published| Thesis | IST-REx-ID: 838 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
M. Rybar, “(The exact security of) Message authentication codes,” Institute of Science and Technology Austria, 2017.
[Published Version]
View
| Files available
| DOI
2017 |Published| Journal Article | IST-REx-ID: 6196 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
P. Gazi, K. Z. Pietrzak, and M. Rybar, “The exact security of PMAC,” IACR Transactions on Symmetric Cryptology, vol. 2016, no. 2. Ruhr University Bochum, pp. 145–161, 2017.
[Published Version]
View
| Files available
| DOI
2017 |Published| Thesis | IST-REx-ID: 938 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
M. Adamowski, “Investigations into cell polarity and trafficking in the plant model Arabidopsis thaliana ,” Institute of Science and Technology Austria, 2017.
[Published Version]
View
| Files available
| DOI
2017 |Published| Conference Paper | IST-REx-ID: 559 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
H. M. Abusalah, J. F. Alwen, B. Cohen, D. Khilko, K. Z. Pietrzak, and L. Reyzin, “Beyond Hellman’s time-memory trade-offs with applications to proofs of space,” presented at the ASIACRYPT: Theory and Applications of Cryptology and Information Security, Hong Kong, China, 2017, vol. 10625, pp. 357–379.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
2017 |Published| Conference Paper | IST-REx-ID: 647 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
S. Bogomolov, M. Giacobbe, T. A. Henzinger, and H. Kong, “Conic abstractions for hybrid systems,” presented at the FORMATS: Formal Modelling and Analysis of Timed Systems, Berlin, Germany, 2017, vol. 10419, pp. 116–132.
[Submitted Version]
View
| Files available
| DOI
2017 |Published| Conference Paper | IST-REx-ID: 631 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
S. Bogomolov, G. Frehse, M. Giacobbe, and T. A. Henzinger, “Counterexample guided refinement of template polyhedra,” presented at the TACAS: Tools and Algorithms for the Construction and Analysis of Systems, Uppsala, Sweden, 2017, vol. 10205, pp. 589–606.
[Submitted Version]
View
| Files available
| DOI
2017 |Published| Conference Paper | IST-REx-ID: 637 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Z. Jafargholi, C. Kamath Hosdurg, K. Klein, I. Komargodski, K. Z. Pietrzak, and D. Wichs, “Be adaptive avoid overcommitting,” presented at the CRYPTO: Cryptology, Santa Barbara, CA, United States, 2017, vol. 10401, pp. 133–163.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
2017 |Published| Thesis | IST-REx-ID: 6287 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
A. Nikitenko, “Discrete Morse theory for random complexes ,” Institute of Science and Technology Austria, 2017.
[Published Version]
View
| Files available
| DOI
2017 |Published| Journal Article | IST-REx-ID: 1528 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Z. Bao and L. Erdös, “Delocalization for a class of random block band matrices,” Probability Theory and Related Fields, vol. 167, no. 3–4. Springer, pp. 673–776, 2017.
[Published Version]
View
| Files available
| DOI
| WoS
2017 |Published| Conference Paper | IST-REx-ID: 1176 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
J. F. Alwen and J. Blocki, “Towards practical attacks on Argon2i and balloon hashing,” presented at the EuroS&P: European Symposium on Security and Privacy, Paris, France, 2017.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
2017 |Published| Journal Article | IST-REx-ID: 1187 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
E. Kiltz, K. Z. Pietrzak, D. Venturi, D. Cash, and A. Jain, “Efficient authentication from hard learning problems,” Journal of Cryptology, vol. 30, no. 4. Springer, pp. 1238–1275, 2017.
[Submitted Version]
View
| Files available
| DOI
| WoS
2017 |Published| Conference Paper | IST-REx-ID: 1178 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
M. Skórski, “Simulating auxiliary inputs, revisited,” presented at the TCC: Theory of Cryptography Conference, 2017, vol. 9985, pp. 159–179.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
2017 |Published| Conference Paper | IST-REx-ID: 1116 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
G. Avni, S. Goel, T. A. Henzinger, and G. Rodríguez Navas, “Computing scores of forwarding schemes in switched networks with probabilistic faults,” presented at the TACAS: Tools and Algorithms for the Construction and Analysis of Systems, Uppsala, Sweden, 2017, vol. 10206, pp. 169–187.
[Submitted Version]
View
| Files available
| DOI
| WoS
2017 |Published| Journal Article | IST-REx-ID: 1110 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
B. Kuhn et al., “Flavonol-induced changes in PIN2 polarity and auxin transport in the Arabidopsis thaliana rol1-2 mutant require phosphatase activity,” Scientific Reports, vol. 7. Nature Publishing Group, 2017.
[Published Version]
View
| Files available
| DOI
| WoS