Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

1953 Publications


2015 |Published| Conference Paper | IST-REx-ID: 1609 | OA
The complexity of synthesis from probabilistic components
K. Chatterjee, L. Doyen, M. Vardi, in:, 42nd International Colloquium, Springer Nature, 2015, pp. 108–120.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1636 | OA
Effectiveness of structural restrictions for hybrid CSPs
V. Kolmogorov, M. Rolinek, R. Takhanov, in:, 26th International Symposium, Springer Nature, 2015, pp. 566–577.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2015 |Published| Conference Paper | IST-REx-ID: 1646 | OA
Key-homomorphic constrained pseudorandom functions
A. Banerjee, G. Fuchsbauer, C. Peikert, K.Z. Pietrzak, S. Stevens, in:, 12th Theory of Cryptography Conference, Springer Nature, 2015, pp. 31–60.
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1648 | OA
A quasipolynomial reduction for generalized selective decryption on trees
G. Fuchsbauer, Z. Jafargholi, K.Z. Pietrzak, in:, Springer, 2015, pp. 601–620.
[Submitted Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1649 | OA
Efficient zero-knowledge proofs for commitments from learning with errors over rings
F. Benhamouda, S. Krenn, V. Lyubashevsky, K.Z. Pietrzak, 9326 (2015) 305–325.
[Published Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1644 | OA
Query-complexity amplification for random oracles
G. Demay, P. Gazi, U. Maurer, B. Tackmann, in:, Springer, 2015, pp. 159–180.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1647 | OA
Practical round-optimal blind signatures in the standard model
G. Fuchsbauer, C. Hanser, D. Slamanig, in:, Springer, 2015, pp. 233–253.
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1654 | OA
Generic security of NMAC and HMAC with input whitening
P. Gazi, K.Z. Pietrzak, S. Tessaro, 9453 (2015) 85–109.
[Submitted Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1650 | OA
Condensed unpredictability
M. Skórski, A. Golovnev, K.Z. Pietrzak, in:, Springer, 2015, pp. 1046–1057.
[Published Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1651 | OA
Anonymous transferable e-cash
F. Baldimtsi, M. Chase, G. Fuchsbauer, M. Kohlweiss, in:, Public-Key Cryptography - PKC 2015, Springer, 2015, pp. 101–124.
[Published Version] View | DOI | Download Published Version (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1658
Adaptive moment closure for parameter inference of biochemical reaction networks
S. Bogomolov, T.A. Henzinger, A. Podelski, J. Ruess, C. Schilling, 9308 (2015) 77–89.
View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1667 | OA
Optimizing performance of continuous-time stochastic systems using timeout synthesis
T. Brázdil, L. Korenčiak, J. Krčál, P. Novotný, V. Řehák, 9259 (2015) 141–159.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1672 | OA
Incoercible multi-party computation and universally composable receipt-free voting
J.F. Alwen, R. Ostrovsky, H. Zhou, V. Zikas, in:, Advances in Cryptology - CRYPTO 2015, Springer, 2015, pp. 763–780.
[Submitted Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1669 | OA
The chain rule for HILL pseudoentropy, revisited
K.Z. Pietrzak, M. Skórski, 9230 (2015) 81–98.
[Submitted Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1671 | OA
The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC
P. Gazi, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2015, pp. 368–387.
[Submitted Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1668 | OA
Relaxing full-codebook security: A refined analysis of key-length extension schemes
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, S. Tessaro, 9054 (2015) 319–341.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1685 | OA
A fixed parameter tractable approximation scheme for the optimal cut graph of a surface
V. Cohen Addad, A.N. de Mesmay, in:, Springer, 2015, pp. 386–398.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 |Published| Journal Article | IST-REx-ID: 1682 | OA
Robust satisfiability of systems of equations
P. Franek, M. Krcál, Journal of the ACM 62 (2015).
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 |Published| Journal Article | IST-REx-ID: 1693 | OA
Quantum interference effects in laser spectroscopy of muonic hydrogen, deuterium, and helium-3
P. Amaro, B. Franke, J. Krauth, M. Diepold, F. Fratini, L. Safari, J. Machado, A. Antognini, F. Kottmann, P. Indelicato, R. Pohl, J. Santos, Physical Review A 92 (2015).
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 |Published| Journal Article | IST-REx-ID: 1694
Quantitative temporal simulation and refinement distances for timed systems
K. Chatterjee, V. Prabhu, IEEE Transactions on Automatic Control 60 (2015) 2291–2306.
View | DOI
 

Filters and Search Terms

isbn%3D978-3-99078-004-6

Search

Filter Publications