Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

1953 Publications


2015 |Published| Conference Paper | IST-REx-ID: 1609 | OA
Chatterjee K, Doyen L, Vardi M. 2015. The complexity of synthesis from probabilistic components. 42nd International Colloquium. ICALP: Automata, Languages and Programming, LNCS, vol. 9135, 108–120.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1636 | OA
Kolmogorov V, Rolinek M, Takhanov R. 2015. Effectiveness of structural restrictions for hybrid CSPs. 26th International Symposium. ISAAC: International Symposium on Algorithms and Computation, LNCS, vol. 9472, 566–577.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2015 |Published| Conference Paper | IST-REx-ID: 1646 | OA
Banerjee A, Fuchsbauer G, Peikert C, Pietrzak KZ, Stevens S. 2015. Key-homomorphic constrained pseudorandom functions. 12th Theory of Cryptography Conference. TCC: Theory of Cryptography Conference, LNCS, vol. 9015, 31–60.
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1648 | OA
Fuchsbauer G, Jafargholi Z, Pietrzak KZ. 2015. A quasipolynomial reduction for generalized selective decryption on trees. CRYPTO: International Cryptology Conference, LNCS, vol. 9215, 601–620.
[Submitted Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1649 | OA
Benhamouda F, Krenn S, Lyubashevsky V, Pietrzak KZ. 2015. Efficient zero-knowledge proofs for commitments from learning with errors over rings. 9326, 305–325.
[Published Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1644 | OA
Demay G, Gazi P, Maurer U, Tackmann B. 2015. Query-complexity amplification for random oracles. ICITS: International Conference on Information Theoretic Security, LNCS, vol. 9063, 159–180.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1647 | OA
Fuchsbauer G, Hanser C, Slamanig D. 2015. Practical round-optimal blind signatures in the standard model. CRYPTO: International Cryptology Conference, LNCS, vol. 9216, 233–253.
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1654 | OA
Gazi P, Pietrzak KZ, Tessaro S. 2015. Generic security of NMAC and HMAC with input whitening. 9453, 85–109.
[Submitted Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1650 | OA
Skórski M, Golovnev A, Pietrzak KZ. 2015. Condensed unpredictability . ICALP: Automata, Languages and Programming, LNCS, vol. 9134, 1046–1057.
[Published Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1651 | OA
Baldimtsi F, Chase M, Fuchsbauer G, Kohlweiss M. 2015. Anonymous transferable e-cash. Public-Key Cryptography - PKC 2015. PKC: Public Key Crypography, LNCS, vol. 9020, 101–124.
[Published Version] View | DOI | Download Published Version (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1658
Bogomolov S, Henzinger TA, Podelski A, Ruess J, Schilling C. 2015. Adaptive moment closure for parameter inference of biochemical reaction networks. 9308, 77–89.
View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1667 | OA
Brázdil T, Korenčiak L, Krčál J, Novotný P, Řehák V. 2015. Optimizing performance of continuous-time stochastic systems using timeout synthesis. 9259, 141–159.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1672 | OA
Alwen JF, Ostrovsky R, Zhou H, Zikas V. 2015. Incoercible multi-party computation and universally composable receipt-free voting. Advances in Cryptology - CRYPTO 2015. CRYPTO: International Cryptology ConferenceLecture Notes in Computer Science, LNCS, vol. 9216, 763–780.
[Submitted Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1669 | OA
Pietrzak KZ, Skórski M. 2015. The chain rule for HILL pseudoentropy, revisited. 9230, 81–98.
[Submitted Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1671 | OA
Gazi P, Pietrzak KZ, Tessaro S. 2015. The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC. CRYPTO: International Cryptology Conference, LNCS, vol. 9215, 368–387.
[Submitted Version] View | Files available | DOI
 

2015 |Published| Conference Paper | IST-REx-ID: 1668 | OA
Gazi P, Lee J, Seurin Y, Steinberger J, Tessaro S. 2015. Relaxing full-codebook security: A refined analysis of key-length extension schemes. 9054, 319–341.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 |Published| Conference Paper | IST-REx-ID: 1685 | OA
Cohen Addad V, de Mesmay AN. 2015. A fixed parameter tractable approximation scheme for the optimal cut graph of a surface. ESA: European Symposium on Algorithms, LNCS, vol. 9294, 386–398.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 |Published| Journal Article | IST-REx-ID: 1682 | OA
Franek P, Krcál M. 2015. Robust satisfiability of systems of equations. Journal of the ACM. 62(4), 26.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 |Published| Journal Article | IST-REx-ID: 1693 | OA
Amaro P, Franke B, Krauth J, Diepold M, Fratini F, Safari L, Machado J, Antognini A, Kottmann F, Indelicato P, Pohl R, Santos J. 2015. Quantum interference effects in laser spectroscopy of muonic hydrogen, deuterium, and helium-3. Physical Review A. 92(2), 022514.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 |Published| Journal Article | IST-REx-ID: 1694
Chatterjee K, Prabhu V. 2015. Quantitative temporal simulation and refinement distances for timed systems. IEEE Transactions on Automatic Control. 60(9), 2291–2306.
View | DOI
 

Filters and Search Terms

isbn%3D978-3-99078-004-6

Search

Filter Publications