Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
1621 Publications
2015 |Published| Book Chapter | IST-REx-ID: 1596 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Fulek R, Radoičić R. 2015.Vertical visibility among parallel polygons in three dimensions. In: Graph Drawing and Network Visualization. LNCS, vol. 9411, 373–379.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1601 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Babiak T, Blahoudek F, Duret Lutz A, Klein J, Kretinsky J, Mueller D, Parker D, Strejček J. 2015. The Hanoi omega-automata format. CAV: Computer Aided Verification, LNCS, vol. 9206, 479–486.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1605 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Bogomolov S, Schilling C, Bartocci E, Batt G, Kong H, Grosu R. 2015. Abstraction-based parameter synthesis for multiaffine systems. HVC: Haifa Verification Conference, LNCS, vol. 9434, 19–35.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1609 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Chatterjee K, Doyen L, Vardi M. 2015. The complexity of synthesis from probabilistic components. 42nd International Colloquium. ICALP: Automata, Languages and Programming, LNCS, vol. 9135, 108–120.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1636 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Kolmogorov V, Rolinek M, Takhanov R. 2015. Effectiveness of structural restrictions for hybrid CSPs. 26th International Symposium. ISAAC: International Symposium on Algorithms and Computation, LNCS, vol. 9472, 566–577.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2015 |Published| Conference Paper | IST-REx-ID: 1646 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Banerjee A, Fuchsbauer G, Peikert C, Pietrzak KZ, Stevens S. 2015. Key-homomorphic constrained pseudorandom functions. 12th Theory of Cryptography Conference. TCC: Theory of Cryptography Conference, LNCS, vol. 9015, 31–60.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1648 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Fuchsbauer G, Jafargholi Z, Pietrzak KZ. 2015. A quasipolynomial reduction for generalized selective decryption on trees. CRYPTO: International Cryptology Conference, LNCS, vol. 9215, 601–620.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1649 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Benhamouda F, Krenn S, Lyubashevsky V, Pietrzak KZ. 2015. Efficient zero-knowledge proofs for commitments from learning with errors over rings. 9326, 305–325.
[Published Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1644 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Demay G, Gazi P, Maurer U, Tackmann B. 2015. Query-complexity amplification for random oracles. ICITS: International Conference on Information Theoretic Security, LNCS, vol. 9063, 159–180.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1647 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Fuchsbauer G, Hanser C, Slamanig D. 2015. Practical round-optimal blind signatures in the standard model. CRYPTO: International Cryptology Conference, LNCS, vol. 9216, 233–253.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1654 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Gazi P, Pietrzak KZ, Tessaro S. 2015. Generic security of NMAC and HMAC with input whitening. 9453, 85–109.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1650 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Skórski M, Golovnev A, Pietrzak KZ. 2015. Condensed unpredictability . ICALP: Automata, Languages and Programming, LNCS, vol. 9134, 1046–1057.
[Published Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1651 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Baldimtsi F, Chase M, Fuchsbauer G, Kohlweiss M. 2015. Anonymous transferable e-cash. Public-Key Cryptography - PKC 2015. PKC: Public Key Crypography, LNCS, vol. 9020, 101–124.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1658
Bogomolov S, Henzinger TA, Podelski A, Ruess J, Schilling C. 2015. Adaptive moment closure for parameter inference of biochemical reaction networks. 9308, 77–89.
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1667 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Brázdil T, Korenčiak L, Krčál J, Novotný P, Řehák V. 2015. Optimizing performance of continuous-time stochastic systems using timeout synthesis. 9259, 141–159.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2015 |Published| Conference Paper | IST-REx-ID: 1672 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Alwen JF, Ostrovsky R, Zhou H, Zikas V. 2015. Incoercible multi-party computation and universally composable receipt-free voting. Advances in Cryptology - CRYPTO 2015. CRYPTO: International Cryptology ConferenceLecture Notes in Computer Science, LNCS, vol. 9216, 763–780.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1669 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Pietrzak KZ, Skórski M. 2015. The chain rule for HILL pseudoentropy, revisited. 9230, 81–98.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1671 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Gazi P, Pietrzak KZ, Tessaro S. 2015. The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC. CRYPTO: International Cryptology Conference, LNCS, vol. 9215, 368–387.
[Submitted Version]
View
| Files available
| DOI
2015 |Published| Conference Paper | IST-REx-ID: 1668 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Gazi P, Lee J, Seurin Y, Steinberger J, Tessaro S. 2015. Relaxing full-codebook security: A refined analysis of key-length extension schemes. 9054, 319–341.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)