Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
202 Publications
2025 | Published | Conference Paper | IST-REx-ID: 19445 |

Křišťan JM, Svoboda J. Reconfiguration using generalized token jumping. In: 19th International Conference and Workshops on Algorithms and Computation. Vol 15411. Springer Nature; 2025:244-265. doi:10.1007/978-981-96-2845-2_16
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2025 | Published | Conference Paper | IST-REx-ID: 19375 |

Azeem M, Chakraborty D, Kanav S, et al. 1–2–3–Go! Policy synthesis for parameterized Markov decision processes via decision-tree learning and generalization. In: 26th International Conference on Verification, Model Checking, and Abstract Interpretation. Vol 15530. Springer Nature; 2025:97-120. doi:10.1007/978-3-031-82703-7_5
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2025 | Published | Conference Paper | IST-REx-ID: 19712 |

Cueto Noval M, Merz S-P, Stählin P, Ünal A. On the soundness of algebraic attacks against code-based assumptions. In: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Vol 15606. Springer Nature; 2025:385-415. doi:10.1007/978-3-031-91095-1_14
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2025 | Published | Conference Paper | IST-REx-ID: 19740 |

Chatterjee K, Jafariraviz M, Saona Urmeneta RJ, Svoboda J. Value iteration with guessing for Markov chains and Markov decision processes. In: 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Vol 15697. Springer Nature; 2025:217-236. doi:10.1007/978-3-031-90653-4_11
[Published Version]
View
| Files available
| DOI
| arXiv
2025 | Published | Conference Paper | IST-REx-ID: 19739 |

Chalupa M, Richter C. BUBAAK: Dynamic cooperative verification. In: 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Vol 15698. Springer Nature; 2025:212-216. doi:10.1007/978-3-031-90660-2_14
[Published Version]
View
| Files available
| DOI
2025 | Conference Paper | IST-REx-ID: 19738 |

Acharya A, Azari K, Baig MA, Hofheinz D, Kamath C. Securely instantiating ‘Half Gates’ garbling in the standard model. In: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography. Vol 15677. Springer Nature; 2025:37-75. doi:10.1007/978-3-031-91829-2_2
[Preprint]
View
| DOI
| Download Preprint (ext.)
2025 | Published | Conference Paper | IST-REx-ID: 19743 |

Chatterjee K, Quatmann T, Schäffeler M, Weininger M, Winkler T, Zilken D. Fixed point certificates for reachability and expected rewards in MDPs. In: 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Vol 15697. Springer Nature; 2025:130-151. doi:10.1007/978-3-031-90653-4_7
[Published Version]
View
| Files available
| DOI
| arXiv
2025 | Published | Conference Paper | IST-REx-ID: 19742 |

Budde CE, Hartmanns A, Meggendorfer T, Weininger M, Wienhöft P. Sound statistical model checking for probabilities and expected rewards. In: 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Vol 15696. Springer Nature; 2025:167-190. doi:10.1007/978-3-031-90643-5_9
[Published Version]
View
| Files available
| DOI
| arXiv
2025 | Published | Conference Paper | IST-REx-ID: 19744 |

Chatterjee K, Goharshady E, Novotný P, Zikelic D. Refuting equivalence in probabilistic programs with conditioning. In: 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Vol 15697. Springer Nature; 2025:279-300. doi:10.1007/978-3-031-90653-4_14
[Published Version]
View
| Files available
| DOI
| arXiv
2025 | Published | Conference Paper | IST-REx-ID: 19600
Avarikioti Z, Bastankhah M, Maddah-Ali MA, Pietrzak KZ, Svoboda J, Yeo MX. Route discovery in private payment channel networks. In: Computer Security. ESORICS 2024 International Workshops. Vol 15263. Springer Nature; 2025:207-223. doi:10.1007/978-3-031-82349-7_15
View
| DOI
2025 | Published | Conference Paper | IST-REx-ID: 19741 |

Chalupa M, Henzinger TA, Mazzocchi NA, Sarac NE. Automating the analysis of quantitative automata with QuAK. In: 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Vol 15696. Springer Nature; 2025:303-312. doi:10.1007/978-3-031-90643-5_16
[Published Version]
View
| Files available
| DOI
| arXiv
2024 | Published | Conference Paper | IST-REx-ID: 14888 |

De Nooijer P, Terziadis S, Weinberger A, et al. Removing popular faces in curve arrangements. In: 31st International Symposium on Graph Drawing and Network Visualization. Vol 14466. Springer Nature; 2024:18-33. doi:10.1007/978-3-031-49275-4_2
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2024 | Published | Conference Paper | IST-REx-ID: 18206
Rave G, Fordham DE, Bronstein AM, Silver DH. Enhancing predictive accuracy in embryo implantation: The Bonna algorithm and its clinical implications. In: First International Conference on Artificial Intelligence in Healthcare. Vol 14976. Springer Nature; 2024:160-171. doi:10.1007/978-3-031-67285-9_12
View
| DOI
2024 | Published | Conference Paper | IST-REx-ID: 18702 |

Anastos M, Auerbach B, Baig MA, et al. The cost of maintaining keys in dynamic groups with applications to multicast encryption and group messaging. In: 22nd International Conference on Theory of Cryptography. Vol 15364. Springer Nature; 2024:413-443. doi:10.1007/978-3-031-78011-0_14
[Preprint]
View
| DOI
| Download Preprint (ext.)
2024 | Published | Conference Paper | IST-REx-ID: 18755 |

Ebrahimi E, Yadav A. Strongly secure universal thresholdizer. In: 30th International Conference on the Theory and Application of Cryptology and Information Security. Vol 15486. Springer Nature; 2024:207-239. doi:10.1007/978-981-96-0891-1_7
[Preprint]
View
| DOI
| Download Preprint (ext.)
2024 | Published | Conference Paper | IST-REx-ID: 18756 |

Brzuska C, Ünal A, Woo IKY. Evasive LWE assumptions: Definitions, classes, and counterexamples. In: 30th International Conference on the Theory and Application of Cryptology and Information Security. Vol 15487. Springer Nature; 2024:418-449. doi:10.1007/978-981-96-0894-2_14
[Preprint]
View
| DOI
| Download Preprint (ext.)
2024 | Published | Conference Paper | IST-REx-ID: 18521 |

Bonakdarpour B, Momtaz A, Nickovic D, Sarac NE. Approximate distributed monitoring under partial synchrony: Balancing speed & accuracy. In: 24th International Conference on Runtime Verification. Vol 15191. Springer Nature; 2024:282-301. doi:10.1007/978-3-031-74234-7_18
[Published Version]
View
| Files available
| DOI
| arXiv
2024 | Published | Conference Paper | IST-REx-ID: 17413 |

Froleyks N, Yu E, Biere A, Heljanko K. Certifying phase abstraction. In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol 14739. Springer Nature; 2024:284-303. doi:10.1007/978-3-031-63498-7_17
[Published Version]
View
| Files available
| DOI
| arXiv
2024 | Published | Conference Paper | IST-REx-ID: 15376 |

Avni G, Mallik K, Sadhukhan S. Auction-based scheduling. In: 30th International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Vol 14572. Springer Nature; 2024:153-172. doi:10.1007/978-3-031-57256-2_8
[Published Version]
View
| Files available
| DOI
| arXiv
2024 | Published | Conference Paper | IST-REx-ID: 15333 |

Chalupa M, Richter C. Bubaak-SpLit: Split what you cannot verify (Competition contribution). In: 30th International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Vol 14572. Springer Nature; 2024:353–358. doi:10.1007/978-3-031-57256-2_20
[Published Version]
View
| Files available
| DOI