Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
254 Publications
2026 |
Published |
Conference Paper |
IST-REx-ID: 21042 |
R. Neiheiser and E. Kokoris Kogias, “Anthemius: Efficient and modular block assembly for concurrent execution,” in 29th International Conference on Financial Cryptography and Data Security, Miyakojima, Japan, 2026, vol. 15751, pp. 307–323.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2026 |
Published |
Conference Paper |
IST-REx-ID: 21044 |
Q. Kniep, E. Kokoris Kogias, A. Sonnino, I. Zablotchi, and N. Zhang, “Pilotfish: Distributed execution for scalable blockchains,” in 29th International Conference on Financial Cryptography and Data Security, Miyakojima, Japan, 2026, vol. 15751, pp. 287–306.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2026 |
Published |
Conference Paper |
IST-REx-ID: 21135 |
J. Troidl et al., “niiv: Interactive Self-supervised Neural Implicit Isotropic Volume Reconstruction,” in 1st International Workshop on Efficient Medical Artificial Intelligence, Daejeon, South Korea, 2026, vol. 16318, pp. 257–267.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
2026 |
Published |
Conference Paper |
IST-REx-ID: 21374 |
T. Antić et al., “Edge-constrained Hamiltonian paths on a point set,” in 51st International Conference on Current Trends in Theory and Practice of Computer Science, Krakow, Poland, 2026, vol. 16448, pp. 532–546.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2026 |
Published |
Conference Paper |
IST-REx-ID: 21410 |
A. Jabal Ameli, F. Motiei, and M. Saghafian, “On the MST-ratio: Theoretical bounds and complexity of finding the maximum,” in 20th International Conference and Workshops on Algorithms and Computation, Perugia, Italy, 2026, vol. 16444, pp. 386–401.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2026 |
Published |
Conference Paper |
IST-REx-ID: 21134 |
M. A. Baig and K. Z. Pietrzak, “On the (in)security of Proofs-of-space based longest-chain blockchains,” in 29th International Conference on Financial Cryptography and Data Security, Miyakojima, Japan, 2026, vol. 15752, pp. 127–142.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
2025 |
Published |
Conference Paper |
IST-REx-ID: 20189 |
N. Froleyks, E. Yu, M. Preiner, A. Biere, and K. Heljanko, “Introducing certificates to the hardware model checking competition,” in 37th International Conference on Computer Aided Verification, Zagreb, Croatia, 2025, vol. 15931, pp. 281–295.
[Published Version]
View
| Files available
| DOI
| WoS
2025 |
Published |
Conference Paper |
IST-REx-ID: 20225 |
T. A. Henzinger, K. Mallik, P. Sadeghi, and D. Zikelic, “Supermartingale certificates for quantitative omega-regular verification and control,” in 37th International Conference on Computer Aided Verification, Zagreb, Croatia, 2025, vol. 15932, pp. 29–55.
[Published Version]
View
| Files available
| DOI
| WoS
| arXiv
2025 |
Published |
Conference Paper |
IST-REx-ID: 20610
T. Meggendorfer, M. Weininger, and P. Wienhöft, “What are the odds? Improving statistical model checking of Markov decision processes,” in Second International Joint Conference on QEST+FORMATS, Aarhus, Denmark, 2025, vol. 16143, pp. 195–218.
View
| DOI
2025 |
Published |
Conference Paper |
IST-REx-ID: 20648 |
K. Chatterjee et al., “PolyQEnt: A polynomial quantified entailment solver,” in 23rd International Symposium on Automated Technology for Verification and Analysis, Bengaluru, India, 2025, vol. 16145, pp. 411–424.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2025 |
Published |
Conference Paper |
IST-REx-ID: 20658 |
H. Edelsbrunner, E. R. Stephenson, and M. H. Thoresen, “The mid-sphere cousin of the medial axis transform,” in 4th International Joint Conference on Discrete Geometry and Mathematical Morphology, Groningen, The Netherlands, 2025, vol. 16296, pp. 133–147.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2025 |
Published |
Book Chapter |
IST-REx-ID: 20723 |
E. Bartocci, T. A. Henzinger, D. Nickovic, and A. Oliveira da Costa, “Information-Flow Interfaces and Security Lattices,” in Engineering Safe and Trustworthy Cyber Physical Systems, vol. 15471, Cham: Springer Nature, 2025, pp. 251–263.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| arXiv
2025 |
Published |
Conference Paper |
IST-REx-ID: 19375 |
M. Azeem et al., “1–2–3–Go! Policy synthesis for parameterized Markov decision processes via decision-tree learning and generalization,” in 26th International Conference on Verification, Model Checking, and Abstract Interpretation, Denver, CO, United States, 2025, vol. 15530, pp. 97–120.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
2025 |
Published |
Conference Paper |
IST-REx-ID: 19445 |
J. M. Křišťan and J. Svoboda, “Reconfiguration using generalized token jumping,” in 19th International Conference and Workshops on Algorithms and Computation, Chengdu, China, 2025, vol. 15411, pp. 244–265.
[Preprint]
View
| DOI
| Download Preprint (ext.)
| WoS
| arXiv
2025 |
Published |
Conference Paper |
IST-REx-ID: 19600 |
Z. Avarikioti, M. Bastankhah, M. A. Maddah-Ali, K. Z. Pietrzak, J. Svoboda, and M. X. Yeo, “Route discovery in private payment channel networks,” in Computer Security. ESORICS 2024 International Workshops, Bydgoszcz, Poland, 2025, vol. 15263, pp. 207–223.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2025 |
Published |
Conference Paper |
IST-REx-ID: 19712 |
M. Cueto Noval, S.-P. Merz, P. Stählin, and A. Ünal, “On the soundness of algebraic attacks against code-based assumptions,” in 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, 2025, vol. 15606, pp. 385–415.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2025 |
Conference Paper |
IST-REx-ID: 19738 |
A. Acharya, K. Azari, M. A. Baig, D. Hofheinz, and C. Kamath, “Securely instantiating ‘Half Gates’ garbling in the standard model,” in 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Roros, Norway, 2025, vol. 15677, pp. 37–75.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2025 |
Published |
Conference Paper |
IST-REx-ID: 19739 |
M. Chalupa and C. Richter, “BUBAAK: Dynamic cooperative verification,” in 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Hamilton, ON, Canada, 2025, vol. 15698, pp. 212–216.
[Published Version]
View
| Files available
| DOI
2025 |
Published |
Conference Paper |
IST-REx-ID: 19740 |
K. Chatterjee, M. Jafariraviz, R. J. Saona Urmeneta, and J. Svoboda, “Value iteration with guessing for Markov chains and Markov decision processes,” in 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Hamilton, ON, Canada, 2025, vol. 15697, pp. 217–236.
[Published Version]
View
| Files available
| DOI
| arXiv
2025 |
Published |
Conference Paper |
IST-REx-ID: 19742 |
C. E. Budde, A. Hartmanns, T. Meggendorfer, M. Weininger, and P. Wienhöft, “Sound statistical model checking for probabilities and expected rewards,” in 31st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Hamilton, ON, Canada, 2025, vol. 15696, pp. 167–190.
[Published Version]
View
| Files available
| DOI
| arXiv