Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

35 Publications


2022 | Conference Paper | IST-REx-ID: 12168 | OA
Be aware of your leaders
Cohen, Shir, Be aware of your leaders. International Conference on Financial Cryptography and Data Security 13411. 2022
View | DOI | Download Preprint (ext.) | arXiv
 

2022 | Conference Paper | IST-REx-ID: 12167 | OA
Hide & Seek: Privacy-preserving rebalancing on payment channel networks
Avarikioti, Georgia, Hide & Seek: Privacy-preserving rebalancing on payment channel networks. Financial Cryptography and Data Security 13411. 2022
View | DOI | Download Preprint (ext.) | arXiv
 

2022 | Conference Paper | IST-REx-ID: 12170
PET – A partial exploration tool for probabilistic verification
Meggendorfer, Tobias, PET – A partial exploration tool for probabilistic verification. 20th International Symposium on Automated Technology for Verification and Analysis 13505. 2022
View | DOI
 

2022 | Conference Paper | IST-REx-ID: 12175 | OA
History-deterministic timed automata are not determinizable
S. Bose, T.A. Henzinger, K. Lehtinen, S. Schewe, P. Totzke, in:, 16th International Conference on Reachability Problems, Springer Nature, 2022, pp. 67–76.
View | DOI | Download Preprint (ext.)
 

2022 | Conference Paper | IST-REx-ID: 12176 | OA
Practical statistically-sound proofs of exponentiation in any group
C. Hoffmann, P. Hubáček, C. Kamath, K. Klein, K.Z. Pietrzak, in:, Advances in Cryptology – CRYPTO 2022, Springer Nature, 2022, pp. 370–399.
View | DOI | Download Preprint (ext.)
 

2022 | Conference Paper | IST-REx-ID: 12298 | OA
Jolteon and ditto: Network-adaptive efficient consensus with asynchronous fallback
R. Gelashvili, E. Kokoris Kogias, A. Sonnino, A. Spiegelman, Z. Xiang, in:, Financial Cryptography and Data Security, Springer Nature, 2022, pp. 296–315.
View | DOI | Download Preprint (ext.) | arXiv
 

2022 | Conference Paper | IST-REx-ID: 12302 | OA
FORQ-based language inclusion formal testing
K. Doveri, P. Ganty, N.A. Mazzocchi, in:, Computer Aided Verification, Springer Nature, 2022, pp. 109–129.
View | Files available | DOI | arXiv
 

2021 | Conference Paper | IST-REx-ID: 10041 | OA
Limits on the Adaptive Security of Yao’s Garbling
C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, D. Wichs, in:, 41st Annual International Cryptology Conference, Part II , Springer Nature, Cham, 2021, pp. 486–515.
View | Files available | DOI | Download Preprint (ext.)
 

2020 | Conference Paper | IST-REx-ID: 7966 | OA
Everybody’s a target: Scalability in public-key encryption
B. Auerbach, F. Giacon, E. Kiltz, in:, Advances in Cryptology – EUROCRYPT 2020, Springer Nature, 2020, pp. 475–506.
View | DOI | Download Submitted Version (ext.)
 

2020 | Conference Paper | IST-REx-ID: 8195 | OA
Refinement for structured concurrent programs
B. Kragl, S. Qadeer, T.A. Henzinger, in:, Computer Aided Verification, Springer Nature, 2020, pp. 275–298.
View | Files available | DOI
 

2020 | Book Chapter | IST-REx-ID: 10865 | OA
Witness maps and applications
S. Chakraborty, M. Prabhakaran, D. Wichs, in:, A. Kiayias (Ed.), Public-Key Cryptography, Springer Nature, Cham, 2020, pp. 220–246.
View | DOI | Download Preprint (ext.)
 

2020 | Conference Paper | IST-REx-ID: 8623 | OA
Monitorability under assumptions
T.A. Henzinger, N.E. Sarac, in:, Runtime Verification, Springer Nature, 2020, pp. 3–18.
View | Files available | DOI
 

2020 | Conference Paper | IST-REx-ID: 8732
Inserting one edge into a simple drawing is hard
A.M. Arroyo Guevara, F. Klute, I. Parada, R. Seidel, B. Vogtenhuber, T. Wiedera, in:, Graph-Theoretic Concepts in Computer Science, Springer Nature, 2020, pp. 325–338.
View | DOI
 

2020 | Conference Paper | IST-REx-ID: 8728 | OA
Faster algorithms for quantitative analysis of MCs and MDPs with small treewidth
A. Asadi, K. Chatterjee, A.K. Goharshady, K. Mohammadi, A. Pavlogiannis, in:, Automated Technology for Verification and Analysis, Springer Nature, 2020, pp. 253–270.
View | Files available | DOI
 

2019 | Conference Paper | IST-REx-ID: 7411 | OA
Reversible proofs of sequential work
H.M. Abusalah, C. Kamath Hosdurg, K. Klein, K.Z. Pietrzak, M. Walter, in:, Advances in Cryptology – EUROCRYPT 2019, Springer International Publishing, 2019, pp. 277–291.
View | DOI | Download Submitted Version (ext.)
 

2019 | Conference Paper | IST-REx-ID: 6163
Rhombic dodecahedron grid—coordinate system and 3D digital object definitions
R. Biswas, G. Largeteau-Skapin, R. Zrour, E. Andres, in:, 21st IAPR International Conference on Discrete Geometry for Computer Imagery, Springer Berlin Heidelberg, Berlin, Heidelberg, 2019, pp. 27–37.
View | DOI
 

2019 | Conference Paper | IST-REx-ID: 6482 | OA
KS(conf): A light-weight test if a ConvNet operates outside of Its specifications
R. Sun, C. Lampert, in:, Springer Nature, 2019, pp. 244–259.
View | Files available | DOI | Download Preprint (ext.) | arXiv
 

2019 | Book Chapter | IST-REx-ID: 6726 | OA
Sampling the integers with low relative error
M. Walter, in:, J. Buchmann, A. Nitaj, T. Rachidi (Eds.), Progress in Cryptology – AFRICACRYPT 2019, Springer Nature, Cham, 2019, pp. 157–180.
View | DOI | Download Preprint (ext.)
 

2019 | Book Chapter | IST-REx-ID: 7453 | OA
Continuous-time models for system design and analysis
R. Alur, M. Giacobbe, T.A. Henzinger, K.G. Larsen, M. Mikučionis, in:, B. Steffen, G. Woeginger (Eds.), Computing and Software Science, Springer Nature, 2019, pp. 452–477.
View | DOI | Download Published Version (ext.)
 

2018 | Conference Paper | IST-REx-ID: 8298
Channels: Horizontal scaling and confidentiality on permissioned blockchains
E. Androulaki, C. Cachin, A. De Caro, E. Kokoris Kogias, in:, Computer Security, Springer Nature, 2018, pp. 111–131.
View | DOI
 

Filters and Search Terms

issn=1611-3349

Search

Filter Publications