Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

4181 Publications


2015 | Journal Article | IST-REx-ID: 1642 | OA
Fulek, Radoslav, Jan Kynčl, Igor Malinovič, and Dömötör Pálvölgyi. “Clustered Planarity Testing Revisited.” Electronic Journal of Combinatorics. Electronic Journal of Combinatorics, 2015. https://doi.org/10.37236/5002.
[Published Version] View | Files available | DOI | arXiv
 

2015 | Journal Article | IST-REx-ID: 1639 | OA
Maas, Jan, Martin Rumpf, Carola Schönlieb, and Stefan Simon. “A Generalized Model for Optimal Transport of Images Including Dissipation and Density Modulation.” ESAIM: Mathematical Modelling and Numerical Analysis. EDP Sciences, 2015. https://doi.org/10.1051/m2an/2015043.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 

2015 | Conference Paper | IST-REx-ID: 1646 | OA
Banerjee, Abishek, Georg Fuchsbauer, Chris Peikert, Krzysztof Z Pietrzak, and Sophie Stevens. “Key-Homomorphic Constrained Pseudorandom Functions.” In 12th Theory of Cryptography Conference, 9015:31–60. Springer Nature, 2015. https://doi.org/10.1007/978-3-662-46497-7_2.
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1648 | OA
Fuchsbauer, Georg, Zahra Jafargholi, and Krzysztof Z Pietrzak. “A Quasipolynomial Reduction for Generalized Selective Decryption on Trees,” 9215:601–20. Springer, 2015. https://doi.org/10.1007/978-3-662-47989-6_29.
[Submitted Version] View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1649 | OA
Benhamouda, Fabrice, Stephan Krenn, Vadim Lyubashevsky, and Krzysztof Z Pietrzak. “Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings.” Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-319-24174-6_16.
[Published Version] View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1644 | OA
Demay, Grégory, Peter Gazi, Ueli Maurer, and Björn Tackmann. “Query-Complexity Amplification for Random Oracles,” 9063:159–80. Springer, 2015. https://doi.org/10.1007/978-3-319-17470-9_10.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1647 | OA
Fuchsbauer, Georg, Christian Hanser, and Daniel Slamanig. “Practical Round-Optimal Blind Signatures in the Standard Model,” 9216:233–53. Springer, 2015. https://doi.org/10.1007/978-3-662-48000-7_12.
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1654 | OA
Gazi, Peter, Krzysztof Z Pietrzak, and Stefano Tessaro. “Generic Security of NMAC and HMAC with Input Whitening.” Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-662-48800-3_4.
[Submitted Version] View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1650 | OA
Skórski, Maciej, Alexander Golovnev, and Krzysztof Z Pietrzak. “Condensed Unpredictability ,” 9134:1046–57. Springer, 2015. https://doi.org/10.1007/978-3-662-47672-7_85.
[Published Version] View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1651 | OA
Baldimtsi, Foteini, Melissa Chase, Georg Fuchsbauer, and Markulf Kohlweiss. “Anonymous Transferable E-Cash.” In Public-Key Cryptography - PKC 2015, 9020:101–24. Springer, 2015. https://doi.org/10.1007/978-3-662-46447-2_5.
[Published Version] View | DOI | Download Published Version (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1652 | OA
Alwen, Joel F, and Vladimir Serbinenko. “High Parallel Complexity Graphs and Memory-Hard Functions.” In Proceedings of the 47th Annual ACM Symposium on Theory of Computing, 595–603. ACM, 2015. https://doi.org/10.1145/2746539.2746622.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1660 | OA
Brázdil, Tomáš, Stefan Kiefer, Antonín Kučera, and Petr Novotný. “Long-Run Average Behaviour of Probabilistic Vector Addition Systems,” 44–55. IEEE, 2015. https://doi.org/10.1109/LICS.2015.15.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 | Journal Article | IST-REx-ID: 1665 | OA
Landau D, Tausch E, Taylor Weiner A, Stewart C, Reiter J, Bahlo J, Kluth S, Božić I, Lawrence M, Böttcher S, Carter S, Cibulskis K, Mertens D, Sougnez C, Rosenberg M, Hess J, Edelmann J, Kless S, Kneba M, Ritgen M, Fink A, Fischer K, Gabriel S, Lander E, Nowak M, Döhner H, Hallek M, Neuberg D, Getz G, Stilgenbauer S, Wu C. 2015. Mutations driving CLL and their evolution in progression and relapse. Nature. 526(7574), 525–530.
[Submitted Version] View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 

2015 | Conference Paper | IST-REx-ID: 1667 | OA
Brázdil, Tomáš, L’Uboš Korenčiak, Jan Krčál, Petr Novotný, and Vojtěch Řehák. “Optimizing Performance of Continuous-Time Stochastic Systems Using Timeout Synthesis.” Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-319-22264-6_10.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 | Journal Article | IST-REx-ID: 1664 | OA
Barkley, Dwight, Baofang Song, Mukund Vasudevan, Grégoire M Lemoult, Marc Avila, and Björn Hof. “The Rise of Fully Turbulent Flow.” Nature. Nature Publishing Group, 2015. https://doi.org/10.1038/nature15701.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1672 | OA
Alwen, Joel F, Rafail Ostrovsky, Hongsheng Zhou, and Vassilis Zikas. “Incoercible Multi-Party Computation and Universally Composable Receipt-Free Voting.” In Advances in Cryptology - CRYPTO 2015, 9216:763–80. Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-662-48000-7_37.
[Submitted Version] View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1669 | OA
Pietrzak, Krzysztof Z, and Maciej Skórski. “The Chain Rule for HILL Pseudoentropy, Revisited.” Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-319-22174-8_5.
[Submitted Version] View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1671 | OA
Gazi, Peter, Krzysztof Z Pietrzak, and Stefano Tessaro. “The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC,” 9215:368–87. Springer, 2015. https://doi.org/10.1007/978-3-662-47989-6_18.
[Submitted Version] View | Files available | DOI
 

2015 | Journal Article | IST-REx-ID: 1673 | OA
Adlam, Ben, Krishnendu Chatterjee, and Martin Nowak. “Amplifiers of Selection.” Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences. Royal Society of London, 2015. https://doi.org/10.1098/rspa.2015.0114.
[Published Version] View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1668 | OA
Gazi, Peter, Jooyoung Lee, Yannick Seurin, John Steinberger, and Stefano Tessaro. “Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes.” Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-662-48116-5_16.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

Filters and Search Terms

oa=1

extern<>1

Search

Filter Publications