Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
4188 Publications
2016 | Conference Paper | IST-REx-ID: 1225 |
G. Fuchsbauer, C. Hanser, C. Kamath Hosdurg, and D. Slamanig, “Practical round-optimal blind signatures in the standard model from weaker assumptions,” presented at the SCN: Security and Cryptography for Networks, Amalfi, Italy, 2016, vol. 9841, pp. 391–408.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
2016 | Conference Paper | IST-REx-ID: 1653 |
T. Okamoto, K. Z. Pietrzak, B. Waters, and D. Wichs, “New realizations of somewhere statistically binding hashing and positional accumulators,” presented at the ASIACRYPT: Theory and Application of Cryptology and Information Security, Auckland, New Zealand, 2016, vol. 9452, pp. 121–145.
[Submitted Version]
View
| Files available
| DOI
2016 | Journal Article | IST-REx-ID: 1705 |
S. Bogomolov et al., “Guided search for hybrid systems based on coarse-grained space abstractions,” International Journal on Software Tools for Technology Transfer, vol. 18, no. 4. Springer, pp. 449–467, 2016.
[Published Version]
View
| Files available
| DOI
2016 | Journal Article | IST-REx-ID: 1833 |
A. Klimova and T. Rudas, “On the closure of relational models,” Journal of Multivariate Analysis, vol. 143. Elsevier, pp. 440–452, 2016.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2016 | Journal Article | IST-REx-ID: 1881 |
J. Lee and K. Schnelli, “Extremal eigenvalues and eigenvectors of deformed Wigner matrices,” Probability Theory and Related Fields, vol. 164, no. 1–2. Springer, pp. 165–241, 2016.
[Preprint]
View
| DOI
| Download Preprint (ext.)