Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

4178 Publications


2015 | Conference Paper | IST-REx-ID: 1648 | OA
A quasipolynomial reduction for generalized selective decryption on trees
G. Fuchsbauer, Z. Jafargholi, K.Z. Pietrzak, in:, Springer, 2015, pp. 601–620.
[Submitted Version] View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1649 | OA
Efficient zero-knowledge proofs for commitments from learning with errors over rings
F. Benhamouda, S. Krenn, V. Lyubashevsky, K.Z. Pietrzak, 9326 (2015) 305–325.
[Published Version] View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1644 | OA
Query-complexity amplification for random oracles
G. Demay, P. Gazi, U. Maurer, B. Tackmann, in:, Springer, 2015, pp. 159–180.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1647 | OA
Practical round-optimal blind signatures in the standard model
G. Fuchsbauer, C. Hanser, D. Slamanig, in:, Springer, 2015, pp. 233–253.
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1654 | OA
Generic security of NMAC and HMAC with input whitening
P. Gazi, K.Z. Pietrzak, S. Tessaro, 9453 (2015) 85–109.
[Submitted Version] View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1650 | OA
Condensed unpredictability
M. Skórski, A. Golovnev, K.Z. Pietrzak, in:, Springer, 2015, pp. 1046–1057.
[Published Version] View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1651 | OA
Anonymous transferable e-cash
F. Baldimtsi, M. Chase, G. Fuchsbauer, M. Kohlweiss, in:, Public-Key Cryptography - PKC 2015, Springer, 2015, pp. 101–124.
[Published Version] View | DOI | Download Published Version (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1652 | OA
High parallel complexity graphs and memory-hard functions
J.F. Alwen, V. Serbinenko, in:, Proceedings of the 47th Annual ACM Symposium on Theory of Computing, ACM, 2015, pp. 595–603.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1660 | OA
Long-run average behaviour of probabilistic vector addition systems
T. Brázdil, S. Kiefer, A. Kučera, P. Novotný, in:, IEEE, 2015, pp. 44–55.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 | Journal Article | IST-REx-ID: 1665 | OA
Mutations driving CLL and their evolution in progression and relapse
Landau D, Tausch E, Taylor Weiner A, Stewart C, Reiter J, Bahlo J, Kluth S, Božić I, Lawrence M, Böttcher S, Carter S, Cibulskis K, Mertens D, Sougnez C, Rosenberg M, Hess J, Edelmann J, Kless S, Kneba M, Ritgen M, Fink A, Fischer K, Gabriel S, Lander E, Nowak M, Döhner H, Hallek M, Neuberg D, Getz G, Stilgenbauer S, Wu C. 2015. Mutations driving CLL and their evolution in progression and relapse. Nature. 526(7574), 525–530.
[Submitted Version] View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 

2015 | Conference Paper | IST-REx-ID: 1667 | OA
Optimizing performance of continuous-time stochastic systems using timeout synthesis
T. Brázdil, L. Korenčiak, J. Krčál, P. Novotný, V. Řehák, 9259 (2015) 141–159.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 | Journal Article | IST-REx-ID: 1664 | OA
The rise of fully turbulent flow
D. Barkley, B. Song, M. Vasudevan, G.M. Lemoult, M. Avila, B. Hof, Nature 526 (2015) 550–553.
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1672 | OA
Incoercible multi-party computation and universally composable receipt-free voting
J.F. Alwen, R. Ostrovsky, H. Zhou, V. Zikas, in:, Advances in Cryptology - CRYPTO 2015, Springer, 2015, pp. 763–780.
[Submitted Version] View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1669 | OA
The chain rule for HILL pseudoentropy, revisited
K.Z. Pietrzak, M. Skórski, 9230 (2015) 81–98.
[Submitted Version] View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1671 | OA
The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC
P. Gazi, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2015, pp. 368–387.
[Submitted Version] View | Files available | DOI
 

2015 | Journal Article | IST-REx-ID: 1673 | OA
Amplifiers of selection
B. Adlam, K. Chatterjee, M. Nowak, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 471 (2015).
[Published Version] View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1668 | OA
Relaxing full-codebook security: A refined analysis of key-length extension schemes
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, S. Tessaro, 9054 (2015) 319–341.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 | Journal Article | IST-REx-ID: 1674 | OA
Edge universality for deformed Wigner matrices
J. Lee, K. Schnelli, Reviews in Mathematical Physics 27 (2015).
[Preprint] View | DOI | Download Preprint (ext.)
 

2015 | Journal Article | IST-REx-ID: 1679 | OA
Taylor's Forest
G.M. Lemoult, P. Maier, B. Hof, Physics of Fluids 27 (2015).
[Published Version] View | Files available | DOI
 

2015 | Journal Article | IST-REx-ID: 1687 | OA
Navigating in tissue mazes: Chemoattractant interpretation in complex environments
M. Sarris, M.K. Sixt, Current Opinion in Cell Biology 36 (2015) 93–102.
[Published Version] View | Files available | DOI
 

Filters and Search Terms

oa=1

extern<>1

Search

Filter Publications