Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
5859 Publications
2015 |Published| Conference Paper | IST-REx-ID: 1646 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Key-homomorphic constrained pseudorandom functions
A. Banerjee, G. Fuchsbauer, C. Peikert, K.Z. Pietrzak, S. Stevens, in:, 12th Theory of Cryptography Conference, Springer Nature, 2015, pp. 31–60.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
A. Banerjee, G. Fuchsbauer, C. Peikert, K.Z. Pietrzak, S. Stevens, in:, 12th Theory of Cryptography Conference, Springer Nature, 2015, pp. 31–60.
2015 |Published| Conference Paper | IST-REx-ID: 1648 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
A quasipolynomial reduction for generalized selective decryption on trees
G. Fuchsbauer, Z. Jafargholi, K.Z. Pietrzak, in:, Springer, 2015, pp. 601–620.
[Submitted Version]
View
| Files available
| DOI
G. Fuchsbauer, Z. Jafargholi, K.Z. Pietrzak, in:, Springer, 2015, pp. 601–620.
2015 |Published| Conference Paper | IST-REx-ID: 1649 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Efficient zero-knowledge proofs for commitments from learning with errors over rings
F. Benhamouda, S. Krenn, V. Lyubashevsky, K.Z. Pietrzak, 9326 (2015) 305–325.
[Published Version]
View
| Files available
| DOI
F. Benhamouda, S. Krenn, V. Lyubashevsky, K.Z. Pietrzak, 9326 (2015) 305–325.
2015 |Published| Conference Paper | IST-REx-ID: 1644 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Query-complexity amplification for random oracles
G. Demay, P. Gazi, U. Maurer, B. Tackmann, in:, Springer, 2015, pp. 159–180.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
G. Demay, P. Gazi, U. Maurer, B. Tackmann, in:, Springer, 2015, pp. 159–180.
2015 |Published| Conference Paper | IST-REx-ID: 1647 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Practical round-optimal blind signatures in the standard model
G. Fuchsbauer, C. Hanser, D. Slamanig, in:, Springer, 2015, pp. 233–253.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
G. Fuchsbauer, C. Hanser, D. Slamanig, in:, Springer, 2015, pp. 233–253.
2015 |Published| Conference Paper | IST-REx-ID: 1654 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Generic security of NMAC and HMAC with input whitening
P. Gazi, K.Z. Pietrzak, S. Tessaro, 9453 (2015) 85–109.
[Submitted Version]
View
| Files available
| DOI
P. Gazi, K.Z. Pietrzak, S. Tessaro, 9453 (2015) 85–109.
2015 |Published| Conference Paper | IST-REx-ID: 1650 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Condensed unpredictability
M. Skórski, A. Golovnev, K.Z. Pietrzak, in:, Springer, 2015, pp. 1046–1057.
[Published Version]
View
| Files available
| DOI
M. Skórski, A. Golovnev, K.Z. Pietrzak, in:, Springer, 2015, pp. 1046–1057.
2015 |Published| Conference Paper | IST-REx-ID: 1651 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Anonymous transferable e-cash
F. Baldimtsi, M. Chase, G. Fuchsbauer, M. Kohlweiss, in:, Public-Key Cryptography - PKC 2015, Springer, 2015, pp. 101–124.
[Published Version]
View
| DOI
| Download Published Version (ext.)
F. Baldimtsi, M. Chase, G. Fuchsbauer, M. Kohlweiss, in:, Public-Key Cryptography - PKC 2015, Springer, 2015, pp. 101–124.
2015 |Published| Conference Paper | IST-REx-ID: 1652 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
High parallel complexity graphs and memory-hard functions
J.F. Alwen, V. Serbinenko, in:, Proceedings of the 47th Annual ACM Symposium on Theory of Computing, ACM, 2015, pp. 595–603.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
J.F. Alwen, V. Serbinenko, in:, Proceedings of the 47th Annual ACM Symposium on Theory of Computing, ACM, 2015, pp. 595–603.
2015 |Published| Conference Paper | IST-REx-ID: 1660 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Long-run average behaviour of probabilistic vector addition systems
T. Brázdil, S. Kiefer, A. Kučera, P. Novotný, in:, IEEE, 2015, pp. 44–55.
[Preprint]
View
| DOI
| Download Preprint (ext.)
T. Brázdil, S. Kiefer, A. Kučera, P. Novotný, in:, IEEE, 2015, pp. 44–55.
2015 |Published| Journal Article | IST-REx-ID: 1665 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Mutations driving CLL and their evolution in progression and relapse
Landau D, Tausch E, Taylor Weiner A, Stewart C, Reiter J, Bahlo J, Kluth S, Božić I, Lawrence M, Böttcher S, Carter S, Cibulskis K, Mertens D, Sougnez C, Rosenberg M, Hess J, Edelmann J, Kless S, Kneba M, Ritgen M, Fink A, Fischer K, Gabriel S, Lander E, Nowak M, Döhner H, Hallek M, Neuberg D, Getz G, Stilgenbauer S, Wu C. 2015. Mutations driving CLL and their evolution in progression and relapse. Nature. 526(7574), 525–530.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| PubMed | Europe PMC
Landau D, Tausch E, Taylor Weiner A, Stewart C, Reiter J, Bahlo J, Kluth S, Božić I, Lawrence M, Böttcher S, Carter S, Cibulskis K, Mertens D, Sougnez C, Rosenberg M, Hess J, Edelmann J, Kless S, Kneba M, Ritgen M, Fink A, Fischer K, Gabriel S, Lander E, Nowak M, Döhner H, Hallek M, Neuberg D, Getz G, Stilgenbauer S, Wu C. 2015. Mutations driving CLL and their evolution in progression and relapse. Nature. 526(7574), 525–530.
2015 |Published| Conference Paper | IST-REx-ID: 1667 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Optimizing performance of continuous-time stochastic systems using timeout synthesis
T. Brázdil, L. Korenčiak, J. Krčál, P. Novotný, V. Řehák, 9259 (2015) 141–159.
[Preprint]
View
| DOI
| Download Preprint (ext.)
T. Brázdil, L. Korenčiak, J. Krčál, P. Novotný, V. Řehák, 9259 (2015) 141–159.
2015 |Published| Journal Article | IST-REx-ID: 1664 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
The rise of fully turbulent flow
D. Barkley, B. Song, M. Vasudevan, G.M. Lemoult, M. Avila, B. Hof, Nature 526 (2015) 550–553.
[Preprint]
View
| DOI
| Download Preprint (ext.)
D. Barkley, B. Song, M. Vasudevan, G.M. Lemoult, M. Avila, B. Hof, Nature 526 (2015) 550–553.
2015 |Published| Conference Paper | IST-REx-ID: 1672 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Incoercible multi-party computation and universally composable receipt-free voting
J.F. Alwen, R. Ostrovsky, H. Zhou, V. Zikas, in:, Advances in Cryptology - CRYPTO 2015, Springer, 2015, pp. 763–780.
[Submitted Version]
View
| Files available
| DOI
J.F. Alwen, R. Ostrovsky, H. Zhou, V. Zikas, in:, Advances in Cryptology - CRYPTO 2015, Springer, 2015, pp. 763–780.
2015 |Published| Conference Paper | IST-REx-ID: 1669 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
The chain rule for HILL pseudoentropy, revisited
K.Z. Pietrzak, M. Skórski, 9230 (2015) 81–98.
[Submitted Version]
View
| Files available
| DOI
K.Z. Pietrzak, M. Skórski, 9230 (2015) 81–98.
2015 |Published| Conference Paper | IST-REx-ID: 1671 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC
P. Gazi, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2015, pp. 368–387.
[Submitted Version]
View
| Files available
| DOI
P. Gazi, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2015, pp. 368–387.
2015 |Published| Journal Article | IST-REx-ID: 1673 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Amplifiers of selection
B. Adlam, K. Chatterjee, M. Nowak, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 471 (2015).
[Published Version]
View
| Files available
| DOI
B. Adlam, K. Chatterjee, M. Nowak, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 471 (2015).
2015 |Published| Conference Paper | IST-REx-ID: 1668 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Relaxing full-codebook security: A refined analysis of key-length extension schemes
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, S. Tessaro, 9054 (2015) 319–341.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, S. Tessaro, 9054 (2015) 319–341.
2015 |Published| Journal Article | IST-REx-ID: 1674 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Edge universality for deformed Wigner matrices
J. Lee, K. Schnelli, Reviews in Mathematical Physics 27 (2015).
[Preprint]
View
| DOI
| Download Preprint (ext.)
J. Lee, K. Schnelli, Reviews in Mathematical Physics 27 (2015).
2015 |Published| Journal Article | IST-REx-ID: 1679 |
![Open access file OA](https://research-explorer.ista.ac.at/images/access_open.png)
Taylor's Forest
G.M. Lemoult, P. Maier, B. Hof, Physics of Fluids 27 (2015).
[Published Version]
View
| Files available
| DOI
G.M. Lemoult, P. Maier, B. Hof, Physics of Fluids 27 (2015).