Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

7091 Publications


2015 | Published | Journal Article | IST-REx-ID: 1678 | OA
Light-assisted small-molecule screening against protein kinases
Á. Inglés Prieto, E. Gschaider-Reichhart, M. Muellner, M. Nowak, S. Nijman, M. Grusch, H.L. Janovjak, Nature Chemical Biology 11 (2015) 952–954.
[Submitted Version] View | Files available | DOI
 

2015 | Published | Journal Article | IST-REx-ID: 1614 | OA [Published Version] View | Files available | DOI | PubMed | Europe PMC
 

2015 | Published | Journal Article | IST-REx-ID: 1880 | OA
Superfluid behavior of a Bose-Einstein condensate in a random potential
M. Könenberg, T. Moser, R. Seiringer, J. Yngvason, New Journal of Physics 17 (2015).
[Published Version] View | Files available | DOI
 

2015 | Published | Journal Article | IST-REx-ID: 1555 | OA
Rich bifurcation structure in a two patch vaccination model
D. Knipl, P. Pilarczyk, G. Röst, SIAM Journal on Applied Dynamical Systems 14 (2015) 980–1017.
[Published Version] View | DOI | Download Published Version (ext.)
 

2015 | Published | Journal Article | IST-REx-ID: 1509 | OA
Embryo-lethal phenotypes in early abp1 mutants are due to disruption of the neighboring BSM gene
J. Michalko, M. Lukacisinova, M.T. Bollenbach, J. Friml, F1000 Research 4 (2015).
[Published Version] View | Files available | DOI
 

2015 | Published | Journal Article | IST-REx-ID: 1534 | OA
Transcriptional regulation of PIN genes by FOUR LIPS and MYB88 during Arabidopsis root gravitropism
H. Wang, K. Yang, J. Zou, L. Zhu, Z. Xie, M. Morita, M. Tasaka, J. Friml, E. Grotewold, T. Beeckman, S. Vanneste, F. Sack, J. Le, Nature Communications 6 (2015).
[Published Version] View | Files available | DOI
 

2015 | Published | Journal Article | IST-REx-ID: 1569 | OA
An early secretory pathway mediated by gnom-like 1 and gnom is essential for basal polarity establishment in Arabidopsis thaliana
S. Doyle, A. Haegera, T. Vain, A. Rigala, C. Viotti, M. Łangowskaa, Q. Maa, J. Friml, N. Raikhel, G. Hickse, S. Robert, PNAS 112 (2015) E806–E815.
[Published Version] View | DOI | Download Published Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1675 | OA
Proofs of space
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, in:, 35th Annual Cryptology Conference, Springer, 2015, pp. 585–605.
[Preprint] View | Files available | DOI | Download Preprint (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1646 | OA
Key-homomorphic constrained pseudorandom functions
A. Banerjee, G. Fuchsbauer, C. Peikert, K.Z. Pietrzak, S. Stevens, in:, 12th Theory of Cryptography Conference, Springer Nature, 2015, pp. 31–60.
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1654 | OA
Generic security of NMAC and HMAC with input whitening
P. Gazi, K.Z. Pietrzak, S. Tessaro, 9453 (2015) 85–109.
[Submitted Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1648 | OA
A quasipolynomial reduction for generalized selective decryption on trees
G. Fuchsbauer, Z. Jafargholi, K.Z. Pietrzak, in:, Springer, 2015, pp. 601–620.
[Submitted Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1650 | OA
Condensed unpredictability
M. Skórski, A. Golovnev, K.Z. Pietrzak, in:, Springer, 2015, pp. 1046–1057.
[Published Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1649 | OA
Efficient zero-knowledge proofs for commitments from learning with errors over rings
F. Benhamouda, S. Krenn, V. Lyubashevsky, K.Z. Pietrzak, 9326 (2015) 305–325.
[Published Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1652 | OA
High parallel complexity graphs and memory-hard functions
J.F. Alwen, V. Serbinenko, in:, Proceedings of the 47th Annual ACM Symposium on Theory of Computing, ACM, 2015, pp. 595–603.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1651 | OA
Anonymous transferable e-cash
F. Baldimtsi, M. Chase, G. Fuchsbauer, M. Kohlweiss, in:, Public-Key Cryptography - PKC 2015, Springer, 2015, pp. 101–124.
[Published Version] View | DOI | Download Published Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1644 | OA
Query-complexity amplification for random oracles
G. Demay, P. Gazi, U. Maurer, B. Tackmann, in:, Springer, 2015, pp. 159–180.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1672 | OA
Incoercible multi-party computation and universally composable receipt-free voting
J.F. Alwen, R. Ostrovsky, H. Zhou, V. Zikas, in:, Advances in Cryptology - CRYPTO 2015, Springer, 2015, pp. 763–780.
[Submitted Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1671 | OA
The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC
P. Gazi, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2015, pp. 368–387.
[Submitted Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1669 | OA
The chain rule for HILL pseudoentropy, revisited
K.Z. Pietrzak, M. Skórski, 9230 (2015) 81–98.
[Submitted Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1668 | OA
Relaxing full-codebook security: A refined analysis of key-length extension schemes
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, S. Tessaro, 9054 (2015) 319–341.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

Filters and Search Terms

oa=1

Search

Filter Publications

Display / Sort

Export / Embed