Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
7091 Publications
2015 | Published | Conference Paper | IST-REx-ID: 1648 |

A quasipolynomial reduction for generalized selective decryption on trees
G. Fuchsbauer, Z. Jafargholi, K.Z. Pietrzak, in:, Springer, 2015, pp. 601–620.
[Submitted Version]
View
| Files available
| DOI
G. Fuchsbauer, Z. Jafargholi, K.Z. Pietrzak, in:, Springer, 2015, pp. 601–620.
2015 | Published | Conference Paper | IST-REx-ID: 1650 |

Condensed unpredictability
M. Skórski, A. Golovnev, K.Z. Pietrzak, in:, Springer, 2015, pp. 1046–1057.
[Published Version]
View
| Files available
| DOI
M. Skórski, A. Golovnev, K.Z. Pietrzak, in:, Springer, 2015, pp. 1046–1057.
2015 | Published | Conference Paper | IST-REx-ID: 1649 |

Efficient zero-knowledge proofs for commitments from learning with errors over rings
F. Benhamouda, S. Krenn, V. Lyubashevsky, K.Z. Pietrzak, 9326 (2015) 305–325.
[Published Version]
View
| Files available
| DOI
F. Benhamouda, S. Krenn, V. Lyubashevsky, K.Z. Pietrzak, 9326 (2015) 305–325.
2015 | Published | Conference Paper | IST-REx-ID: 1652 |

High parallel complexity graphs and memory-hard functions
J.F. Alwen, V. Serbinenko, in:, Proceedings of the 47th Annual ACM Symposium on Theory of Computing, ACM, 2015, pp. 595–603.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
J.F. Alwen, V. Serbinenko, in:, Proceedings of the 47th Annual ACM Symposium on Theory of Computing, ACM, 2015, pp. 595–603.
2015 | Published | Conference Paper | IST-REx-ID: 1651 |

Anonymous transferable e-cash
F. Baldimtsi, M. Chase, G. Fuchsbauer, M. Kohlweiss, in:, Public-Key Cryptography - PKC 2015, Springer, 2015, pp. 101–124.
[Published Version]
View
| DOI
| Download Published Version (ext.)
F. Baldimtsi, M. Chase, G. Fuchsbauer, M. Kohlweiss, in:, Public-Key Cryptography - PKC 2015, Springer, 2015, pp. 101–124.
2015 | Published | Conference Paper | IST-REx-ID: 1644 |

Query-complexity amplification for random oracles
G. Demay, P. Gazi, U. Maurer, B. Tackmann, in:, Springer, 2015, pp. 159–180.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
G. Demay, P. Gazi, U. Maurer, B. Tackmann, in:, Springer, 2015, pp. 159–180.
2015 | Published | Conference Paper | IST-REx-ID: 1672 |

Incoercible multi-party computation and universally composable receipt-free voting
J.F. Alwen, R. Ostrovsky, H. Zhou, V. Zikas, in:, Advances in Cryptology - CRYPTO 2015, Springer, 2015, pp. 763–780.
[Submitted Version]
View
| Files available
| DOI
J.F. Alwen, R. Ostrovsky, H. Zhou, V. Zikas, in:, Advances in Cryptology - CRYPTO 2015, Springer, 2015, pp. 763–780.
2015 | Published | Conference Paper | IST-REx-ID: 1671 |

The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC
P. Gazi, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2015, pp. 368–387.
[Submitted Version]
View
| Files available
| DOI
P. Gazi, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2015, pp. 368–387.
2015 | Published | Conference Paper | IST-REx-ID: 1669 |

The chain rule for HILL pseudoentropy, revisited
K.Z. Pietrzak, M. Skórski, 9230 (2015) 81–98.
[Submitted Version]
View
| Files available
| DOI
K.Z. Pietrzak, M. Skórski, 9230 (2015) 81–98.
2015 | Published | Conference Paper | IST-REx-ID: 1668 |

Relaxing full-codebook security: A refined analysis of key-length extension schemes
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, S. Tessaro, 9054 (2015) 319–341.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, S. Tessaro, 9054 (2015) 319–341.
2015 | Published | Conference Paper | IST-REx-ID: 1474 |

Policy privacy in cryptographic access control
A. Ferrara, G. Fuchsbauer, B. Liu, B. Warinschi, in:, IEEE, 2015, pp. 46–60.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
A. Ferrara, G. Fuchsbauer, B. Liu, B. Warinschi, in:, IEEE, 2015, pp. 46–60.
2015 | Published | Conference Paper | IST-REx-ID: 1732 |

Qualitative analysis of POMDPs with temporal logic specifications for robotics applications
K. Chatterjee, M. Chmelik, R. Gupta, A. Kanodia, in:, IEEE, 2015, pp. 325–330.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
K. Chatterjee, M. Chmelik, R. Gupta, A. Kanodia, in:, IEEE, 2015, pp. 325–330.
2015 | Published | Journal Article | IST-REx-ID: 1598 |

Average case analysis of the classical algorithm for Markov decision processes with Büchi objectives
K. Chatterjee, M. Joglekar, N. Shah, Theoretical Computer Science 573 (2015) 71–89.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
K. Chatterjee, M. Joglekar, N. Shah, Theoretical Computer Science 573 (2015) 71–89.
2015 | Published | Conference Paper | IST-REx-ID: 1498 |

The need for language support for fault-tolerant distributed systems
C. Dragoi, T.A. Henzinger, D. Zufferey, 32 (2015) 90–102.
[Published Version]
View
| Files available
| DOI
C. Dragoi, T.A. Henzinger, D. Zufferey, 32 (2015) 90–102.
2015 | Published | Journal Article | IST-REx-ID: 1823 |

Systematic discovery of drug interaction mechanisms
G. Chevereau, M.T. Bollenbach, Molecular Systems Biology 11 (2015).
[Published Version]
View
| Files available
| DOI
G. Chevereau, M.T. Bollenbach, Molecular Systems Biology 11 (2015).
2015 | Published | Journal Article | IST-REx-ID: 1810 |

Antimicrobial interactions: Mechanisms and implications for drug discovery and resistance evolution
M.T. Bollenbach, Current Opinion in Microbiology 27 (2015) 1–9.
[Published Version]
View
| Files available
| DOI
M.T. Bollenbach, Current Opinion in Microbiology 27 (2015) 1–9.
2015 | Published | Journal Article | IST-REx-ID: 1624 |

Cellular cooperation with shift updating and repulsion
A. Pavlogiannis, K. Chatterjee, B. Adlam, M. Nowak, Scientific Reports 5 (2015).
[Published Version]
View
| Files available
| DOI
A. Pavlogiannis, K. Chatterjee, B. Adlam, M. Nowak, Scientific Reports 5 (2015).
2015 | Published | Journal Article | IST-REx-ID: 1602 |

Faster algorithms for algebraic path properties in recursive state machines with constant treewidth
K. Chatterjee, R. Ibsen-Jensen, A. Pavlogiannis, P. Goyal, ACM SIGPLAN Notices 50 (2015) 97–109.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
K. Chatterjee, R. Ibsen-Jensen, A. Pavlogiannis, P. Goyal, ACM SIGPLAN Notices 50 (2015) 97–109.
2015 | Published | Technical Report | IST-REx-ID: 5441 |

Algorithms for algebraic path properties in concurrent systems of constant treewidth components
K. Chatterjee, R. Ibsen-Jensen, A.K. Goharshady, A. Pavlogiannis, Algorithms for Algebraic Path Properties in Concurrent Systems of Constant Treewidth Components, IST Austria, 2015.
[Published Version]
View
| Files available
| DOI
K. Chatterjee, R. Ibsen-Jensen, A.K. Goharshady, A. Pavlogiannis, Algorithms for Algebraic Path Properties in Concurrent Systems of Constant Treewidth Components, IST Austria, 2015.
2015 | Published | Technical Report | IST-REx-ID: 5442 |

Algorithms for algebraic path properties in concurrent systems of constant treewidth components
1 Anonymous, 2 Anonymous, 3 Anonymous, 4 Anonymous, Algorithms for Algebraic Path Properties in Concurrent Systems of Constant Treewidth Components, IST Austria, 2015.
[Published Version]
View
| Files available
1 Anonymous, 2 Anonymous, 3 Anonymous, 4 Anonymous, Algorithms for Algebraic Path Properties in Concurrent Systems of Constant Treewidth Components, IST Austria, 2015.