Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

204 Publications


2006 | Conference Paper | IST-REx-ID: 3215
Y. Dodis, K. Z. Pietrzak, and B. Przydatek, “Separating sources for encryption and secret sharing,” presented at the TCC: Theory of Cryptography Conference, 2006, vol. 3876, pp. 601–616.
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3217
K. Z. Pietrzak, “Composition implies adaptive security in minicrypt,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, 2006, vol. 4004, pp. 328–338.
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3216
K. Z. Pietrzak, “A tight bound for EMAC,” presented at the ICALP: Automata, Languages and Programming, 2006, vol. 4052, pp. 168–179.
View | DOI
 

2006 | Journal Article | IST-REx-ID: 3522
J. O’Neill, T. Senior, and J. L. Csicsvari, “Place-selective firing of CA1 pyramidal cells during sharp wave/ripple network patterns in exploratory behavior,” Neuron, vol. 49, no. 1. Elsevier, pp. 143–155, 2006.
View | DOI
 

2006 | Journal Article | IST-REx-ID: 3607
M. Turelli and N. H. Barton, “Will population bottlenecks and multilocus epistasis increase additive genetic variance?,” Evolution; International Journal of Organic Evolution, vol. 60, no. 9. Wiley-Blackwell, pp. 1763–1776, 2006.
View | DOI
 

Filters and Search Terms

year=2006

Search

Filter Publications