Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
9087 Publications
2012 | Conference Paper | IST-REx-ID: 3282 |
Dodis Y, Pietrzak KZ, Kiltz E, Wichs D. 2012. Message authentication, revisited. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 7237, 355–374.
[Submitted Version]
View
| Files available
| DOI
2012 | Conference Paper | IST-REx-ID: 3280 |
Pietrzak KZ. 2012. Subspace LWE. TCC: Theory of Cryptography Conference, LNCS, vol. 7194, 548–563.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2012 | Conference Paper | IST-REx-ID: 3281
Pietrzak KZ, Rosen A, Segev G. 2012. Lossy functions do not amplify well. TCC: Theory of Cryptography Conference, LNCS, vol. 7194, 458–475.
View
| DOI
| Download None (ext.)
2012 | Conference Paper | IST-REx-ID: 3284 |
Kolmogorov V, Živný S. 2012. The complexity of conservative valued CSPs. SODA: Symposium on Discrete Algorithms, 750–759.
View
| Download (ext.)
2012 | Journal Article | IST-REx-ID: 3317 |
Eggermann E, Bucurenciu I, Goswami S, Jonas PM. 2012. Nanodomain coupling between Ca(2+) channels and sensors of exocytosis at fast mammalian synapses. Nature Reviews Neuroscience. 13(1), 7–21.
[Submitted Version]
View
| Files available
| DOI
2012 | Journal Article | IST-REx-ID: 3115 |
Berberich E, Halperin D, Kerber M, Pogalnikova R. 2012. Deconstructing approximate offsets. Discrete & Computational Geometry. 48(4), 964–989.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv