Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

9113 Publications


2007 | Conference Paper | IST-REx-ID: 3223
Dodis, Y., & Pietrzak, K. Z. (2007). Improving the security of MACs via randomized message preprocessing (Vol. 4593, pp. 414–433). Presented at the FSE: Fast Software Encryption, Springer. https://doi.org/10.1007/978-3-540-74619-5_26
View | DOI
 

2007 | Conference Paper | IST-REx-ID: 3222
Pietrzak, K. Z., & Wikström, D. (2007). Parallel repetition of computationally sound protocols revisited (Vol. 4392, pp. 86–102). Presented at the TCC: Theory of Cryptography Conference, Springer. https://doi.org/10.1007/978-3-540-70936-7_5
View | DOI
 

2007 | Conference Paper | IST-REx-ID: 3220
Dziembowski, S., & Pietrzak, K. Z. (2007). Intrusion resilient secret sharing (pp. 227–237). Presented at the FOCS: Foundations of Computer Science, IEEE. https://doi.org/10.1109/FOCS.2007.63
View | DOI
 

2007 | Conference Paper | IST-REx-ID: 3219
Maurer, U., Pietrzak, K. Z., & Renner, R. (2007). Indistinguishability amplification (Vol. 4622, pp. 130–149). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/978-3-540-74143-5_8
View | DOI
 

2007 | Conference Paper | IST-REx-ID: 3221
Pietrzak, K. Z., & Sjödin, J. (2007). Range extension for weak PRFs the good the bad and the ugly (Vol. 4515, pp. 517–533). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/978-3-540-72540-4_30
View | DOI
 

2007 | Journal Article | IST-REx-ID: 3436
Reynolds, S., Dryer, K., Bollback, J. P., Uy, J. A., Patricelli, G., Robson, T., … Braun, M. (2007). Behavioral paternity predicts genetic paternity in satin bowerbirds, a species with a non-resource-based mating system. The Auk. University of California Press. https://doi.org/10.1642/0004-8038(2007)124[857:BPPGPI]2.0.CO;2
View | DOI
 

2007 | Book Chapter | IST-REx-ID: 3432
Bollback, J. P., Gardner, P., & Nielsen, R. (2007). Estimating the history of mutations on a phylogeny. In D. Liberles (Ed.), Ancestral Sequence Reconstruction (pp. 69–79). Oxford University Press. https://doi.org/10.1093/acprof:oso/9780199299188.003.0006
View | DOI
 

2007 | Journal Article | IST-REx-ID: 3450
Jonas, P. M., & Buzsáki, G. (2007). Neural inhibition. Scholarpedia. Scholarpedia. https://doi.org/10.4249/scholarpedia.3286
View | DOI
 

2007 | Conference Paper | IST-REx-ID: 3561 | OA
Attali, D., Edelsbrunner, H., & Mileyko, Y. (2007). Weak witnesses for Delaunay triangulations of submanifolds (pp. 143–150). Presented at the SPM: Symposium on Solid and Physical Modeling, ACM. https://doi.org/10.1145/1236246.1236267
View | DOI | Download (ext.)
 

2007 | Conference Paper | IST-REx-ID: 3681
Ulges, A., Lampert, C., Keysers, D., & Breuel, T. (2007). Optimal dominant motion estimation using adaptive search of transformation space (Vol. 4713, pp. 204–213). Presented at the DAGM: German Association For Pattern Recognition, Springer. https://doi.org/10.1007/978-3-540-74936-3_21
View | DOI
 

Search

Filter Publications