Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

10718 Publications


2015 | Published | Journal Article | IST-REx-ID: 1865
Robert H, Grunewald W, Sauer M, Cannoot B, Soriano M, Swarup R, Weijers D, Bennett M, Boutilier K, Friml J. 2015. Plant embryogenesis requires AUX/LAX-mediated auxin influx. Development. 142(4), 702–711.
View | DOI
 

2015 | Published | Journal Article | IST-REx-ID: 1944
Rakusová H, Fendrych M, Friml J. 2015. Intracellular trafficking and PIN-mediated cell polarity during tropic responses in plants. Current Opinion in Plant Biology. 23(2), 116–123.
View | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1645
Gazi, Peter, Secret-key cryptography from ideal primitives: A systematic verview. 2015 IEEE Information Theory Workshop. 2015
View | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1675 | OA
Dziembowski S, Faust S, Kolmogorov V, Pietrzak KZ. 2015. Proofs of space. 35th Annual Cryptology Conference. CRYPTO: International Cryptology Conference, LNCS, vol. 9216, 585–605.
[Preprint] View | Files available | DOI | Download Preprint (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1646 | OA
Banerjee A, Fuchsbauer G, Peikert C, Pietrzak KZ, Stevens S. 2015. Key-homomorphic constrained pseudorandom functions. 12th Theory of Cryptography Conference. TCC: Theory of Cryptography Conference, LNCS, vol. 9015, 31–60.
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1654 | OA
Gazi P, Pietrzak KZ, Tessaro S. 2015. Generic security of NMAC and HMAC with input whitening. 9453, 85–109.
[Submitted Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1648 | OA
Fuchsbauer G, Jafargholi Z, Pietrzak KZ. 2015. A quasipolynomial reduction for generalized selective decryption on trees. CRYPTO: International Cryptology Conference, LNCS, vol. 9215, 601–620.
[Submitted Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1650 | OA
Skórski M, Golovnev A, Pietrzak KZ. 2015. Condensed unpredictability . ICALP: Automata, Languages and Programming, LNCS, vol. 9134, 1046–1057.
[Published Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1649 | OA
Benhamouda F, Krenn S, Lyubashevsky V, Pietrzak KZ. 2015. Efficient zero-knowledge proofs for commitments from learning with errors over rings. 9326, 305–325.
[Published Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1652 | OA
Alwen JF, Serbinenko V. 2015. High parallel complexity graphs and memory-hard functions. Proceedings of the 47th annual ACM symposium on Theory of computing. STOC: Symposium on the Theory of Computing, 595–603.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1651 | OA
Baldimtsi F, Chase M, Fuchsbauer G, Kohlweiss M. 2015. Anonymous transferable e-cash. Public-Key Cryptography - PKC 2015. PKC: Public Key Crypography, LNCS, vol. 9020, 101–124.
[Published Version] View | DOI | Download Published Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1644 | OA
Demay G, Gazi P, Maurer U, Tackmann B. 2015. Query-complexity amplification for random oracles. ICITS: International Conference on Information Theoretic Security, LNCS, vol. 9063, 159–180.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1672 | OA
Alwen JF, Ostrovsky R, Zhou H, Zikas V. 2015. Incoercible multi-party computation and universally composable receipt-free voting. Advances in Cryptology - CRYPTO 2015. CRYPTO: International Cryptology ConferenceLecture Notes in Computer Science, LNCS, vol. 9216, 763–780.
[Submitted Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1671 | OA
Gazi P, Pietrzak KZ, Tessaro S. 2015. The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC. CRYPTO: International Cryptology Conference, LNCS, vol. 9215, 368–387.
[Submitted Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1669 | OA
Pietrzak KZ, Skórski M. 2015. The chain rule for HILL pseudoentropy, revisited. 9230, 81–98.
[Submitted Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1668 | OA
Gazi P, Lee J, Seurin Y, Steinberger J, Tessaro S. 2015. Relaxing full-codebook security: A refined analysis of key-length extension schemes. 9054, 319–341.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1474 | OA
Ferrara A, Fuchsbauer G, Liu B, Warinschi B. 2015. Policy privacy in cryptographic access control. CSF: Computer Security Foundations, 46–60.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1732 | OA
Chatterjee K, Chmelik M, Gupta R, Kanodia A. 2015. Qualitative analysis of POMDPs with temporal logic specifications for robotics applications. ICRA: International Conference on Robotics and Automation, 325–330.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 

2015 | Published | Journal Article | IST-REx-ID: 1598 | OA
Chatterjee K, Joglekar M, Shah N. 2015. Average case analysis of the classical algorithm for Markov decision processes with Büchi objectives. Theoretical Computer Science. 573(3), 71–89.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 

2015 | Published | Conference Paper | IST-REx-ID: 1498 | OA
Dragoi C, Henzinger TA, Zufferey D. 2015. The need for language support for fault-tolerant distributed systems. 32, 90–102.
[Published Version] View | Files available | DOI
 

Search

Filter Publications

Display / Sort

Citation Style: ISTA Annual Report

Export / Embed