Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
10763 Publications
2015 | Published | Journal Article | IST-REx-ID: 1562
Auxin-binding pocket of ABP1 is crucial for its gain-of-function cellular and developmental roles
P. Grones, X. Chen, S. Simon, W. Kaufmann, R. De Rycke, T. Nodzyński, E. Zažímalová, J. Friml, Journal of Experimental Botany 66 (2015) 5055–5065.
View
| DOI
P. Grones, X. Chen, S. Simon, W. Kaufmann, R. De Rycke, T. Nodzyński, E. Zažímalová, J. Friml, Journal of Experimental Botany 66 (2015) 5055–5065.
2015 | Published | Journal Article | IST-REx-ID: 1569 |

An early secretory pathway mediated by gnom-like 1 and gnom is essential for basal polarity establishment in Arabidopsis thaliana
S. Doyle, A. Haegera, T. Vain, A. Rigala, C. Viotti, M. Łangowskaa, Q. Maa, J. Friml, N. Raikhel, G. Hickse, S. Robert, PNAS 112 (2015) E806–E815.
[Published Version]
View
| DOI
| Download Published Version (ext.)
S. Doyle, A. Haegera, T. Vain, A. Rigala, C. Viotti, M. Łangowskaa, Q. Maa, J. Friml, N. Raikhel, G. Hickse, S. Robert, PNAS 112 (2015) E806–E815.
2015 | Published | Journal Article | IST-REx-ID: 1819
Osmotic stress modulates the balance between exocytosis and clathrin mediated endocytosis in Arabidopsis thaliana
M. Zwiewka, T. Nodzyński, S. Robert, S. Vanneste, J. Friml, Molecular Plant 8 (2015) 1175–1187.
View
| DOI
M. Zwiewka, T. Nodzyński, S. Robert, S. Vanneste, J. Friml, Molecular Plant 8 (2015) 1175–1187.
2015 | Published | Journal Article | IST-REx-ID: 1865
Plant embryogenesis requires AUX/LAX-mediated auxin influx
H. Robert, W. Grunewald, M. Sauer, B. Cannoot, M. Soriano, R. Swarup, D. Weijers, M. Bennett, K. Boutilier, J. Friml, Development 142 (2015) 702–711.
View
| DOI
H. Robert, W. Grunewald, M. Sauer, B. Cannoot, M. Soriano, R. Swarup, D. Weijers, M. Bennett, K. Boutilier, J. Friml, Development 142 (2015) 702–711.
2015 | Published | Journal Article | IST-REx-ID: 1944
Intracellular trafficking and PIN-mediated cell polarity during tropic responses in plants
H. Rakusová, M. Fendrych, J. Friml, Current Opinion in Plant Biology 23 (2015) 116–123.
View
| DOI
H. Rakusová, M. Fendrych, J. Friml, Current Opinion in Plant Biology 23 (2015) 116–123.
2015 | Published | Conference Paper | IST-REx-ID: 1675 |

Proofs of space
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, in:, 35th Annual Cryptology Conference, Springer, 2015, pp. 585–605.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, in:, 35th Annual Cryptology Conference, Springer, 2015, pp. 585–605.
2015 | Published | Conference Paper | IST-REx-ID: 1646 |

Key-homomorphic constrained pseudorandom functions
A. Banerjee, G. Fuchsbauer, C. Peikert, K.Z. Pietrzak, S. Stevens, in:, 12th Theory of Cryptography Conference, Springer Nature, 2015, pp. 31–60.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
A. Banerjee, G. Fuchsbauer, C. Peikert, K.Z. Pietrzak, S. Stevens, in:, 12th Theory of Cryptography Conference, Springer Nature, 2015, pp. 31–60.
2015 | Published | Conference Paper | IST-REx-ID: 1654 |

Generic security of NMAC and HMAC with input whitening
P. Gazi, K.Z. Pietrzak, S. Tessaro, 9453 (2015) 85–109.
[Submitted Version]
View
| Files available
| DOI
P. Gazi, K.Z. Pietrzak, S. Tessaro, 9453 (2015) 85–109.
2015 | Published | Conference Paper | IST-REx-ID: 1648 |

A quasipolynomial reduction for generalized selective decryption on trees
G. Fuchsbauer, Z. Jafargholi, K.Z. Pietrzak, in:, Springer, 2015, pp. 601–620.
[Submitted Version]
View
| Files available
| DOI
G. Fuchsbauer, Z. Jafargholi, K.Z. Pietrzak, in:, Springer, 2015, pp. 601–620.
2015 | Published | Conference Paper | IST-REx-ID: 1650 |

Condensed unpredictability
M. Skórski, A. Golovnev, K.Z. Pietrzak, in:, Springer, 2015, pp. 1046–1057.
[Published Version]
View
| Files available
| DOI
M. Skórski, A. Golovnev, K.Z. Pietrzak, in:, Springer, 2015, pp. 1046–1057.
2015 | Published | Conference Paper | IST-REx-ID: 1649 |

Efficient zero-knowledge proofs for commitments from learning with errors over rings
F. Benhamouda, S. Krenn, V. Lyubashevsky, K.Z. Pietrzak, 9326 (2015) 305–325.
[Published Version]
View
| Files available
| DOI
F. Benhamouda, S. Krenn, V. Lyubashevsky, K.Z. Pietrzak, 9326 (2015) 305–325.
2015 | Published | Conference Paper | IST-REx-ID: 1652 |

High parallel complexity graphs and memory-hard functions
J.F. Alwen, V. Serbinenko, in:, Proceedings of the 47th Annual ACM Symposium on Theory of Computing, ACM, 2015, pp. 595–603.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
J.F. Alwen, V. Serbinenko, in:, Proceedings of the 47th Annual ACM Symposium on Theory of Computing, ACM, 2015, pp. 595–603.
2015 | Published | Conference Paper | IST-REx-ID: 1651 |

Anonymous transferable e-cash
F. Baldimtsi, M. Chase, G. Fuchsbauer, M. Kohlweiss, in:, Public-Key Cryptography - PKC 2015, Springer, 2015, pp. 101–124.
[Published Version]
View
| DOI
| Download Published Version (ext.)
F. Baldimtsi, M. Chase, G. Fuchsbauer, M. Kohlweiss, in:, Public-Key Cryptography - PKC 2015, Springer, 2015, pp. 101–124.
2015 | Published | Conference Paper | IST-REx-ID: 1644 |

Query-complexity amplification for random oracles
G. Demay, P. Gazi, U. Maurer, B. Tackmann, in:, Springer, 2015, pp. 159–180.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
G. Demay, P. Gazi, U. Maurer, B. Tackmann, in:, Springer, 2015, pp. 159–180.
2015 | Published | Conference Paper | IST-REx-ID: 1672 |

Incoercible multi-party computation and universally composable receipt-free voting
J.F. Alwen, R. Ostrovsky, H. Zhou, V. Zikas, in:, Advances in Cryptology - CRYPTO 2015, Springer, 2015, pp. 763–780.
[Submitted Version]
View
| Files available
| DOI
J.F. Alwen, R. Ostrovsky, H. Zhou, V. Zikas, in:, Advances in Cryptology - CRYPTO 2015, Springer, 2015, pp. 763–780.
2015 | Published | Conference Paper | IST-REx-ID: 1671 |

The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC
P. Gazi, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2015, pp. 368–387.
[Submitted Version]
View
| Files available
| DOI
P. Gazi, K.Z. Pietrzak, S. Tessaro, in:, Springer, 2015, pp. 368–387.
2015 | Published | Conference Paper | IST-REx-ID: 1669 |

The chain rule for HILL pseudoentropy, revisited
K.Z. Pietrzak, M. Skórski, 9230 (2015) 81–98.
[Submitted Version]
View
| Files available
| DOI
K.Z. Pietrzak, M. Skórski, 9230 (2015) 81–98.
2015 | Published | Conference Paper | IST-REx-ID: 1668 |

Relaxing full-codebook security: A refined analysis of key-length extension schemes
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, S. Tessaro, 9054 (2015) 319–341.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, S. Tessaro, 9054 (2015) 319–341.
2015 | Published | Conference Paper | IST-REx-ID: 1474 |

Policy privacy in cryptographic access control
A. Ferrara, G. Fuchsbauer, B. Liu, B. Warinschi, in:, IEEE, 2015, pp. 46–60.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
A. Ferrara, G. Fuchsbauer, B. Liu, B. Warinschi, in:, IEEE, 2015, pp. 46–60.
2015 | Published | Conference Paper | IST-REx-ID: 1732 |

Qualitative analysis of POMDPs with temporal logic specifications for robotics applications
K. Chatterjee, M. Chmelik, R. Gupta, A. Kanodia, in:, IEEE, 2015, pp. 325–330.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
K. Chatterjee, M. Chmelik, R. Gupta, A. Kanodia, in:, IEEE, 2015, pp. 325–330.