Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

10763 Publications


2015 | Published | Journal Article | IST-REx-ID: 1562
Grones P, Chen X, Simon S, Kaufmann W, De Rycke R, Nodzyński T, Zažímalová E, Friml J. 2015. Auxin-binding pocket of ABP1 is crucial for its gain-of-function cellular and developmental roles. Journal of Experimental Botany. 66(16), 5055–5065.
View | DOI
 

2015 | Published | Journal Article | IST-REx-ID: 1569 | OA
Doyle S, Haegera A, Vain T, Rigala A, Viotti C, Łangowskaa M, Maa Q, Friml J, Raikhel N, Hickse G, Robert S. 2015. An early secretory pathway mediated by gnom-like 1 and gnom is essential for basal polarity establishment in Arabidopsis thaliana. PNAS. 112(7), E806–E815.
[Published Version] View | DOI | Download Published Version (ext.)
 

2015 | Published | Journal Article | IST-REx-ID: 1819
Zwiewka M, Nodzyński T, Robert S, Vanneste S, Friml J. 2015. Osmotic stress modulates the balance between exocytosis and clathrin mediated endocytosis in Arabidopsis thaliana. Molecular Plant. 8(8), 1175–1187.
View | DOI
 

2015 | Published | Journal Article | IST-REx-ID: 1865
Robert H, Grunewald W, Sauer M, Cannoot B, Soriano M, Swarup R, Weijers D, Bennett M, Boutilier K, Friml J. 2015. Plant embryogenesis requires AUX/LAX-mediated auxin influx. Development. 142(4), 702–711.
View | DOI
 

2015 | Published | Journal Article | IST-REx-ID: 1944
Rakusová H, Fendrych M, Friml J. 2015. Intracellular trafficking and PIN-mediated cell polarity during tropic responses in plants. Current Opinion in Plant Biology. 23(2), 116–123.
View | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1675 | OA
Dziembowski S, Faust S, Kolmogorov V, Pietrzak KZ. 2015. Proofs of space. 35th Annual Cryptology Conference. CRYPTO: International Cryptology Conference, LNCS, vol. 9216, 585–605.
[Preprint] View | Files available | DOI | Download Preprint (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1646 | OA
Banerjee A, Fuchsbauer G, Peikert C, Pietrzak KZ, Stevens S. 2015. Key-homomorphic constrained pseudorandom functions. 12th Theory of Cryptography Conference. TCC: Theory of Cryptography Conference, LNCS, vol. 9015, 31–60.
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1654 | OA
Gazi P, Pietrzak KZ, Tessaro S. 2015. Generic security of NMAC and HMAC with input whitening. 9453, 85–109.
[Submitted Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1648 | OA
Fuchsbauer G, Jafargholi Z, Pietrzak KZ. 2015. A quasipolynomial reduction for generalized selective decryption on trees. CRYPTO: International Cryptology Conference, LNCS, vol. 9215, 601–620.
[Submitted Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1650 | OA
Skórski M, Golovnev A, Pietrzak KZ. 2015. Condensed unpredictability . ICALP: Automata, Languages and Programming, LNCS, vol. 9134, 1046–1057.
[Published Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1649 | OA
Benhamouda F, Krenn S, Lyubashevsky V, Pietrzak KZ. 2015. Efficient zero-knowledge proofs for commitments from learning with errors over rings. 9326, 305–325.
[Published Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1652 | OA
Alwen JF, Serbinenko V. 2015. High parallel complexity graphs and memory-hard functions. Proceedings of the 47th annual ACM symposium on Theory of computing. STOC: Symposium on the Theory of Computing, 595–603.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1651 | OA
Baldimtsi F, Chase M, Fuchsbauer G, Kohlweiss M. 2015. Anonymous transferable e-cash. Public-Key Cryptography - PKC 2015. PKC: Public Key Crypography, LNCS, vol. 9020, 101–124.
[Published Version] View | DOI | Download Published Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1644 | OA
Demay G, Gazi P, Maurer U, Tackmann B. 2015. Query-complexity amplification for random oracles. ICITS: International Conference on Information Theoretic Security, LNCS, vol. 9063, 159–180.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1672 | OA
Alwen JF, Ostrovsky R, Zhou H, Zikas V. 2015. Incoercible multi-party computation and universally composable receipt-free voting. Advances in Cryptology - CRYPTO 2015. CRYPTO: International Cryptology ConferenceLecture Notes in Computer Science, LNCS, vol. 9216, 763–780.
[Submitted Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1671 | OA
Gazi P, Pietrzak KZ, Tessaro S. 2015. The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC. CRYPTO: International Cryptology Conference, LNCS, vol. 9215, 368–387.
[Submitted Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1669 | OA
Pietrzak KZ, Skórski M. 2015. The chain rule for HILL pseudoentropy, revisited. 9230, 81–98.
[Submitted Version] View | Files available | DOI
 

2015 | Published | Conference Paper | IST-REx-ID: 1668 | OA
Gazi P, Lee J, Seurin Y, Steinberger J, Tessaro S. 2015. Relaxing full-codebook security: A refined analysis of key-length extension schemes. 9054, 319–341.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1474 | OA
Ferrara A, Fuchsbauer G, Liu B, Warinschi B. 2015. Policy privacy in cryptographic access control. CSF: Computer Security Foundations, 46–60.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 

2015 | Published | Conference Paper | IST-REx-ID: 1732 | OA
Chatterjee K, Chmelik M, Gupta R, Kanodia A. 2015. Qualitative analysis of POMDPs with temporal logic specifications for robotics applications. ICRA: International Conference on Robotics and Automation, 325–330.
[Preprint] View | Files available | DOI | Download Preprint (ext.) | arXiv
 

Search

Filter Publications

Display / Sort

Citation Style: ISTA Annual Report

Export / Embed