Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.




4960 Publications

2015 | Journal Article | IST-REx-ID: 1639 | OA
Maas J, Rumpf M, Schönlieb C, Simon S. 2015. A generalized model for optimal transport of images including dissipation and density modulation. ESAIM: Mathematical Modelling and Numerical Analysis. 49(6), 1745–1769.
[Preprint] View | DOI | Download Preprint (ext.) | arXiv
 
2015 | Journal Article | IST-REx-ID: 1638
Sazanov LA. 2015. A giant molecular proton pump: structure and mechanism of respiratory complex I. Nature Reviews Molecular Cell Biology. 16(6), 375–388.
View | DOI
 
2015 | Conference Paper | IST-REx-ID: 1646 | OA
Banerjee A, Fuchsbauer G, Peikert C, Pietrzak KZ, Stevens S. 2015. Key-homomorphic constrained pseudorandom functions. 12th Theory of Cryptography Conference. TCC: Theory of Cryptography Conference, LNCS, vol. 9015, 31–60.
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 
2015 | Conference Paper | IST-REx-ID: 1648 | OA
Fuchsbauer G, Jafargholi Z, Pietrzak KZ. 2015. A quasipolynomial reduction for generalized selective decryption on trees. CRYPTO: International Cryptology Conference, LNCS, vol. 9215, 601–620.
[Submitted Version] View | Files available | DOI
 
2015 | Conference Paper | IST-REx-ID: 1649 | OA
Benhamouda F, Krenn S, Lyubashevsky V, Pietrzak KZ. 2015. Efficient zero-knowledge proofs for commitments from learning with errors over rings. 9326, 305–325.
[Published Version] View | Files available | DOI
 
2015 | Conference Paper | IST-REx-ID: 1644 | OA
Demay G, Gazi P, Maurer U, Tackmann B. 2015. Query-complexity amplification for random oracles. ICITS: International Conference on Information Theoretic Security, LNCS, vol. 9063, 159–180.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2015 | Conference Paper | IST-REx-ID: 1647 | OA
Fuchsbauer G, Hanser C, Slamanig D. 2015. Practical round-optimal blind signatures in the standard model. CRYPTO: International Cryptology Conference, LNCS, vol. 9216, 233–253.
[Submitted Version] View | Files available | DOI | Download Submitted Version (ext.)
 
2015 | Conference Paper | IST-REx-ID: 1645
Gazi P, Tessaro S. 2015. Secret-key cryptography from ideal primitives: A systematic verview. 2015 IEEE Information Theory Workshop. ITW 2015: IEEE Information Theory Workshop, 7133163.
View | DOI
 
2015 | Conference Paper | IST-REx-ID: 1654 | OA
Gazi P, Pietrzak KZ, Tessaro S. 2015. Generic security of NMAC and HMAC with input whitening. 9453, 85–109.
[Submitted Version] View | Files available | DOI
 
2015 | Conference Paper | IST-REx-ID: 1650 | OA
Skórski M, Golovnev A, Pietrzak KZ. 2015. Condensed unpredictability . ICALP: Automata, Languages and Programming, LNCS, vol. 9134, 1046–1057.
[Published Version] View | Files available | DOI
 
2015 | Conference Paper | IST-REx-ID: 1651 | OA
Baldimtsi F, Chase M, Fuchsbauer G, Kohlweiss M. 2015. Anonymous transferable e-cash. Public-Key Cryptography - PKC 2015. PKC: Public Key Crypography, LNCS, vol. 9020, 101–124.
[Published Version] View | DOI | Download Published Version (ext.)
 
2015 | Conference Paper | IST-REx-ID: 1652 | OA
Alwen JF, Serbinenko V. 2015. High parallel complexity graphs and memory-hard functions. Proceedings of the 47th annual ACM symposium on Theory of computing. STOC: Symposium on the Theory of Computing, 595–603.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
2015 | Conference Paper | IST-REx-ID: 1658
Bogomolov S, Henzinger TA, Podelski A, Ruess J, Schilling C. 2015. Adaptive moment closure for parameter inference of biochemical reaction networks. 9308, 77–89.
View | Files available | DOI
 
2015 | Conference Paper | IST-REx-ID: 1660 | OA
Brázdil T, Kiefer S, Kučera A, Novotný P. 2015. Long-run average behaviour of probabilistic vector addition systems. LICS: Logic in Computer Science, LICS, , 44–55.
[Preprint] View | DOI | Download Preprint (ext.)
 
2015 | Journal Article | IST-REx-ID: 1665 | OA
Landau D, Tausch E, Taylor Weiner A, Stewart C, Reiter J, Bahlo J, Kluth S, Božić I, Lawrence M, Böttcher S, Carter S, Cibulskis K, Mertens D, Sougnez C, Rosenberg M, Hess J, Edelmann J, Kless S, Kneba M, Ritgen M, Fink A, Fischer K, Gabriel S, Lander E, Nowak M, Döhner H, Hallek M, Neuberg D, Getz G, Stilgenbauer S, Wu C. 2015. Mutations driving CLL and their evolution in progression and relapse. Nature. 526(7574), 525–530.
[Submitted Version] View | DOI | Download Submitted Version (ext.) | PubMed | Europe PMC
 
2015 | Journal Article | IST-REx-ID: 1663
Kovács K, Steinmann M, Halfon O, Magistretti P, Cardinaux J. 2015. Complex regulation of CREB-binding protein by homeodomain-interacting protein kinase 2. Cellular Signalling. 27(11), 2252–2260.
[Published Version] View | Files available | DOI
 
2015 | Conference Paper | IST-REx-ID: 1667 | OA
Brázdil T, Korenčiak L, Krčál J, Novotný P, Řehák V. 2015. Optimizing performance of continuous-time stochastic systems using timeout synthesis. 9259, 141–159.
[Preprint] View | DOI | Download Preprint (ext.)
 
2015 | Journal Article | IST-REx-ID: 1664 | OA
Barkley D, Song B, Vasudevan M, Lemoult GM, Avila M, Hof B. 2015. The rise of fully turbulent flow. Nature. 526(7574), 550–553.
[Preprint] View | DOI | Download Preprint (ext.)
 
2015 | Conference Paper | IST-REx-ID: 1672 | OA
Alwen JF, Ostrovsky R, Zhou H, Zikas V. 2015. Incoercible multi-party computation and universally composable receipt-free voting. Advances in Cryptology - CRYPTO 2015. CRYPTO: International Cryptology ConferenceLecture Notes in Computer Science, LNCS, vol. 9216, 763–780.
[Submitted Version] View | Files available | DOI
 
2015 | Conference Paper | IST-REx-ID: 1669 | OA
Pietrzak KZ, Skórski M. 2015. The chain rule for HILL pseudoentropy, revisited. 9230, 81–98.
[Submitted Version] View | Files available | DOI
 

Filters and Search Terms

type<>research_data

Search

Filter Publications