Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

4941 Publications


2020 | Conference Paper | IST-REx-ID: 7966 | OA
Auerbach B, Giacon F, Kiltz E. 2020. Everybody’s a target: Scalability in public-key encryption. Advances in Cryptology – EUROCRYPT 2020. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 12107, 475–506.
[Submitted Version] View | DOI | Download Submitted Version (ext.) | WoS
 

2020 | Conference Paper | IST-REx-ID: 8623 | OA
Henzinger TA, Sarac NE. 2020. Monitorability under assumptions. Runtime Verification. RV: Runtime Verification, LNCS, vol. 12399, 3–18.
[Submitted Version] View | Files available | DOI | WoS
 

2020 | Conference Paper | IST-REx-ID: 8732
Arroyo Guevara AM, Klute F, Parada I, Seidel R, Vogtenhuber B, Wiedera T. 2020. Inserting one edge into a simple drawing is hard. Graph-Theoretic Concepts in Computer Science. WG: Workshop on Graph-Theoretic Concepts in Computer Science, LNCS, vol. 12301, 325–338.
View | DOI
 

2020 | Book Chapter | IST-REx-ID: 10865 | OA
Chakraborty S, Prabhakaran M, Wichs D. 2020.Witness maps and applications. In: Public-Key Cryptography. vol. 12110, 220–246.
[Preprint] View | DOI | Download Preprint (ext.)
 

2020 | Journal Article | IST-REx-ID: 7611 | OA
Rademacher SAE. 2020. Central limit theorem for Bose gases interacting through singular potentials. Letters in Mathematical Physics. 110, 2143–2174.
[Published Version] View | Files available | DOI | WoS
 

Filters and Search Terms

extern<>1

Search

Filter Publications