Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

2233 Publications


2015 | Conference Paper | IST-REx-ID: 1667 | OA
T. Brázdil, L. Korenčiak, J. Krčál, P. Novotny, and V. Řehák, “Optimizing performance of continuous-time stochastic systems using timeout synthesis,” vol. 9259. Springer, pp. 141–159, 2015.
View | DOI | Download Preprint (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1668 | OA
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, and S. Tessaro, “Relaxing full-codebook security: A refined analysis of key-length extension schemes,” vol. 9054. Springer, pp. 319–341, 2015.
View | DOI | Download Submitted Version (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1669 | OA
K. Z. Pietrzak and M. Skórski, “The chain rule for HILL pseudoentropy, revisited,” vol. 9230. Springer, pp. 81–98, 2015.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1671 | OA
P. Gazi, K. Z. Pietrzak, and S. Tessaro, “The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States, 2015, vol. 9215, pp. 368–387.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1672 | OA
J. F. Alwen, R. Ostrovsky, H. Zhou, and V. Zikas, “Incoercible multi-party computation and universally composable receipt-free voting,” vol. 9216. Springer, pp. 763–780, 2015.
View | Files available | DOI
 

Filters and Search Terms

oa=1

extern<>1

Search

Filter Publications