Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
197 Publications
2006 | Conference Paper | IST-REx-ID: 3214
Luby Rackoff ciphers from weak round functions
U. Maurer, Y. Oswald, K.Z. Pietrzak, J. Sjödin, in:, Springer, 2006, pp. 391–408.
View
| DOI
U. Maurer, Y. Oswald, K.Z. Pietrzak, J. Sjödin, in:, Springer, 2006, pp. 391–408.
2006 | Conference Paper | IST-REx-ID: 3215
Separating sources for encryption and secret sharing
Y. Dodis, K.Z. Pietrzak, B. Przydatek, in:, Springer, 2006, pp. 601–616.
View
| DOI
Y. Dodis, K.Z. Pietrzak, B. Przydatek, in:, Springer, 2006, pp. 601–616.
2006 | Conference Paper | IST-REx-ID: 3216
A tight bound for EMAC
K.Z. Pietrzak, in:, Springer, 2006, pp. 168–179.
View
| DOI
K.Z. Pietrzak, in:, Springer, 2006, pp. 168–179.
2006 | Conference Paper | IST-REx-ID: 3217
Composition implies adaptive security in minicrypt
K.Z. Pietrzak, in:, Springer, 2006, pp. 328–338.
View
| DOI
K.Z. Pietrzak, in:, Springer, 2006, pp. 328–338.
2006 | Book Chapter | IST-REx-ID: 3404
Atomic force microscopy
H.L. Janovjak, R. Sawhney, M. Stark, D. Mueller, in:, Techniques in Microscopy for Biomedical Applications, World Scientific Publishing, 2006, pp. 213–284.
View
H.L. Janovjak, R. Sawhney, M. Stark, D. Mueller, in:, Techniques in Microscopy for Biomedical Applications, World Scientific Publishing, 2006, pp. 213–284.