Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

5874 Publications


2015 | Journal Article | IST-REx-ID: 1639 | OA
J. Maas, M. Rumpf, C. Schönlieb, and S. Simon, “A generalized model for optimal transport of images including dissipation and density modulation,” ESAIM: Mathematical Modelling and Numerical Analysis, vol. 49, no. 6, pp. 1745–1769, 2015.
View | DOI | Download Preprint (ext.) | arXiv
 

2015 | Journal Article | IST-REx-ID: 1640 | OA
M. Šimášková et al., “Cytokinin response factors regulate PIN-FORMED auxin transporters,” Nature Communications, vol. 6, 2015.
View | Files available | DOI
 

2015 | Journal Article | IST-REx-ID: 1642 | OA
R. Fulek, J. Kynčl, I. Malinovič, and D. Pálvölgyi, “Clustered planarity testing revisited,” Electronic Journal of Combinatorics, vol. 22, no. 4, 2015.
View | Files available
 

2015 | Conference Paper | IST-REx-ID: 1644 | OA
G. Demay, P. Gazi, U. Maurer, and B. Tackmann, “Query-complexity amplification for random oracles,” presented at the ICITS: International Conference on Information Theoretic Security, Lugano, Switzerland, 2015, vol. 9063, pp. 159–180.
View | DOI | Download Submitted Version (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1645
P. Gazi and S. Tessaro, “Secret-key cryptography from ideal primitives: A systematic verview,” in 2015 IEEE Information Theory Workshop, Jerusalem, Israel, 2015.
View | DOI
 

2015 | Conference Paper | IST-REx-ID: 1646 | OA
A. Banerjee, G. Fuchsbauer, C. Peikert, K. Z. Pietrzak, and S. Stevens, “Key-homomorphic constrained pseudorandom functions,” vol. 9015. Springer, pp. 31–60, 2015.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1647 | OA
G. Fuchsbauer, C. Hanser, and D. Slamanig, “Practical round-optimal blind signatures in the standard model,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States, 2015, vol. 9216, pp. 233–253.
View | Files available | DOI | Download Submitted Version (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1648 | OA
G. Fuchsbauer, Z. Jafargholi, and K. Z. Pietrzak, “A quasipolynomial reduction for generalized selective decryption on trees,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, USA, 2015, vol. 9215, pp. 601–620.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1649 | OA
F. Benhamouda, S. Krenn, V. Lyubashevsky, and K. Z. Pietrzak, “Efficient zero-knowledge proofs for commitments from learning with errors over rings,” vol. 9326. Springer, pp. 305–325, 2015.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1650 | OA
M. Skórski, A. Golovnev, and K. Z. Pietrzak, “Condensed unpredictability ,” presented at the ICALP: Automata, Languages and Programming, Kyoto, Japan, 2015, vol. 9134, pp. 1046–1057.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1651
F. Baldimtsi, M. Chase, G. Fuchsbauer, and M. Kohlweiss, “Anonymous transferable e-cash,” presented at the PKC: Public Key Crypography, Gaithersburg, MD, USA, 2015, vol. 9020, pp. 101–124.
View | DOI
 

2015 | Conference Paper | IST-REx-ID: 1652 | OA
J. F. Alwen and V. Serbinenko, “High parallel complexity graphs and memory-hard functions,” in Proceedings of the 47th annual ACM symposium on Theory of computing, Portland, OR, United States, 2015, pp. 595–603.
View | DOI | Download Submitted Version (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1654 | OA
P. Gazi, K. Z. Pietrzak, and S. Tessaro, “Generic security of NMAC and HMAC with input whitening,” vol. 9453. Springer, pp. 85–109, 2015.
View | Files available | DOI
 

2015 | Journal Article | IST-REx-ID: 1655 | OA
G. S. Martius and E. Olbrich, “Quantifying emergent behavior of autonomous robots,” Entropy, vol. 17, no. 10, pp. 7266–7297, 2015.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1656
K. Chatterjee, T. A. Henzinger, and J. Otop, “Nested weighted automata,” in Proceedings - Symposium on Logic in Computer Science, Kyoto, Japan, 2015, vol. 2015–July.
View | Files available | DOI | arXiv
 

2015 | Conference Paper | IST-REx-ID: 1657
K. Chatterjee, Z. Komárková, and J. Kretinsky, “Unifying two views on multiple mean-payoff objectives in Markov decision processes.” IEEE, pp. 244–256, 2015.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1658
S. Bogomolov, T. A. Henzinger, A. Podelski, J. Ruess, and C. Schilling, “Adaptive moment closure for parameter inference of biochemical reaction networks,” vol. 9308. Springer, pp. 77–89, 2015.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1659 | OA
U. Boker, T. A. Henzinger, and J. Otop, “The target discounted-sum problem,” in LICS, Kyoto, Japan, 2015, pp. 750–761.
View | Files available | DOI
 

2015 | Conference Paper | IST-REx-ID: 1660 | OA
T. Brázdil, S. Kiefer, A. Kučera, and P. Novotny, “Long-run average behaviour of probabilistic vector addition systems,” presented at the LICS: Logic in Computer Science, Kyoto, Japan, 2015, pp. 44–55.
View | DOI | Download Preprint (ext.)
 

2015 | Conference Paper | IST-REx-ID: 1661 | OA
K. Chatterjee, M. Henzinger, and V. Loitzenbauer, “Improved algorithms for one-pair and k-pair Streett objectives,” in Proceedings - Symposium on Logic in Computer Science, Kyoto, Japan, 2015, vol. 2015–July.
View | Files available | DOI | Download Submitted Version (ext.)
 

Search

Filter Publications