Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

6016 Publications


2014 | Journal Article | IST-REx-ID: 2852
Fischlin, Marc, Anja Lehmann, and Krzysztof Z Pietrzak. “Robust Multi-Property Combiners for Hash Functions.” Journal of Cryptology 27, no. 3 (2014): 397–428. https://doi.org/10.1007/s00145-013-9148-7.
View | Files available | DOI
 

2014 | Conference Paper | IST-REx-ID: 2905 | OA
Edelsbrunner, Herbert, and Dmitriy Morozovy. “Persistent Homology: Theory and Practice,” 31–50. European Mathematical Society Publishing House, 2014. https://doi.org/10.4171/120-1/3.
View | Files available | DOI
 

2014 | Journal Article | IST-REx-ID: 6319 | OA
Bretèche, Régis de la, and Timothy D Browning. “Contre-Exemples Au Principe de Hasse Pour Certains Tores Coflasques.” Journal de Théorie Des Nombres de Bordeaux 26, no. 1 (2014): 25–44. https://doi.org/10.5802/jtnb.857.
View | DOI | Download Preprint (ext.) | arXiv
 

2014 | Journal Article | IST-REx-ID: 6739 | OA
Mondelli, Marco, Hamed Hassani, and Rudiger Urbanke. “From Polar to Reed-Muller Codes: A Technique to Improve the Finite-Length Performance.” IEEE Transactions on Communications 62, no. 9 (2014): 3084–91. https://doi.org/10.1109/tcomm.2014.2345069.
View | DOI | Download Preprint (ext.) | arXiv
 

2014 | Conference Paper | IST-REx-ID: 6740 | OA
Mondelli, Marco, Rudiger Urbanke, and Hamed Hassani. “How to Achieve the Capacity of Asymmetric Channels.” In 52nd Annual Allerton Conference on Communication, Control, and Computing, 789–96. IEEE, 2014. https://doi.org/10.1109/allerton.2014.7028535.
View | Files available | DOI | Download Preprint (ext.) | arXiv
 

Search

Filter Publications