Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

6016 Publications


2005 | Conference Paper | IST-REx-ID: 3211
Bellare M, Pietrzak KZ, Rogaway P. 2005. Improved security analyses for CBC MACs. CRYPTO: International Cryptology Conference, LNCS, vol. 3621. 527–545.
View | DOI
 

2005 | Conference Paper | IST-REx-ID: 3212
Dodis Y, Oliveira R, Pietrzak KZ. 2005. On the generic insecurity of the full domain hash. CRYPTO: International Cryptology Conference, LNCS, vol. 3621. 449–466.
View | DOI
 

2005 | Conference Paper | IST-REx-ID: 3213
Pietrzak KZ. 2005. Composition does not imply adaptive security. CRYPTO: International Cryptology Conference, LNCS, vol. 3621. 55–65.
View | DOI
 

2005 | Journal Article | IST-REx-ID: 3416 | OA
Janovjak HL, Sapra T, Mueller D. 2005. Complex stability of single proteins explored by forced unfolding experiments. Biophysical Journal. 88(5), 37–39.
View | DOI | Download (ext.)
 

2005 | Journal Article | IST-REx-ID: 3417
Kuhn M, Janovjak HL, Hubain M, Mueller D. 2005. Automated alignment and pattern recognition of single-molecule force spectroscopy data. Journal of Microscopy. 218(2), 125–132.
View | DOI
 

Search

Filter Publications