Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

6021 Publications


2005 | Conference Paper | IST-REx-ID: 3211
Bellare, M., Pietrzak, K. Z., & Rogaway, P. (2005). Improved security analyses for CBC MACs (Vol. 3621, pp. 527–545). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/11535218_32
View | DOI
 

2005 | Conference Paper | IST-REx-ID: 3212
Dodis, Y., Oliveira, R., & Pietrzak, K. Z. (2005). On the generic insecurity of the full domain hash (Vol. 3621, pp. 449–466). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/11535218_27
View | DOI
 

2005 | Conference Paper | IST-REx-ID: 3213
Pietrzak, K. Z. (2005). Composition does not imply adaptive security (Vol. 3621, pp. 55–65). Presented at the CRYPTO: International Cryptology Conference, Springer. https://doi.org/10.1007/11535218_4
View | DOI
 

2005 | Journal Article | IST-REx-ID: 3416 | OA
Janovjak, H. L., Sapra, T., & Mueller, D. (2005). Complex stability of single proteins explored by forced unfolding experiments. Biophysical Journal, 88(5), 37–39. https://doi.org/10.1529/biophysj.105.059774
View | DOI | Download (ext.)
 

2005 | Journal Article | IST-REx-ID: 3417
Kuhn, M., Janovjak, H. L., Hubain, M., & Mueller, D. (2005). Automated alignment and pattern recognition of single-molecule force spectroscopy data. Journal of Microscopy, 218(2), 125–132. https://doi.org/10.1111/j.1365-2818.2005.01478.x
View | DOI
 

Search

Filter Publications