Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

6021 Publications


2005 | Conference Paper | IST-REx-ID: 3211
M. Bellare, K. Z. Pietrzak, and P. Rogaway, “Improved security analyses for CBC MACs,” presented at the CRYPTO: International Cryptology Conference, 2005, vol. 3621, pp. 527–545.
View | DOI
 

2005 | Conference Paper | IST-REx-ID: 3212
Y. Dodis, R. Oliveira, and K. Z. Pietrzak, “On the generic insecurity of the full domain hash,” presented at the CRYPTO: International Cryptology Conference, 2005, vol. 3621, pp. 449–466.
View | DOI
 

2005 | Conference Paper | IST-REx-ID: 3213
K. Z. Pietrzak, “Composition does not imply adaptive security,” presented at the CRYPTO: International Cryptology Conference, 2005, vol. 3621, pp. 55–65.
View | DOI
 

2005 | Journal Article | IST-REx-ID: 3416 | OA
H. L. Janovjak, T. Sapra, and D. Mueller, “Complex stability of single proteins explored by forced unfolding experiments,” Biophysical Journal, vol. 88, no. 5, pp. 37–39, 2005.
View | DOI | Download (ext.)
 

2005 | Journal Article | IST-REx-ID: 3417
M. Kuhn, H. L. Janovjak, M. Hubain, and D. Mueller, “Automated alignment and pattern recognition of single-molecule force spectroscopy data,” Journal of Microscopy, vol. 218, no. 2, pp. 125–132, 2005.
View | DOI
 

Search

Filter Publications