_id,doi,title
1648,10.1007/978-3-662-47989-6_29,A quasipolynomial reduction for generalized selective decryption on trees
1649,10.1007/978-3-319-24174-6_16,Efficient zero-knowledge proofs for commitments from learning with errors over rings
1650,10.1007/978-3-662-47672-7_85,Condensed unpredictability 
1651,10.1007/978-3-662-46447-2_5,Anonymous transferable e-cash
1652,10.1145/2746539.2746622,High parallel complexity graphs and memory-hard functions
1654,10.1007/978-3-662-48800-3_4,Generic security of NMAC and HMAC with input whitening
1655,10.3390/e17107266,Quantifying emergent behavior of autonomous robots
1656,10.1109/LICS.2015.72,Nested weighted automata
1657,10.1109/LICS.2015.32,Unifying two views on multiple mean-payoff objectives in Markov decision processes
1658,10.1007/978-3-319-23401-4_8,Adaptive moment closure for parameter inference of biochemical reaction networks
1659,10.1109/LICS.2015.74,The target discounted-sum problem
1660,10.1109/LICS.2015.15,Long-run average behaviour of probabilistic vector addition systems
1661,10.1109/LICS.2015.34,Improved algorithms for one-pair and k-pair Streett objectives
1663,10.1016/j.cellsig.2015.08.001,Complex regulation of CREB-binding protein by homeodomain-interacting protein kinase 2
1664,10.1038/nature15701,The rise of fully turbulent flow
1665,10.1038/nature15395,Mutations driving CLL and their evolution in progression and relapse
1666,10.1371/journal.pgen.1005639,Dynamics of transcription factor binding site evolution
1667,10.1007/978-3-319-22264-6_10,Optimizing performance of continuous-time stochastic systems using timeout synthesis
1668,10.1007/978-3-662-48116-5_16,Relaxing full-codebook security: A refined analysis of key-length extension schemes
1669,10.1007/978-3-319-22174-8_5,"The chain rule for HILL pseudoentropy, revisited"
