_id,doi,title
3280,10.1007/978-3-642-28914-9_31,Subspace LWE
3281,10.1007/978-3-642-28914-9_26,Lossy functions do not amplify well
3282,10.1007/978-3-642-29011-4_22,"Message authentication, revisited"
3289,10.1128/JVI.05638-11,A vaccinia virus-driven interplay between the MKK4/7-JNK1/2 pathway and cytoskeleton reorganization
3310,10.1016/j.patrec.2011.10.007,A point calculus for interlevel set homology
3314,10.1142/S0129054112400308,Discounting and averaging in games across time scales
3317,10.1038/nrn3125,Nanodomain coupling between Ca(2+) channels and sensors of exocytosis at fast mammalian synapses
3331,10.1016/j.jsc.2011.11.001,A worst case bound for topology computation of algebraic curves
3341,10.1007/978-3-642-28729-9_18,Robustness of structurally equivalent concurrent parity games
10896,10.1007/978-1-4614-3903-5_6,The double-edged sword: Gaining Adenosine at the expense of ATP. How to balance the books
10903,10.1007/978-3-642-33386-6_14,Accurate invariant checking for programs manipulating lists and arrays with infinite data
10904,10.1007/978-3-642-32940-1_10,Strategy synthesis for multi-dimensional quantitative objectives
10905,10.1007/978-3-642-33090-2_27,Polynomial-time algorithms for energy games with special weight structures
10906,10.1007/978-3-642-28756-5_46,HSF(C): A software verifier based on Horn clauses
2048,10.1007/978-3-642-33027-8_13,Practical leakage-resilient symmetric cryptography
2049,10.1007/978-3-642-34047-5_20,Lapin: An efficient authentication protocol based on ring-LPN
2263,10.1242/bio.20122287,A Nestin-cre transgenic mouse is insufficient for recombination in early embryonic neural progenitors
2302,10.1109/TCBB.2012.91,The propagation approach for computing biochemical reaction networks
2318,10.4171/JST/31,Absence of bound states implies non-negativity of the scattering length
2411,10.1093/molbev/msr285,A consistent phylogenetic backbone for the fungi
