_id,doi,title
15012,10.1007/978-3-031-49272-3_23,"Decomposition of geometric graphs into star-forests"
10774,10.1007/978-3-030-94583-1_1,Flavors of sequential information flow
9296,10.1007/978-3-030-68211-8_18,On compatible matchings
9466,10.1007/978-3-030-75245-3_3,The convergence of slide-type reductions
9823,10.1007/978-3-030-79527-6_6,"Wait-free approximate agreement on graphs"
9824,10.1007/978-3-030-76657-3_10,Body centered cubic grid - coordinate system and discrete analytical plane definition
9825,10.1007/978-3-030-75539-3_20,Dual lattice attacks for closest vector problems (with preprocessing)
9826,10.1007/978-3-030-75539-3_17,Inverse-Sybil attacks in automated contact tracing
7808,10.1007/978-3-030-45237-7_5,How many bits does it take to quantize your neural network?
7810,10.1007/978-3-030-44914-8_5,Optimal and perfectly parallel algorithms for on-demand data-flow analysis
8194,10.1007/978-3-030-51074-9_2,An SMT theory of fixed-point arithmetic
8272,10.1007/978-3-030-53291-8_21,Stochastic games with lexicographic reachability-safety objectives
8322,10.1007/978-3-030-56880-1_26,"Reverse firewalls for actively secure MPCs"
8339,10.1007/978-3-030-45374-9_21,Improved discrete Gaussian and subgaussian analysis for lattice cryptography
8987,10.1007/978-3-030-65277-7_1,Delayed authentication: Preventing replay and relay attacks in private contact tracing
7183,10.1007/978-3-030-31784-3_27,Deciding fast termination for probabilistic VASS with nondeterminism
6430,10.1007/978-3-030-17259-6_11,Adaptively secure proxy re-encryption
9648,10.1007/978-3-642-23672-3_35,Incremental-decremental algorithm for computing AT-models and persistent homology
