_id,doi,title
1651,10.1007/978-3-662-46447-2_5,Anonymous transferable e-cash
1652,10.1145/2746539.2746622,High parallel complexity graphs and memory-hard functions
1654,10.1007/978-3-662-48800-3_4,Generic security of NMAC and HMAC with input whitening
1655,10.3390/e17107266,Quantifying emergent behavior of autonomous robots
1659,10.1109/LICS.2015.74,The target discounted-sum problem
1660,10.1109/LICS.2015.15,Long-run average behaviour of probabilistic vector addition systems
1661,10.1109/LICS.2015.34,Improved algorithms for one-pair and k-pair Streett objectives
1664,10.1038/nature15701,The rise of fully turbulent flow
1665,10.1038/nature15395,Mutations driving CLL and their evolution in progression and relapse
1666,10.1371/journal.pgen.1005639,Dynamics of transcription factor binding site evolution
1667,10.1007/978-3-319-22264-6_10,Optimizing performance of continuous-time stochastic systems using timeout synthesis
1668,10.1007/978-3-662-48116-5_16,Relaxing full-codebook security: A refined analysis of key-length extension schemes
1669,10.1007/978-3-319-22174-8_5,"The chain rule for HILL pseudoentropy, revisited"
1671,10.1007/978-3-662-47989-6_18,The exact PRF security of truncation: Tight bounds for keyed sponges and truncated CBC
1672,10.1007/978-3-662-48000-7_37,Incoercible multi-party computation and universally composable receipt-free voting
1673,10.1098/rspa.2015.0114,Amplifiers of selection
1674,10.1142/S0129055X1550018X,Edge universality for deformed Wigner matrices
1677,10.1063/1.4932606,The local semicircle law for random matrices with a fourfold symmetry
1678,10.1038/nchembio.1933,Light-assisted small-molecule screening against protein kinases
1679,10.1063/1.4930850,Taylor's Forest
