Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
4840 Publications
2012 |
Published |
Conference Paper |
IST-REx-ID: 3279
A. Jain, K. Z. Pietrzak, and A. Tentes, “Hardness preserving constructions of pseudorandom functions,” presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy, 2012, vol. 7194, pp. 369–382.
View
| DOI
| Download None (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 3280 |
K. Z. Pietrzak, “Subspace LWE,” presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy, 2012, vol. 7194, pp. 548–563.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 3281
K. Z. Pietrzak, A. Rosen, and G. Segev, “Lossy functions do not amplify well,” presented at the TCC: Theory of Cryptography Conference, Taormina, Sicily, Italy, 2012, vol. 7194, pp. 458–475.
View
| DOI
| Download None (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 3282 |
Y. Dodis, K. Z. Pietrzak, E. Kiltz, and D. Wichs, “Message authentication, revisited,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Cambridge, UK, 2012, vol. 7237, pp. 355–374.
[Submitted Version]
View
| Files available
| DOI
2012 |
Published |
Journal Article |
IST-REx-ID: 3289 |
A. Pereira et al., “A vaccinia virus-driven interplay between the MKK4/7-JNK1/2 pathway and cytoskeleton reorganization,” Journal of Virology, vol. 86, no. 1. ASM, pp. 172–184, 2012.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| PubMed | Europe PMC
2012 |
Published |
Journal Article |
IST-REx-ID: 3310 |
P. Bendich, S. Cabello, and H. Edelsbrunner, “A point calculus for interlevel set homology,” Pattern Recognition Letters, vol. 33, no. 11. Elsevier, pp. 1436–1444, 2012.
[Submitted Version]
View
| Files available
| DOI
2012 |
Published |
Journal Article |
IST-REx-ID: 3317 |
E. Eggermann, I. Bucurenciu, S. Goswami, and P. M. Jonas, “Nanodomain coupling between Ca(2+) channels and sensors of exocytosis at fast mammalian synapses,” Nature Reviews Neuroscience, vol. 13, no. 1. Nature Publishing Group, pp. 7–21, 2012.
[Submitted Version]
View
| Files available
| DOI
2012 |
Published |
Journal Article |
IST-REx-ID: 3331 |
M. Kerber and M. Sagraloff, “A worst case bound for topology computation of algebraic curves,” Journal of Symbolic Computation, vol. 47, no. 3. Elsevier, pp. 239–258, 2012.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 3341 |
K. Chatterjee, “Robustness of structurally equivalent concurrent parity games,” presented at the FoSSaCS: Foundations of Software Science and Computation Structures, Tallinn, Estonia, 2012, vol. 7213, pp. 270–285.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
2012 |
Published |
Conference Paper |
IST-REx-ID: 10903
A. Bouajjani, C. Dragoi, C. Enea, and M. Sighireanu, “Accurate invariant checking for programs manipulating lists and arrays with infinite data,” in Automated Technology for Verification and Analysis, Thiruvananthapuram, India, 2012, vol. 7561, pp. 167–182.
View
| DOI
2012 |
Published |
Conference Paper |
IST-REx-ID: 10904
K. Chatterjee, M. Randour, and J.-F. Raskin, “Strategy synthesis for multi-dimensional quantitative objectives,” in CONCUR 2012 - Concurrency Theory, Newcastle upon Tyne, United Kingdom, 2012, vol. 7454, pp. 115–131.
[Preprint]
View
| Files available
| DOI
| arXiv
2012 |
Published |
Conference Paper |
IST-REx-ID: 10905 |
K. Chatterjee, M. H. Henzinger, S. Krinninger, and D. Nanongkai, “Polynomial-time algorithms for energy games with special weight structures,” in Algorithms – ESA 2012, Ljubljana, Slovenia, 2012, vol. 7501, pp. 301–312.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| arXiv
2012 |
Published |
Conference Paper |
IST-REx-ID: 10906 |
S. Grebenshchikov, A. Gupta, N. P. Lopes, C. Popeea, and A. Rybalchenko, “HSF(C): A software verifier based on Horn clauses,” in Tools and Algorithms for the Construction and Analysis of Systems, Tallinn, Estonia, 2012, vol. 7214, pp. 549–551.
[Published Version]
View
| DOI
| Download Published Version (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 2048 |
S. Faust, K. Z. Pietrzak, and J. Schipper, “Practical leakage-resilient symmetric cryptography,” in Conference proceedings CHES 2012, Leuven, Belgium, 2012, vol. 7428, pp. 213–232.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2012 |
Published |
Conference Paper |
IST-REx-ID: 2049 |
S. Heyse, E. Kiltz, V. Lyubashevsky, C. Paar, and K. Z. Pietrzak, “Lapin: An efficient authentication protocol based on ring-LPN,” in Conference proceedings FSE 2012, Washington, DC, USA, 2012, vol. 7549, pp. 346–365.
[Preprint]
View
| DOI
| Download Preprint (ext.)
2012 |
Published |
Journal Article |
IST-REx-ID: 2263 |
H. Liang, S. Hippenmeyer, and H. Ghashghaei, “A Nestin-cre transgenic mouse is insufficient for recombination in early embryonic neural progenitors,” Biology open, vol. 1, no. 12. The Company of Biologists, pp. 1200–1203, 2012.
[Published Version]
View
| Files available
| DOI
2012 |
Published |
Journal Article |
IST-REx-ID: 2302
T. A. Henzinger and M. Mateescu, “The propagation approach for computing biochemical reaction networks,” IEEE ACM Transactions on Computational Biology and Bioinformatics, vol. 10, no. 2. IEEE, pp. 310–322, 2012.
View
| DOI
| PubMed | Europe PMC