
Conferences in DBLP
Composable Formal Security Analysis: Juggling Soundness, Simplicity and Efficiency. [Citation Graph (, )][DBLP]
Newton's Method for omegaContinuous Semirings. [Citation Graph (, )][DBLP]
The Tractability Frontier for NFA Minimization. [Citation Graph (, )][DBLP]
Finite Automata, Digraph Connectivity, and Regular Expression Size. [Citation Graph (, )][DBLP]
Leftist Grammars Are Nonprimitive Recursive. [Citation Graph (, )][DBLP]
On the Computational Completeness of Equations over Sets of Natural Numbers. [Citation Graph (, )][DBLP]
Placement Inference for a ClientServer Calculus. [Citation Graph (, )][DBLP]
Extended piCalculi. [Citation Graph (, )][DBLP]
Completeness and Logical Full Abstraction in Modal Logics for Typed Mobile Processes. [Citation Graph (, )][DBLP]
On the Sets of Real Numbers Recognized by Finite Automata in Multiple Bases. [Citation Graph (, )][DBLP]
On Expressiveness and Complexity in RealTime Model Checking. [Citation Graph (, )][DBLP]
STORMED Hybrid Systems. [Citation Graph (, )][DBLP]
Controller Synthesis and Verification for Markov Decision Processes with Qualitative Branching Time Objectives. [Citation Graph (, )][DBLP]
On Datalog vs. LFP. [Citation Graph (, )][DBLP]
Directed stConnectivity Is Not Expressible in Symmetric Datalog. [Citation Graph (, )][DBLP]
Nondichotomies in Constraint Satisfaction Complexity. [Citation Graph (, )][DBLP]
Quantified Constraint Satisfaction and the Polynomially Generated Powers Property. [Citation Graph (, )][DBLP]
When Does Partial Commutative Closure Preserve Regularity? [Citation Graph (, )][DBLP]
Weighted Logics for Nested Words and Algebraic Formal Power Series. [Citation Graph (, )][DBLP]
Tree Languages Defined in FirstOrder Logic with One Quantifier Alternation. [Citation Graph (, )][DBLP]
Duality and Equational Theory of Regular Languages. [Citation Graph (, )][DBLP]
Reversible Flowchart Languages and the Structured Reversible Program Theorem. [Citation Graph (, )][DBLP]
Attribute Grammars and Categorical Semantics. [Citation Graph (, )][DBLP]
A Domain Theoretic Model of Qubit Channels. [Citation Graph (, )][DBLP]
Interacting Quantum Observables. [Citation Graph (, )][DBLP]
Perpetuality for Full and Safe Composition (in a Constructive Setting). [Citation Graph (, )][DBLP]
A System F with CallbyName Exceptions. [Citation Graph (, )][DBLP]
Linear Logical Algorithms. [Citation Graph (, )][DBLP]
A Simple Model of Separation Logic for HigherOrder Store. [Citation Graph (, )][DBLP]
Open Implication. [Citation Graph (, )][DBLP]
ATL* Satisfiability Is 2EXPTIMEComplete. [Citation Graph (, )][DBLP]
Visibly Pushdown Transducers. [Citation Graph (, )][DBLP]
The Nondeterministic Mostowski Hierarchy and DistanceParity Automata. [Citation Graph (, )][DBLP]
Analyzing ContextFree Grammars Using an Incremental SAT Solver. [Citation Graph (, )][DBLP]
Weak Pseudorandom Functions in Minicrypt. [Citation Graph (, )][DBLP]
On BlackBox Ring Extraction and Integer Factorization. [Citation Graph (, )][DBLP]
Extractable Perfectly OneWay Functions. [Citation Graph (, )][DBLP]
ErrorTolerant Combiners for Oblivious Primitives. [Citation Graph (, )][DBLP]
Asynchronous MultiParty Computation with Quadratic Communication. [Citation Graph (, )][DBLP]
Improved Garbled Circuit: Free XOR Gates and Applications. [Citation Graph (, )][DBLP]
Improving the Round Complexity of VSS in PointtoPoint Networks. [Citation Graph (, )][DBLP]
How to Protect Yourself without Perfect Shredding. [Citation Graph (, )][DBLP]
Universally Composable Undeniable Signature. [Citation Graph (, )][DBLP]
Interactive PCP. [Citation Graph (, )][DBLP]
ConstantRound Concurrent Nonmalleable Zero Knowledge in the Bare PublicKey Model. [Citation Graph (, )][DBLP]
Delegating Capabilities in Predicate Encryption Systems. [Citation Graph (, )][DBLP]
Bounded Ciphertext Policy Attribute Based Encryption. [Citation Graph (, )][DBLP]
Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks. [Citation Graph (, )][DBLP]
Composable Security in the BoundedQuantumStorage Model. [Citation Graph (, )][DBLP]
On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak. [Citation Graph (, )][DBLP]
HistoryIndependent Cuckoo Hashing. [Citation Graph (, )][DBLP]
Building a CollisionResistant Compression Function from Noncompressing Primitives. [Citation Graph (, )][DBLP]
Robust Multiproperty Combiners for Hash Functions Revisited. [Citation Graph (, )][DBLP]
Homomorphic Encryption with CCA Security. [Citation Graph (, )][DBLP]
How to Encrypt with the LPN Problem. [Citation Graph (, )][DBLP]
Could SFLASH be Repaired?. [Citation Graph (, )][DBLP]
Password Mistyping in TwoFactorAuthenticated Key Exchange. [Citation Graph (, )][DBLP]
AffiliationHiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. [Citation Graph (, )][DBLP]
