default search action
Anderson C. A. Nascimento
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i47]Lucas Piske, Jeroen van de Graaf, Anderson C. A. Nascimento, Ni Trieu:
Shared OT and Its Applications to Unconditional Secure Integer Equality, Comparison and Bit-Decomposition. IACR Cryptol. ePrint Arch. 2024: 963 (2024) - 2023
- [j29]David Melanson, Ricardo Maia, Hee-Seok Kim, Anderson C. A. Nascimento, Martine De Cock:
Secure Multi-Party Computation for Personalized Human Activity Recognition. Neural Process. Lett. 55(3): 2127-2153 (2023) - [c49]Steven Golob, Sikha Pentyala, Rafael Dowsley, Bernardo David, Mario Larangeira, Martine De Cock, Anderson C. A. Nascimento:
A Decentralized Information Marketplace Preserving Input and Output Privacy. DEC@SIGMOD 2023: 1-6 - [i46]Tucker Stewart, Bin Yu, Anderson C. A. Nascimento, Juhua Hu:
Enhancing Peak Network Traffic Prediction via Time-Series Decomposition. CoRR abs/2303.13529 (2023) - [i45]Ricardo J. M. Maia, Dustin Ray, Sikha Pentyala, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento, Ricardo Jacobi:
An End-to-End Framework for Private DGA Detection as a Service. IACR Cryptol. ePrint Arch. 2023: 1644 (2023) - 2022
- [j28]Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen:
Privacy-preserving training of tree ensembles over continuous data. Proc. Priv. Enhancing Technol. 2022(2): 205-226 (2022) - [j27]Amanda Cristina Davi Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha:
Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation. IEEE Trans. Inf. Forensics Secur. 17: 428-442 (2022) - [i44]Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Martine De Cock:
Training Differentially Private Models with Secure Multiparty Computation. CoRR abs/2202.02625 (2022) - [i43]Sikha Pentyala, Nicola Neophytou, Anderson C. A. Nascimento, Martine De Cock, Golnoosh Farnadi:
PrivFairFL: Privacy-Preserving Group Fairness in Federated Learning. CoRR abs/2205.11584 (2022) - [i42]Mayana Pereira, Sikha Pentyala, Anderson C. A. Nascimento, Rafael T. de Sousa Jr., Martine De Cock:
Secure Multiparty Computation for Synthetic Data Generation from Distributed Data. CoRR abs/2210.07332 (2022) - [i41]Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Martine De Cock:
Training Differentially Private Models with Secure Multiparty Computation. IACR Cryptol. ePrint Arch. 2022: 146 (2022) - 2021
- [j26]Vinícius de Morais Alves, Rafael Dowsley, Rafael Timóteo de Sousa Jr., Anderson C. A. Nascimento:
Information-Theoretically Secure String Commitments Based on Packet Reordering Channels. IEEE Access 9: 139928-139945 (2021) - [c48]Ruichao Zhang, Shang Wang, Renée Burton, Minh Hoang, Juhua Hu, Anderson C. A. Nascimento:
Clustering Analysis of Email Malware Campaigns. CSR 2021: 95-102 - [c47]Admilson de Ribamar Lima Ribeiro, Reneilson Yves Carvalho Santos, Anderson Clayton Alves Nascimento:
Anomaly Detection Technique for Intrusion Detection in SDN Environment using Continuous Data Stream Machine Learning Algorithms. SysCon 2021: 1-7 - [i40]Amanda Cristina Davi Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha:
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation. CoRR abs/2101.07365 (2021) - [i39]Rafael Dowsley, Caleb Horst, Anderson C. A. Nascimento:
Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines. CoRR abs/2103.11240 (2021) - [i38]Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen:
Privacy-Preserving Training of Tree Ensembles over Continuous Data. CoRR abs/2106.02769 (2021) - [i37]Amanda Cristina Davi Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha:
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation. IACR Cryptol. ePrint Arch. 2021: 69 (2021) - [i36]Rafael Dowsley, Caleb Horst, Anderson C. A. Nascimento:
Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines. IACR Cryptol. ePrint Arch. 2021: 375 (2021) - [i35]Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen:
Privacy-Preserving Training of Tree Ensembles over Continuous Data. IACR Cryptol. ePrint Arch. 2021: 754 (2021) - [i34]Sen Yuan, Milan Shen, Ilya Mironov, Anderson C. A. Nascimento:
Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy. IACR Cryptol. ePrint Arch. 2021: 835 (2021) - 2020
- [j25]Raaghavi Sivaguru, Jonathan Peck, Femi G. Olumofin, Anderson C. A. Nascimento, Martine De Cock:
Inline Detection of DGA Domains Using Side Information. IEEE Access 8: 141910-141922 (2020) - [j24]Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
On the Composability of Statistically Secure Random Oblivious Transfer. Entropy 22(1): 107 (2020) - [j23]Anderson C. A. Nascimento, Eduardo Tavares, Gabriel Alves de Albuquerque, Erica Sousa, Bruno Costa e Silva Nogueira:
Performability evaluation of transport modes for cloud-based inbound logistics: a study based on coffee industry. Int. J. Manuf. Technol. Manag. 34(2): 126-147 (2020) - [j22]Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento:
On the Commitment Capacity of Unfair Noisy Channels. IEEE Trans. Inf. Theory 66(6): 3745-3752 (2020) - [i33]Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, Ariel Todoki:
High Performance Logistic Regression for Privacy-Preserving Genome Analysis. CoRR abs/2002.05377 (2020) - [i32]Raaghavi Sivaguru, Jonathan Peck, Femi G. Olumofin, Anderson C. A. Nascimento, Martine De Cock:
Inline Detection of DGA Domains Using Side Information. CoRR abs/2003.05703 (2020) - [i31]Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, Ariel Todoki:
High Performance Logistic Regression for Privacy-Preserving Genome Analysis. IACR Cryptol. ePrint Arch. 2020: 171 (2020)
2010 – 2019
- 2019
- [j21]Bin Yu, Jie Pan, Daniel L. Gray, Jiaming Hu, Chhaya Choudhary, Anderson C. A. Nascimento, Martine De Cock:
Weakly Supervised Deep Learning for the Detection of Domain Generation Algorithms. IEEE Access 7: 51542-51556 (2019) - [j20]Jonathan Peck, Claire Nie, Raaghavi Sivaguru, Charles Grumer, Femi G. Olumofin, Bin Yu, Anderson C. A. Nascimento, Martine De Cock:
CharBot: A Simple and Effective Method for Evading DGA Classifiers. IEEE Access 7: 91759-91771 (2019) - [j19]Martine De Cock, Rafael Dowsley, Caleb Horst, Raj S. Katti, Anderson C. A. Nascimento, Wing-Sea Poon, Stacey Truex:
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation. IEEE Trans. Dependable Secur. Comput. 16(2): 217-230 (2019) - [c46]Bin Yu, Giovanna Graciani, Anderson C. A. Nascimento, Juhua Hu:
Cost-adaptive Neural Networks for Peak Volume Prediction with EMM Filtering. IEEE BigData 2019: 4208-4213 - [c45]Charles Grumer, Jonathan Peck, Femi G. Olumofin, Anderson C. A. Nascimento, Martine De Cock:
Hardening DGA Classifiers Utilizing IVAP. IEEE BigData 2019: 6063-6065 - [c44]Admilson de Ribamar Lima Ribeiro, Edward David Moreno Ordonez, Anderson Clayton Alves Nascimento:
A Framework for Network Intrusion Detection using Network Programmability and Data Stream Clustering Machine Learning Algorithms. FedCSIS (Communication Papers) 2019: 57-63 - [c43]Devin Reich, Ariel Todoki, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento:
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation. NeurIPS 2019: 3752-3764 - [i30]Jonathan Peck, Claire Nie, Raaghavi Sivaguru, Charles Grumer, Femi G. Olumofin, Bin Yu, Anderson C. A. Nascimento, Martine De Cock:
CharBot: A Simple and Effective Method for Evading DGA Classifiers. CoRR abs/1905.01078 (2019) - [i29]Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento:
On the Commitment Capacity of Unfair Noisy Channels. CoRR abs/1905.10921 (2019) - [i28]Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Devin Reich, Ariel Todoki:
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection. CoRR abs/1906.02325 (2019) - [i27]Anisha Agarwal, Rafael Dowsley, Nicholas D. McKinney, Dongrui Wu, Chin-Teng Lin, Martine De Cock, Anderson C. A. Nascimento:
Protecting Privacy of Users in Brain-Computer Interface Applications. CoRR abs/1907.01586 (2019) - [i26]Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento:
On the Commitment Capacity of Unfair Noisy Channels. IACR Cryptol. ePrint Arch. 2019: 572 (2019) - [i25]Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Devin Reich, Ariel Todoki:
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection. IACR Cryptol. ePrint Arch. 2019: 744 (2019) - 2018
- [j18]Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento:
Commitment and Oblivious Transfer in the Bounded Storage Model With Errors. IEEE Trans. Inf. Theory 64(8): 5970-5984 (2018) - [c42]Kyle Fritchman, Keerthanaa Saminathan, Rafael Dowsley, Tyler Hughes, Martine De Cock, Anderson C. A. Nascimento, Ankur Teredesai:
Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare. IEEE BigData 2018: 2413-2422 - [c41]Raaghavi Sivaguru, Chhaya Choudhary, Bin Yu, Vadym Tymchenko, Anderson C. A. Nascimento, Martine De Cock:
An Evaluation of DGA Classifiers. IEEE BigData 2018: 5058-5067 - [c40]Anisha Agarwal, Rafael Dowsley, Nicholas D. McKinney, Dongrui Wu, Chin-Teng Lin, Martine De Cock, Anderson C. A. Nascimento:
Privacy-Preserving Linear Regression for Brain-Computer Interface Applications. IEEE BigData 2018: 5277-5278 - [c39]Sanchya Bhagat, Keerthanaa Saminathan, Anisha Agarwal, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento:
Privacy-Preserving User Profiling with Facebook Likes. IEEE BigData 2018: 5298-5299 - [c38]Resham Ahluwalia, Himani Soni, Edward Callow, Anderson C. A. Nascimento, Martine De Cock:
Detecting Hate Speech Against Women in English Tweets. EVALITA@CLiC-it 2018 - [c37]Bin Yu, Jie Pan, Jiaming Hu, Anderson C. A. Nascimento, Martine De Cock:
Character Level based Detection of DGA Domain Names. IJCNN 2018: 1-8 - [c36]Mayana Pereira, Shaun Coleman, Bin Yu, Martine De Cock, Anderson C. A. Nascimento:
Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic. RAID 2018: 295-314 - [c35]Resham Ahluwalia, Evgeniia Shcherbinina, Edward Callow, Anderson C. A. Nascimento, Martine De Cock:
Detecting Misogynous Tweets. IberEval@SEPLN 2018: 242-248 - [c34]Chhaya Choudhary, Raaghavi Sivaguru, Mayana Pereira, Bin Yu, Anderson C. A. Nascimento, Martine De Cock:
Algorithmically Generated Domain Detection and Malware Family Classification. SSCC 2018: 640-655 - [i24]Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
On the Composability of Statistically Secure Random Oblivious Transfer. CoRR abs/1808.10145 (2018) - [i23]Sisi Wang, Wing-Sea Poon, Golnoosh Farnadi, Caleb Horst, Kebra Thompson, Michael Nickels, Rafael Dowsley, Anderson C. A. Nascimento, Martine De Cock:
VirtualIdentity: Privacy-Preserving User Profiling. CoRR abs/1808.10151 (2018) - 2017
- [j17]S. M. P. C. Souza, R. F. Gonçalves, E. Leonova, R. S. Puttini, Anderson C. A. Nascimento:
Privacy-ensuring electronic health records in the cloud. Concurr. Comput. Pract. Exp. 29(11) (2017) - [j16]Rafael Dowsley, Anderson C. A. Nascimento:
On the Oblivious Transfer Capacity of Generalized Erasure Channels Against Malicious Adversaries: The Case of Low Erasure Probability. IEEE Trans. Inf. Theory 63(10): 6819-6826 (2017) - [c33]Bin Yu, Daniel L. Gray, Jie Pan, Martine De Cock, Anderson C. A. Nascimento:
Inline DGA Detection with Deep Networks. ICDM Workshops 2017: 683-692 - [i22]Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento:
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM. CoRR abs/1710.08256 (2017) - [i21]Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento:
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM. IACR Cryptol. ePrint Arch. 2017: 993 (2017) - 2016
- [j15]João José Costa Gondim, Robson de Oliveira Albuquerque, Anderson Clayton Alves Nascimento, Luis Javier García-Villalba, Tai-Hoon Kim:
A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things. Sensors 16(11): 1855 (2016) - [j14]Bernardo Machado David, Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento, Adriana C. B. Pinto:
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra. IEEE Trans. Inf. Forensics Secur. 11(1): 59-73 (2016) - [c32]Sisi Wang, Wing-Sea Poon, Golnoosh Farnadi, Caleb Horst, Kebra Thompson, Michael Nickels, Anderson C. A. Nascimento, Martine De Cock:
VirtualIdentity: Privacy preserving user profiling. ASONAM 2016: 1434-1437 - [e2]Anderson C. A. Nascimento, Paulo S. L. M. Barreto:
Information Theoretic Security - 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10015, 2016, ISBN 978-3-319-49174-5 [contents] - [e1]Matt Bishop, Anderson C. A. Nascimento:
Information Security - 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings. Lecture Notes in Computer Science 9866, Springer 2016, ISBN 978-3-319-45870-0 [contents] - [i20]Martine De Cock, Rafael Dowsley, Caleb Horst, Raj S. Katti, Anderson C. A. Nascimento, Stacey C. Newman, Wing-Sea Poon:
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation. IACR Cryptol. ePrint Arch. 2016: 736 (2016) - 2015
- [j13]Mayana Pereira, Rafael Dowsley, Anderson C. A. Nascimento, Goichiro Hanaoka:
Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions. Comput. J. 58(10): 2738-2746 (2015) - [j12]Rafael Tonicelli, Anderson C. A. Nascimento, Rafael Dowsley, Jörn Müller-Quade, Hideki Imai, Goichiro Hanaoka, Akira Otsuka:
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model. Int. J. Inf. Sec. 14(1): 73-84 (2015) - [c31]Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Stacey C. Newman:
Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data. AISec@CCS 2015: 3-14 - [c30]Bernardo Machado David, Rafael Dowsley, Raj S. Katti, Anderson C. A. Nascimento:
Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols. ProvSec 2015: 354-367 - [c29]Rosiberto Dos Santos Gonçalves, Eduardo Antonio Guimarães Tavares, Anderson C. A. Nascimento, Erica Sousa, Fernando Antônio Aires Lins, Gabriel Alves:
Performability Assessment of a Government Process in the Cloud. SMC 2015: 87-92 - [i19]Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento:
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors. CoRR abs/1510.06623 (2015) - [i18]Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento:
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors. IACR Cryptol. ePrint Arch. 2015: 952 (2015) - 2014
- [c28]Bernardo David, Rafael Dowsley, Anderson C. A. Nascimento:
Universally Composable Oblivious Transfer Based on a Variant of LPN. CANS 2014: 143-158 - [c27]Amruta Khot, Abdeltawab M. Hendawi, Anderson C. A. Nascimento, Raj S. Katti, Ankur Teredesai, Mohamed H. Ali:
Road network compression techniques in spatiotemporal embedded systems: a survey. IWGS 2014: 33-36 - [c26]Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento:
Oblivious transfer in the bounded storage model with errors. ISIT 2014: 1623-1627 - [c25]Anderson C. A. Nascimento, Gabriel Alves, Erica Sousa, Bruno Costa e Silva Nogueira, Eduardo Antonio Guimarães Tavares:
Transport mode assessment for inbound logistics: A study based on coffee industry. SMC 2014: 1318-1323 - [i17]Rafael Dowsley, Anderson C. A. Nascimento:
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries. CoRR abs/1410.2862 (2014) - [i16]Rafael Dowsley, Anderson C. A. Nascimento:
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries. IACR Cryptol. ePrint Arch. 2014: 823 (2014) - 2012
- [j11]Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento:
Oblivious Transfer Based on the McEliece Assumptions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(2): 567-575 (2012) - [j10]Bernardo Machado David, Anderson C. A. Nascimento, Rafael T. de Sousa Jr.:
Efficient Fully Simulatable Oblivious Transfer from the McEliece Assumptions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(11): 2059-2066 (2012) - [j9]Nico Döttling, Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
A CCA2 Secure Variant of the McEliece Cryptosystem. IEEE Trans. Inf. Theory 58(10): 6672-6680 (2012) - [c24]Nico Döttling, Jörn Müller-Quade, Anderson C. A. Nascimento:
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem. ASIACRYPT 2012: 485-503 - [c23]Max E. Vizcarra Melgar, Alexandre Zaghetto, Bruno Macchiavello, Anderson C. A. Nascimento:
CQR codes: Colored quick-response codes. ICCE-Berlin 2012: 321-325 - [c22]Bernardo Machado David, Anderson C. A. Nascimento, Jörn Müller-Quade:
Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions. ICITS 2012: 80-99 - [i15]Nico Döttling, Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
A CCA2 Secure Variant of the McEliece Cryptosystem. CoRR abs/1205.5224 (2012) - 2011
- [j8]Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(2): 725-734 (2011) - [j7]José Carrijo, Rafael Tonicelli, Anderson C. A. Nascimento:
A Fault Analytic Method against HB+. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(2): 855-859 (2011) - [j6]Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento:
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model. IEEE Trans. Inf. Theory 57(8): 5566-5571 (2011) - [c21]Bernardo Machado David, Anderson C. A. Nascimento:
Efficient fully simulatable oblivious transfer from the McEliece assumptions. ITW 2011: 638-642 - [i14]Bernardo Machado David, Anderson C. A. Nascimento, Rafael Tonicelli:
A Framework for Secure Single Sign-On. IACR Cryptol. ePrint Arch. 2011: 246 (2011) - 2010
- [c20]Mayana Pereira, Rafael Dowsley, Goichiro Hanaoka, Anderson C. A. Nascimento:
Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption. ISC 2010: 299-306 - [c19]Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother. WISA 2010: 307-321 - [c18]Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento:
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product. WISA 2010: 337-350 - [i13]José Carrijo, Rafael Tonicelli, Anderson C. A. Nascimento:
A Fault Analytic Method against HB+. CoRR abs/1010.0756 (2010) - [i12]Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento:
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product. IACR Cryptol. ePrint Arch. 2010: 289 (2010) - [i11]José Carrijo, Rafael Tonicelli, Anderson C. A. Nascimento:
A Fault Analytic Method against HB+. IACR Cryptol. ePrint Arch. 2010: 508 (2010)
2000 – 2009
- 2009
- [j5]José Carrijo, Rafael Tonicelli, Hideki Imai, Anderson C. A. Nascimento:
A Novel Probabilistic Passive Attack on the Protocols HB and HB+. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(2): 658-662 (2009) - [c17]Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model. CT-RSA 2009: 240-251 - [i10]Rafael Tonicelli, Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Akira Otsuka, Anderson C. A. Nascimento:
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model. IACR Cryptol. ePrint Arch. 2009: 270 (2009) - [i9]Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2009: 271 (2009) - [i8]Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data. IACR Cryptol. ePrint Arch. 2009: 273 (2009) - [i7]Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento:
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model. IACR Cryptol. ePrint Arch. 2009: 570 (2009) - 2008
- [j4]Anderson C. A. Nascimento, Andreas J. Winter:
On the Oblivious-Transfer Capacity of Noisy Resources. IEEE Trans. Inf. Theory 54(6): 2572-2581 (2008) - [j3]Anderson C. A. Nascimento, João Barros, Stefan Skludarek, Hideki Imai:
The Commitment Capacity of the Gaussian Channel Is Infinite. IEEE Trans. Inf. Theory 54(6): 2785-2789 (2008) - [c16]Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento:
Oblivious Transfer Based on the McEliece Assumptions. ICITS 2008: 107-117 - [i6]Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento:
Oblivious Transfer based on the McEliece Assumptions}. IACR Cryptol. ePrint Arch. 2008: 138 (2008) - [i5]José Carrijo, Rafael Tonicelli, Hideki Imai, Anderson C. A. Nascimento:
A Novel Probabilistic Passive Attack on the Protocols HB and HB+. IACR Cryptol. ePrint Arch. 2008: 231 (2008) - [i4]Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento:
On the Composability of Statistically Secure Bit Commitments. IACR Cryptol. ePrint Arch. 2008: 457 (2008) - [i3]Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model. IACR Cryptol. ePrint Arch. 2008: 468 (2008) - 2007
- [c15]Hideki Imai, Kirill Morozov, Anderson C. A. Nascimento:
Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation. ICITS 2007: 183-194 - 2006
- [c14]Honório Assis Filho Crispim, Eduardo T. L. Pastor, Anderson C. A. Nascimento, Humberto Abdalla Jr., Antonio José Martins Soares:
IP/WDM Optical Network Testbed: Design and Implementation. APNOMS 2006: 441-450 - [c13]Hideki Imai, Kirill Morozov, Anderson C. A. Nascimento:
On the Oblivious Transfer Capacity of the Erasure Channel. ISIT 2006: 1428-1431 - [c12]Hideki Imai, Kirill Morozov, Anderson C. A. Nascimento, Andreas J. Winter:
Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations. ISIT 2006: 1432-1436 - [c11]João Barros, Hideki Imai, Anderson C. A. Nascimento, Stefan Skludarek:
Bit Commitment over Gaussian Channels. ISIT 2006: 1437-1441 - [c10]Anderson C. A. Nascimento, Andreas J. Winter:
On the Oblivious Transfer Capacity of Noisy Correlations. ISIT 2006: 1871-1875 - 2005
- [j2]Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Pim Tuyls, Andreas J. Winter:
An information theoretical model for quantum secret sharing. Quantum Inf. Comput. 5(1): 69-80 (2005) - [c9]Go Yamamoto, Koji Chida, Anderson C. A. Nascimento, Koutarou Suzuki, Shigenori Uchiyama:
Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption. WISA 2005: 328-342 - 2004
- [c8]Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas J. Winter:
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. ACISP 2004: 62-73 - [c7]Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai:
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. ACNS 2004: 355-368 - [c6]Anderson C. A. Nascimento, Jörn Müller-Quade, Hideki Imai:
Bit String Commitment Reductions with a Non-zero Rate. CT-RSA 2004: 179-193 - [c5]Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Andreas J. Winter:
Rates for bit commitment and coin tossing from noisy correlation. ISIT 2004: 45 - 2003
- [c4]Anderson C. A. Nascimento, Akira Otsuka, Hideki Imai, Jörn Müller-Quade:
Unconditionally Secure Homomorphic Pre-distributed Commitments. AAECC 2003: 87-97 - [c3]Andreas J. Winter, Anderson C. A. Nascimento, Hideki Imai:
Commitment Capacity of Discrete Memoryless Channels. IMACC 2003: 35-51 - [c2]Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai:
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. ISC 2003: 151-164 - [i2]Andreas J. Winter, Anderson C. A. Nascimento, Hideki Imai:
Commitment Capacity of Discrete Memoryless Channels. CoRR cs.CR/0304014 (2003) - [i1]Andreas J. Winter, Anderson C. A. Nascimento, Hideki Imai:
Commitment Capacity of Discrete Memoryless Channels. IACR Cryptol. ePrint Arch. 2003: 165 (2003) - 2002
- [c1]Hideki Imai, Goichiro Hanaoka, Junji Shikata, Akira Otsuka, Anderson C. A. Nascimento:
Cryptography with information theoretic security. ITW 2002: 73 - 2001
- [j1]Anderson C. A. Nascimento, Jörn Müller-Quade, Hideki Imai:
Quantum Identification Protocol with Technologically Bounded Parties. Electron. Notes Discret. Math. 6: 15-24 (2001)
Coauthor Index
aka: Bernardo David
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint