default search action
Rafael Dowsley
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c41]Bernardo David, Rafael Dowsley, Anders Konring, Mario Larangeira:
MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and Applications. SCN (2) 2024: 317-337 - [i57]Bernardo David, Rafael Dowsley, Anders Konring, Mario Larangeira:
MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and Applications. IACR Cryptol. ePrint Arch. 2024: 628 (2024) - 2023
- [j19]Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason T. LeGrow, Joseph K. Liu, Raphaël C.-W. Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu:
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions. ACM Comput. Surv. 55(12): 251:1-251:32 (2023) - [c40]Steven Golob, Sikha Pentyala, Rafael Dowsley, Bernardo David, Mario Larangeira, Martine De Cock, Anderson C. A. Nascimento:
A Decentralized Information Marketplace Preserving Input and Output Privacy. DEC@SIGMOD 2023: 1-6 - [c39]Rumpa Dasgupta, Amin Sakzad, Carsten Rudolph, Rafael Dowsley:
FDIAs on Hybrid Trading Transactive Energy Markets: Attacks, Impacts, and Prevention. ISGT EUROPE 2023: 1-6 - [c38]Carsten Baum, Bernardo David, Rafael Dowsley, Ravi Kishore, Jesper Buus Nielsen, Sabine Oechsner:
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time. Public Key Cryptography (1) 2023: 439-470 - [i56]Rumpa Dasgupta, Amin Sakzad, Carsten Rudolph, Rafael Dowsley:
SePEnTra: A secure and privacy-preserving energy trading mechanisms in transactive energy market. CoRR abs/2304.06179 (2023) - [i55]Ricardo J. M. Maia, Dustin Ray, Sikha Pentyala, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento, Ricardo Jacobi:
An End-to-End Framework for Private DGA Detection as a Service. IACR Cryptol. ePrint Arch. 2023: 1644 (2023) - 2022
- [j18]Shabnam Kasra Kermanshahi, Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal, Xun Yi, Shangqi Lai:
Range search on encrypted spatial data with dynamic updates. J. Comput. Secur. 30(6): 829-849 (2022) - [j17]Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen:
Privacy-preserving training of tree ensembles over continuous data. Proc. Priv. Enhancing Technol. 2022(2): 205-226 (2022) - [j16]Amanda Cristina Davi Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha:
Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation. IEEE Trans. Inf. Forensics Secur. 17: 428-442 (2022) - [c37]Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Shabnam Kasra Kermanshahi, Veronika Kuchta, Joseph K. Liu, Raphaël C.-W. Phan, Zhenfei Zhang:
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain. ESORICS (1) 2022: 25-45 - [c36]Carsten Baum, Bernardo David, Rafael Dowsley:
(Public) Verifiability for Composable Protocols Without Adaptivity or Zero-Knowledge. ProvSec 2022: 249-272 - [c35]Rafael Dowsley, Mylène C. Q. Farias, Mario Larangeira, Anderson Nascimento, Jot Virdee:
A Spendable Cold Wallet from QR Video. SECRYPT 2022: 283-290 - [i54]Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Martine De Cock:
Training Differentially Private Models with Secure Multiparty Computation. CoRR abs/2202.02625 (2022) - [i53]Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Martine De Cock:
Training Differentially Private Models with Secure Multiparty Computation. IACR Cryptol. ePrint Arch. 2022: 146 (2022) - [i52]Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason T. LeGrow, Joseph K. Liu, Raphael C.-W. Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu:
A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions. IACR Cryptol. ePrint Arch. 2022: 1151 (2022) - 2021
- [j15]Vinícius de Morais Alves, Rafael Dowsley, Rafael Timóteo de Sousa Jr., Anderson C. A. Nascimento:
Information-Theoretically Secure String Commitments Based on Packet Reordering Channels. IEEE Access 9: 139928-139945 (2021) - [c34]Shange Fu, Jiangshan Yu, Rafael Dowsley, Joseph K. Liu:
On the Shutdown Price of Blockchain Mining Machines. Blockchain 2021: 180-187 - [c33]Shabnam Kasra Kermanshahi, Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal, Xun Yi:
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy. ESORICS (2) 2021: 24-43 - [c32]Carsten Baum, Bernardo David, Rafael Dowsley, Jesper Buus Nielsen, Sabine Oechsner:
TARDIS: A Foundation of Time-Lock Puzzles in UC. EUROCRYPT (3) 2021: 429-459 - [c31]Xiling Li, Rafael Dowsley, Martine De Cock:
Privacy-Preserving Feature Selection with Secure Multiparty Computation. ICML 2021: 6326-6336 - [c30]Sikha Pentyala, Rafael Dowsley, Martine De Cock:
Privacy-Preserving Video Classification with Convolutional Neural Networks. ICML 2021: 8487-8499 - [i51]Amanda Cristina Davi Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha:
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation. CoRR abs/2101.07365 (2021) - [i50]Sikha Pentyala, Rafael Dowsley, Martine De Cock:
Privacy-Preserving Video Classification with Convolutional Neural Networks. CoRR abs/2102.03513 (2021) - [i49]Xiling Li, Rafael Dowsley, Martine De Cock:
Privacy-Preserving Feature Selection with Secure Multiparty Computation. CoRR abs/2102.03517 (2021) - [i48]Rafael Dowsley, Caleb Horst, Anderson C. A. Nascimento:
Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines. CoRR abs/2103.11240 (2021) - [i47]Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen:
Privacy-Preserving Training of Tree Ensembles over Continuous Data. CoRR abs/2106.02769 (2021) - [i46]Amanda Cristina Davi Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha:
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation. IACR Cryptol. ePrint Arch. 2021: 69 (2021) - [i45]Sikha Pentyala, Rafael Dowsley, Martine De Cock:
Privacy-Preserving Video Classification with Convolutional Neural Networks. IACR Cryptol. ePrint Arch. 2021: 131 (2021) - [i44]Xiling Li, Rafael Dowsley, Martine De Cock:
Privacy-Preserving Feature Selection with Secure Multiparty Computation. IACR Cryptol. ePrint Arch. 2021: 132 (2021) - [i43]Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Shabnam Kasra Kermanshahi, Veronika Kuchta, Joseph K. Liu, Raphael C.-W. Phan, Zhenfei Zhang:
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain. IACR Cryptol. ePrint Arch. 2021: 302 (2021) - [i42]Rafael Dowsley, Caleb Horst, Anderson C. A. Nascimento:
Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines. IACR Cryptol. ePrint Arch. 2021: 375 (2021) - [i41]Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen:
Privacy-Preserving Training of Tree Ensembles over Continuous Data. IACR Cryptol. ePrint Arch. 2021: 754 (2021) - 2020
- [j14]Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
On the Composability of Statistically Secure Random Oblivious Transfer. Entropy 22(1): 107 (2020) - [j13]Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento:
On the Commitment Capacity of Unfair Noisy Channels. IEEE Trans. Inf. Theory 66(6): 3745-3752 (2020) - [c29]Bernardo David, Rafael Dowsley:
Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model. CANS 2020: 462-481 - [c28]Carsten Baum, Bernardo David, Rafael Dowsley:
Insured MPC: Efficient Secure Computation with Financial Penalties. Financial Cryptography 2020: 404-420 - [i40]Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, Ariel Todoki:
High Performance Logistic Regression for Privacy-Preserving Genome Analysis. CoRR abs/2002.05377 (2020) - [i39]Kyle Bittner, Martine De Cock, Rafael Dowsley:
Private Speech Characterization with Secure Multiparty Computation. CoRR abs/2007.00253 (2020) - [i38]Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, Ariel Todoki:
High Performance Logistic Regression for Privacy-Preserving Genome Analysis. IACR Cryptol. ePrint Arch. 2020: 171 (2020) - [i37]Carsten Baum, Bernardo David, Rafael Dowsley:
A Framework for Universally Composable Publicly Verifiable Cryptographic Protocols. IACR Cryptol. ePrint Arch. 2020: 207 (2020) - [i36]Carsten Baum, Bernardo David, Rafael Dowsley, Jesper Buus Nielsen, Sabine Oechsner:
TARDIS: Time And Relative Delays In Simulation. IACR Cryptol. ePrint Arch. 2020: 537 (2020) - [i35]Carsten Baum, Bernardo David, Rafael Dowsley, Ravi Kishore, Jesper Buus Nielsen, Sabine Oechsner:
CRAFT: Composable Randomness and Almost Fairness from Time. IACR Cryptol. ePrint Arch. 2020: 784 (2020) - [i34]Bernardo David, Rafael Dowsley:
Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model. IACR Cryptol. ePrint Arch. 2020: 1291 (2020) - [i33]Shange Fu, Jiangshan Yu, Rafael Dowsley, Joseph K. Liu:
Analysing Mining Machine Shutdown Price. IACR Cryptol. ePrint Arch. 2020: 1574 (2020)
2010 – 2019
- 2019
- [j12]Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya:
On the Impossibility of Structure-Preserving Deterministic Primitives. J. Cryptol. 32(1): 239-264 (2019) - [j11]Martine De Cock, Rafael Dowsley, Caleb Horst, Raj S. Katti, Anderson C. A. Nascimento, Wing-Sea Poon, Stacey Truex:
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation. IEEE Trans. Dependable Secur. Comput. 16(2): 217-230 (2019) - [c27]Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Rafael Dowsley, Irene Giacomelli:
Efficient UC Commitment Extension with Homomorphism for Free (and Applications). ASIACRYPT (2) 2019: 606-635 - [c26]Bernardo David, Rafael Dowsley, Mario Larangeira:
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement. Financial Cryptography 2019: 282-300 - [c25]Devin Reich, Ariel Todoki, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento:
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation. NeurIPS 2019: 3752-3764 - [i32]Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento:
On the Commitment Capacity of Unfair Noisy Channels. CoRR abs/1905.10921 (2019) - [i31]Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Devin Reich, Ariel Todoki:
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection. CoRR abs/1906.02325 (2019) - [i30]Anisha Agarwal, Rafael Dowsley, Nicholas D. McKinney, Dongrui Wu, Chin-Teng Lin, Martine De Cock, Anderson C. A. Nascimento:
Protecting Privacy of Users in Brain-Computer Interface Applications. CoRR abs/1907.01586 (2019) - [i29]Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento:
On the Commitment Capacity of Unfair Noisy Channels. IACR Cryptol. ePrint Arch. 2019: 572 (2019) - [i28]Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Devin Reich, Ariel Todoki:
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection. IACR Cryptol. ePrint Arch. 2019: 744 (2019) - 2018
- [j10]Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento:
Commitment and Oblivious Transfer in the Bounded Storage Model With Errors. IEEE Trans. Inf. Theory 64(8): 5970-5984 (2018) - [c24]Bernardo David, Rafael Dowsley, Mario Larangeira:
21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State. ACISP 2018: 45-63 - [c23]Kyle Fritchman, Keerthanaa Saminathan, Rafael Dowsley, Tyler Hughes, Martine De Cock, Anderson C. A. Nascimento, Ankur Teredesai:
Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare. IEEE BigData 2018: 2413-2422 - [c22]Anisha Agarwal, Rafael Dowsley, Nicholas D. McKinney, Dongrui Wu, Chin-Teng Lin, Martine De Cock, Anderson C. A. Nascimento:
Privacy-Preserving Linear Regression for Brain-Computer Interface Applications. IEEE BigData 2018: 5277-5278 - [c21]Sanchya Bhagat, Keerthanaa Saminathan, Anisha Agarwal, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento:
Privacy-Preserving User Profiling with Facebook Likes. IEEE BigData 2018: 5298-5299 - [c20]Bernardo David, Rafael Dowsley, Mario Larangeira:
Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement. Financial Cryptography 2018: 500-519 - [c19]Bernardo David, Rafael Dowsley, Mario Larangeira:
MARS: Monetized Ad-hoc Routing System (A Position Paper). CRYBLOCK@MobiSys 2018: 82-86 - [i27]Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
On the Composability of Statistically Secure Random Oblivious Transfer. CoRR abs/1808.10145 (2018) - [i26]Sisi Wang, Wing-Sea Poon, Golnoosh Farnadi, Caleb Horst, Kebra Thompson, Michael Nickels, Rafael Dowsley, Anderson C. A. Nascimento, Martine De Cock:
VirtualIdentity: Privacy-Preserving User Profiling. CoRR abs/1808.10151 (2018) - [i25]Bernardo David, Rafael Dowsley, Mario Larangeira:
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement. IACR Cryptol. ePrint Arch. 2018: 157 (2018) - [i24]Bernardo David, Rafael Dowsley, Mario Larangeira:
21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State. IACR Cryptol. ePrint Arch. 2018: 303 (2018) - [i23]Carsten Baum, Bernardo David, Rafael Dowsley:
Insured MPC: Efficient Secure Multiparty Computation with Punishable Abort. IACR Cryptol. ePrint Arch. 2018: 942 (2018) - [i22]Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Rafael Dowsley, Irene Giacomelli:
Efficient UC Commitment Extension with Homomorphism for Free (and Applications). IACR Cryptol. ePrint Arch. 2018: 983 (2018) - 2017
- [j9]Rafael Dowsley, Antonis Michalas, Matthias Nagel, Nicolae Paladi:
A survey on design and implementation of protected searchable data in the cloud. Comput. Sci. Rev. 26: 17-30 (2017) - [j8]Rafael Dowsley, Anderson C. A. Nascimento:
On the Oblivious Transfer Capacity of Generalized Erasure Channels Against Malicious Adversaries: The Case of Low Erasure Probability. IEEE Trans. Inf. Theory 63(10): 6819-6826 (2017) - [i21]Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento:
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM. CoRR abs/1710.08256 (2017) - [i20]Bernardo David, Rafael Dowsley, Mario Larangeira:
Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement. IACR Cryptol. ePrint Arch. 2017: 899 (2017) - [i19]Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento:
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM. IACR Cryptol. ePrint Arch. 2017: 993 (2017) - 2016
- [b1]Rafael Dowsley:
Cryptography Based on Correlated Data: Foundations and Practice. Karlsruhe Institute of Technology, Germany, 2016 - [j7]Bernardo Machado David, Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento, Adriana C. B. Pinto:
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra. IEEE Trans. Inf. Forensics Secur. 11(1): 59-73 (2016) - [c18]Rafael Dowsley, Matthias Gabel, Kateryna Yurchenko, Valentin Zipf:
A Database Adapter for Secure Outsourcing. CloudCom 2016: 503-508 - [c17]Rafael Dowsley, Matthias Gabel, Gerald Hübsch, Gunther Schiefer, Antonia Schwichtenberg:
A Distributed Key Management Approach. CloudCom 2016: 509-514 - [i18]Martine De Cock, Rafael Dowsley, Caleb Horst, Raj S. Katti, Anderson C. A. Nascimento, Stacey C. Newman, Wing-Sea Poon:
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation. IACR Cryptol. ePrint Arch. 2016: 736 (2016) - 2015
- [j6]Mayana Pereira, Rafael Dowsley, Anderson C. A. Nascimento, Goichiro Hanaoka:
Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions. Comput. J. 58(10): 2738-2746 (2015) - [j5]Rafael Tonicelli, Anderson C. A. Nascimento, Rafael Dowsley, Jörn Müller-Quade, Hideki Imai, Goichiro Hanaoka, Akira Otsuka:
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model. Int. J. Inf. Sec. 14(1): 73-84 (2015) - [c16]Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Stacey C. Newman:
Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data. AISec@CCS 2015: 3-14 - [c15]Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges:
Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens. ICITS 2015: 197-213 - [c14]Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi:
How Secure is Deterministic Encryption? Public Key Cryptography 2015: 52-73 - [c13]David Cash, Rafael Dowsley, Eike Kiltz:
Digital Signatures from Strong RSA without Prime Generation. Public Key Cryptography 2015: 217-235 - [c12]Bernardo Machado David, Rafael Dowsley, Raj S. Katti, Anderson C. A. Nascimento:
Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols. ProvSec 2015: 354-367 - [c11]Antonis Michalas, Rafael Dowsley:
Towards Trusted eHealth Services in the Cloud. UCC 2015: 618-623 - [i17]Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges:
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens. CoRR abs/1502.03487 (2015) - [i16]Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento:
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors. CoRR abs/1510.06623 (2015) - [i15]Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges:
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens. IACR Cryptol. ePrint Arch. 2015: 104 (2015) - [i14]Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento:
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors. IACR Cryptol. ePrint Arch. 2015: 952 (2015) - 2014
- [c10]Bernardo David, Rafael Dowsley, Anderson C. A. Nascimento:
Universally Composable Oblivious Transfer Based on a Variant of LPN. CANS 2014: 143-158 - [c9]Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento:
Oblivious transfer in the bounded storage model with errors. ISIT 2014: 1623-1627 - [c8]Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya:
On the Impossibility of Structure-Preserving Deterministic Primitives. TCC 2014: 713-738 - [i13]Rafael Dowsley, Anderson C. A. Nascimento:
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries. CoRR abs/1410.2862 (2014) - [i12]Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi:
How Secure is Deterministic Encryption? IACR Cryptol. ePrint Arch. 2014: 376 (2014) - [i11]Rafael Dowsley, Anderson C. A. Nascimento:
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries. IACR Cryptol. ePrint Arch. 2014: 823 (2014) - 2012
- [j4]Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento:
Oblivious Transfer Based on the McEliece Assumptions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(2): 567-575 (2012) - [j3]Nico Döttling, Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
A CCA2 Secure Variant of the McEliece Cryptosystem. IEEE Trans. Inf. Theory 58(10): 6672-6680 (2012) - [c7]Mihir Bellare, Rafael Dowsley, Brent Waters, Scott Yilek:
Standard Security Does Not Imply Security against Selective-Opening. EUROCRYPT 2012: 645-662 - [i10]Nico Döttling, Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
A CCA2 Secure Variant of the McEliece Cryptosystem. CoRR abs/1205.5224 (2012) - 2011
- [j2]Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(2): 725-734 (2011) - [j1]Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento:
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model. IEEE Trans. Inf. Theory 57(8): 5566-5571 (2011) - [c6]Karyn Benson, Rafael Dowsley, Hovav Shacham:
Do you know where your cloud files are? CCSW 2011: 73-82 - [i9]Mihir Bellare, Rafael Dowsley, Brent Waters, Scott Yilek:
Standard Security Does Not Imply Security Against Selective-Opening. IACR Cryptol. ePrint Arch. 2011: 581 (2011) - 2010
- [c5]Mayana Pereira, Rafael Dowsley, Goichiro Hanaoka, Anderson C. A. Nascimento:
Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption. ISC 2010: 299-306 - [c4]Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother. WISA 2010: 307-321 - [c3]Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento:
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product. WISA 2010: 337-350 - [i8]Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento:
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product. IACR Cryptol. ePrint Arch. 2010: 289 (2010)
2000 – 2009
- 2009
- [c2]Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model. CT-RSA 2009: 240-251 - [i7]Rafael Tonicelli, Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Akira Otsuka, Anderson C. A. Nascimento:
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model. IACR Cryptol. ePrint Arch. 2009: 270 (2009) - [i6]Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2009: 271 (2009) - [i5]Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data. IACR Cryptol. ePrint Arch. 2009: 273 (2009) - [i4]Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento:
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model. IACR Cryptol. ePrint Arch. 2009: 570 (2009) - 2008
- [c1]Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento:
Oblivious Transfer Based on the McEliece Assumptions. ICITS 2008: 107-117 - [i3]Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento:
Oblivious Transfer based on the McEliece Assumptions}. IACR Cryptol. ePrint Arch. 2008: 138 (2008) - [i2]Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento:
On the Composability of Statistically Secure Bit Commitments. IACR Cryptol. ePrint Arch. 2008: 457 (2008) - [i1]Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model. IACR Cryptol. ePrint Arch. 2008: 468 (2008)
Coauthor Index
aka: Bernardo David
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint