Остановите войну!
for scientists:
default search action
Rafael Dowsley
- > Home > Persons > Rafael Dowsley
Publications
- 2023
- [c40]Steven Golob, Sikha Pentyala, Rafael Dowsley, Bernardo David, Mario Larangeira, Martine De Cock, Anderson C. A. Nascimento:
A Decentralized Information Marketplace Preserving Input and Output Privacy. DEC@SIGMOD 2023: 1-6 - [i55]Ricardo J. M. Maia, Dustin Ray, Sikha Pentyala, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento, Ricardo Jacobi:
An End-to-End Framework for Private DGA Detection as a Service. IACR Cryptol. ePrint Arch. 2023: 1644 (2023) - 2022
- [j17]Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen:
Privacy-preserving training of tree ensembles over continuous data. Proc. Priv. Enhancing Technol. 2022(2): 205-226 (2022) - [j16]Amanda Cristina Davi Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha:
Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation. IEEE Trans. Inf. Forensics Secur. 17: 428-442 (2022) - [i54]Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Martine De Cock:
Training Differentially Private Models with Secure Multiparty Computation. CoRR abs/2202.02625 (2022) - [i53]Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Martine De Cock:
Training Differentially Private Models with Secure Multiparty Computation. IACR Cryptol. ePrint Arch. 2022: 146 (2022) - 2021
- [j15]Vinícius de Morais Alves, Rafael Dowsley, Rafael Timóteo de Sousa Jr., Anderson C. A. Nascimento:
Information-Theoretically Secure String Commitments Based on Packet Reordering Channels. IEEE Access 9: 139928-139945 (2021) - [i51]Amanda Cristina Davi Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha:
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation. CoRR abs/2101.07365 (2021) - [i48]Rafael Dowsley, Caleb Horst, Anderson C. A. Nascimento:
Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines. CoRR abs/2103.11240 (2021) - [i47]Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen:
Privacy-Preserving Training of Tree Ensembles over Continuous Data. CoRR abs/2106.02769 (2021) - [i46]Amanda Cristina Davi Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, Diego F. Aranha:
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation. IACR Cryptol. ePrint Arch. 2021: 69 (2021) - [i42]Rafael Dowsley, Caleb Horst, Anderson C. A. Nascimento:
Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines. IACR Cryptol. ePrint Arch. 2021: 375 (2021) - [i41]Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen:
Privacy-Preserving Training of Tree Ensembles over Continuous Data. IACR Cryptol. ePrint Arch. 2021: 754 (2021) - 2020
- [j14]Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
On the Composability of Statistically Secure Random Oblivious Transfer. Entropy 22(1): 107 (2020) - [j13]Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento:
On the Commitment Capacity of Unfair Noisy Channels. IEEE Trans. Inf. Theory 66(6): 3745-3752 (2020) - [i40]Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, Ariel Todoki:
High Performance Logistic Regression for Privacy-Preserving Genome Analysis. CoRR abs/2002.05377 (2020) - [i38]Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, Ariel Todoki:
High Performance Logistic Regression for Privacy-Preserving Genome Analysis. IACR Cryptol. ePrint Arch. 2020: 171 (2020) - 2019
- [j11]Martine De Cock, Rafael Dowsley, Caleb Horst, Raj S. Katti, Anderson C. A. Nascimento, Wing-Sea Poon, Stacey Truex:
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation. IEEE Trans. Dependable Secur. Comput. 16(2): 217-230 (2019) - [c25]Devin Reich, Ariel Todoki, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento:
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation. NeurIPS 2019: 3752-3764 - [i32]Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento:
On the Commitment Capacity of Unfair Noisy Channels. CoRR abs/1905.10921 (2019) - [i31]Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Devin Reich, Ariel Todoki:
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection. CoRR abs/1906.02325 (2019) - [i30]Anisha Agarwal, Rafael Dowsley, Nicholas D. McKinney, Dongrui Wu, Chin-Teng Lin, Martine De Cock, Anderson C. A. Nascimento:
Protecting Privacy of Users in Brain-Computer Interface Applications. CoRR abs/1907.01586 (2019) - [i29]Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento:
On the Commitment Capacity of Unfair Noisy Channels. IACR Cryptol. ePrint Arch. 2019: 572 (2019) - [i28]Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Devin Reich, Ariel Todoki:
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection. IACR Cryptol. ePrint Arch. 2019: 744 (2019) - 2018
- [j10]Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento:
Commitment and Oblivious Transfer in the Bounded Storage Model With Errors. IEEE Trans. Inf. Theory 64(8): 5970-5984 (2018) - [c23]Kyle Fritchman, Keerthanaa Saminathan, Rafael Dowsley, Tyler Hughes, Martine De Cock, Anderson C. A. Nascimento, Ankur Teredesai:
Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare. IEEE BigData 2018: 2413-2422 - [c22]Anisha Agarwal, Rafael Dowsley, Nicholas D. McKinney, Dongrui Wu, Chin-Teng Lin, Martine De Cock, Anderson C. A. Nascimento:
Privacy-Preserving Linear Regression for Brain-Computer Interface Applications. IEEE BigData 2018: 5277-5278 - [c21]Sanchya Bhagat, Keerthanaa Saminathan, Anisha Agarwal, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento:
Privacy-Preserving User Profiling with Facebook Likes. IEEE BigData 2018: 5298-5299 - [i27]Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
On the Composability of Statistically Secure Random Oblivious Transfer. CoRR abs/1808.10145 (2018) - [i26]Sisi Wang, Wing-Sea Poon, Golnoosh Farnadi, Caleb Horst, Kebra Thompson, Michael Nickels, Rafael Dowsley, Anderson C. A. Nascimento, Martine De Cock:
VirtualIdentity: Privacy-Preserving User Profiling. CoRR abs/1808.10151 (2018) - 2017
- [j8]Rafael Dowsley, Anderson C. A. Nascimento:
On the Oblivious Transfer Capacity of Generalized Erasure Channels Against Malicious Adversaries: The Case of Low Erasure Probability. IEEE Trans. Inf. Theory 63(10): 6819-6826 (2017) - [i21]Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento:
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM. CoRR abs/1710.08256 (2017) - [i19]Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento:
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM. IACR Cryptol. ePrint Arch. 2017: 993 (2017) - 2016
- [j7]Bernardo Machado David, Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento, Adriana C. B. Pinto:
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra. IEEE Trans. Inf. Forensics Secur. 11(1): 59-73 (2016) - [i18]Martine De Cock, Rafael Dowsley, Caleb Horst, Raj S. Katti, Anderson C. A. Nascimento, Stacey C. Newman, Wing-Sea Poon:
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation. IACR Cryptol. ePrint Arch. 2016: 736 (2016) - 2015
- [j6]Mayana Pereira, Rafael Dowsley, Anderson C. A. Nascimento, Goichiro Hanaoka:
Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions. Comput. J. 58(10): 2738-2746 (2015) - [j5]Rafael Tonicelli, Anderson C. A. Nascimento, Rafael Dowsley, Jörn Müller-Quade, Hideki Imai, Goichiro Hanaoka, Akira Otsuka:
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model. Int. J. Inf. Sec. 14(1): 73-84 (2015) - [c16]Martine De Cock, Rafael Dowsley, Anderson C. A. Nascimento, Stacey C. Newman:
Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data. AISec@CCS 2015: 3-14 - [c12]Bernardo Machado David, Rafael Dowsley, Raj S. Katti, Anderson C. A. Nascimento:
Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols. ProvSec 2015: 354-367 - [i16]Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento:
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors. CoRR abs/1510.06623 (2015) - [i14]Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento:
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors. IACR Cryptol. ePrint Arch. 2015: 952 (2015) - 2014
- [c10]Bernardo David, Rafael Dowsley, Anderson C. A. Nascimento:
Universally Composable Oblivious Transfer Based on a Variant of LPN. CANS 2014: 143-158 - [c9]Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento:
Oblivious transfer in the bounded storage model with errors. ISIT 2014: 1623-1627 - [i13]Rafael Dowsley, Anderson C. A. Nascimento:
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries. CoRR abs/1410.2862 (2014) - [i11]Rafael Dowsley, Anderson C. A. Nascimento:
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries. IACR Cryptol. ePrint Arch. 2014: 823 (2014) - 2012
- [j4]Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento:
Oblivious Transfer Based on the McEliece Assumptions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(2): 567-575 (2012) - [j3]Nico Döttling, Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
A CCA2 Secure Variant of the McEliece Cryptosystem. IEEE Trans. Inf. Theory 58(10): 6672-6680 (2012) - [i10]Nico Döttling, Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
A CCA2 Secure Variant of the McEliece Cryptosystem. CoRR abs/1205.5224 (2012) - 2011
- [j2]Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(2): 725-734 (2011) - [j1]Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento:
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model. IEEE Trans. Inf. Theory 57(8): 5566-5571 (2011) - 2010
- [c5]Mayana Pereira, Rafael Dowsley, Goichiro Hanaoka, Anderson C. A. Nascimento:
Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption. ISC 2010: 299-306 - [c4]Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother. WISA 2010: 307-321 - [c3]Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento:
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product. WISA 2010: 337-350 - [i8]Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento:
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product. IACR Cryptol. ePrint Arch. 2010: 289 (2010) - 2009
- [c2]Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model. CT-RSA 2009: 240-251 - [i7]Rafael Tonicelli, Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Akira Otsuka, Anderson C. A. Nascimento:
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model. IACR Cryptol. ePrint Arch. 2009: 270 (2009) - [i6]Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2009: 271 (2009) - [i5]Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data. IACR Cryptol. ePrint Arch. 2009: 273 (2009) - [i4]Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento:
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model. IACR Cryptol. ePrint Arch. 2009: 570 (2009) - 2008
- [c1]Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento:
Oblivious Transfer Based on the McEliece Assumptions. ICITS 2008: 107-117 - [i3]Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento:
Oblivious Transfer based on the McEliece Assumptions}. IACR Cryptol. ePrint Arch. 2008: 138 (2008) - [i2]Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento:
On the Composability of Statistically Secure Bit Commitments. IACR Cryptol. ePrint Arch. 2008: 457 (2008) - [i1]Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model. IACR Cryptol. ePrint Arch. 2008: 468 (2008)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint