Rafael Dowsley
Orcid: 0000-0002-7588-2410
According to our database1,
Rafael Dowsley
authored at least 79 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2023
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.
ACM Comput. Surv., December, 2023
IACR Cryptol. ePrint Arch., 2023
SePEnTra: A secure and privacy-preserving energy trading mechanisms in transactive energy market.
CoRR, 2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
FDIAs on Hybrid Trading Transactive Energy Markets: Attacks, Impacts, and Prevention.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2023
Proceedings of the Second ACM Data Economy Workshop, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
Proc. Priv. Enhancing Technol., 2022
IACR Cryptol. ePrint Arch., 2022
A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
(Public) Verifiability for Composable Protocols Without Adaptivity or Zero-Knowledge.
Proceedings of the Provable and Practical Security, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Information-Theoretically Secure String Commitments Based on Packet Reordering Channels.
IEEE Access, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy.
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Entropy, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
2019
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation.
IEEE Trans. Dependable Secur. Comput., 2019
J. Cryptol., 2019
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection.
IACR Cryptol. ePrint Arch., 2019
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
2018
IEEE Trans. Inf. Theory, 2018
21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State.
IACR Cryptol. ePrint Arch., 2018
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018
Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
On the Oblivious Transfer Capacity of Generalized Erasure Channels Against Malicious Adversaries: The Case of Low Erasure Probability.
IEEE Trans. Inf. Theory, 2017
Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement.
IACR Cryptol. ePrint Arch., 2017
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM.
IACR Cryptol. ePrint Arch., 2017
Comput. Sci. Rev., 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions.
Comput. J., 2015
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols.
Proceedings of the Provable Security, 2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015
2014
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
2011
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model.
IEEE Trans. Inf. Theory, 2011
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Security Applications - 11th International Workshop, 2010
Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption.
Proceedings of the Information Security - 13th International Conference, 2010
2009
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
2008
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008