What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Rafael Dowsley
Google Scholar
ORCID:
0000-0002-7588-2410
27
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/provsec
SePEnTra: A Secure and Privacy-Preserving Energy Trading Mechanism in the Transactive Energy Market.
Rumpa Dasgupta
Amin Sakzad
Carsten Rudolph
Rafael Dowsley
2023
conf/pkc
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time.
Carsten Baum
Bernardo David
Rafael Dowsley
Ravi Kishore
Jesper Buus Nielsen
Sabine Oechsner
2022
journals/tifs
Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation.
Amanda Cristina Davi Resende
Davis Railsback
Rafael Dowsley
Anderson C. A. Nascimento
Diego F. Aranha
2022
journals/popets
Privacy-preserving training of tree ensembles over continuous data.
Samuel Adams
Chaitali Choudhary
Martine De Cock
Rafael Dowsley
David Melanson
Anderson C. A. Nascimento
Davis Railsback
Jianwei Shen
2022
conf/provsec
(Public) Verifiability for Composable Protocols Without Adaptivity or Zero-Knowledge.
Carsten Baum
Bernardo David
Rafael Dowsley
2022
conf/esorics
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain.
Maxime Buser
Rafael Dowsley
Muhammed F. Esgin
Shabnam Kasra Kermanshahi
Veronika Kuchta
Joseph K. Liu
Raphaël C.-W. Phan
Zhenfei Zhang
2021
conf/esorics
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy.
Shabnam Kasra Kermanshahi
Rafael Dowsley
Ron Steinfeld
Amin Sakzad
Joseph K. Liu
Surya Nepal
Xun Yi
2021
conf/eurocrypt
TARDIS: A Foundation of Time-Lock Puzzles in UC.
Carsten Baum
Bernardo David
Rafael Dowsley
Jesper Buus Nielsen
Sabine Oechsner
2020
conf/fc
Insured MPC: Efficient Secure Computation with Financial Penalties.
Carsten Baum
Bernardo David
Rafael Dowsley
2020
conf/cans
Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model.
Bernardo David
Rafael Dowsley
2019
journals/joc
On the Impossibility of Structure-Preserving Deterministic Primitives.
Masayuki Abe
Jan Camenisch
Rafael Dowsley
Maria Dubovitskaya
2019
conf/fc
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement.
Bernardo David
Rafael Dowsley
Mario Larangeira
2019
conf/asiacrypt
Efficient UC Commitment Extension with Homomorphism for Free (and Applications).
Ignacio Cascudo
Ivan Damgård
Bernardo David
Nico Döttling
Rafael Dowsley
Irene Giacomelli
2018
conf/acisp
21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State.
Bernardo David
Rafael Dowsley
Mario Larangeira
2018
conf/fc
Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement.
Bernardo David
Rafael Dowsley
Mario Larangeira
2016
journals/tifs
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra.
Bernardo Machado David
Rafael Dowsley
Jeroen van de Graaf
Davidson Marques
Anderson C. A. Nascimento
Adriana C. B. Pinto
2015
conf/ccs
Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data.
Martine De Cock
Rafael Dowsley
Anderson C. A. Nascimento
Stacey C. Newman
2015
conf/provsec
Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols.
Bernardo Machado David
Rafael Dowsley
Raj S. Katti
Anderson C. A. Nascimento
2015
conf/pkc
How Secure is Deterministic Encryption?
Mihir Bellare
Rafael Dowsley
Sriram Keelveedhi
2015
conf/pkc
Digital Signatures from Strong RSA without Prime Generation.
David Cash
Rafael Dowsley
Eike Kiltz
2014
conf/tcc
On the Impossibility of Structure-Preserving Deterministic Primitives.
Masayuki Abe
Jan Camenisch
Rafael Dowsley
Maria Dubovitskaya
2014
conf/cans
Universally Composable Oblivious Transfer Based on a Variant of LPN.
Bernardo David
Rafael Dowsley
Anderson C. A. Nascimento
2012
conf/eurocrypt
Standard Security Does Not Imply Security against Selective-Opening.
Mihir Bellare
Rafael Dowsley
Brent Waters
Scott Yilek
2011
conf/ccs
Do you know where your cloud files are?
Karyn Benson
Rafael Dowsley
Hovav Shacham
2010
conf/wisa
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product.
Rafael Dowsley
Jeroen van de Graaf
Davidson Marques
Anderson C. A. Nascimento
2010
conf/wisa
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother.
Rafael Dowsley
Goichiro Hanaoka
Hideki Imai
Anderson C. A. Nascimento
2009
conf/ctrsa
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model.
Rafael Dowsley
Jörn Müller-Quade
Anderson C. A. Nascimento
Coauthors
Adriana C. B. Pinto
(1)
Amanda Cristina Davi Resende
(1)
Amin Sakzad
(2)
Anderson C. A. Nascimento
(9)
Bernardo David
(10)
Bernardo Machado David
(2)
Brent Waters
(1)
Carsten Baum
(4)
Carsten Rudolph
(1)
Chaitali Choudhary
(1)
David Cash
(1)
David Melanson
(1)
Davidson Marques
(2)
Davis Railsback
(2)
Diego F. Aranha
(1)
Eike Kiltz
(1)
Goichiro Hanaoka
(1)
Hideki Imai
(1)
Hovav Shacham
(1)
Ignacio Cascudo
(1)
Irene Giacomelli
(1)
Ivan Damgård
(1)
Jan Camenisch
(2)
Jeroen van de Graaf
(2)
Jesper Buus Nielsen
(2)
Jianwei Shen
(1)
Jörn Müller-Quade
(1)
Joseph K. Liu
(2)
Karyn Benson
(1)
Maria Dubovitskaya
(2)
Mario Larangeira
(3)
Martine De Cock
(2)
Masayuki Abe
(2)
Maxime Buser
(1)
Mihir Bellare
(2)
Muhammed F. Esgin
(1)
Nico Döttling
(1)
Rafael Dowsley
(27)
Raj S. Katti
(1)
Raphaël C.-W. Phan
(1)
Ravi Kishore
(1)
Ron Steinfeld
(1)
Rumpa Dasgupta
(1)
Sabine Oechsner
(2)
Samuel Adams
(1)
Scott Yilek
(1)
Shabnam Kasra Kermanshahi
(2)
Sriram Keelveedhi
(1)
Stacey C. Newman
(1)
Surya Nepal
(1)
Veronika Kuchta
(1)
Xun Yi
(1)
Zhenfei Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to