Edit Profile Dowsley, Rafael Compute Distance To: Compute Author ID: dowsley.rafael Published as: Dowsley, Rafael Documents Indexed: 18 Publications since 2008 all top 5 Co-Authors 0 single-authored 9 Nascimento, Anderson C. A. 4 David, Bernardo Machado 4 Müller-Quade, Jörn 2 Abe, Masayuki 2 Bellare, Mihir 2 Camenisch, Jan L. 2 Döttling, Nico 2 Dubovitskaya, Maria 1 Cascudo, Ignacio 1 Cash, David M. 1 Crépeau, Claude 1 Damgård, Ivan Bjerre 1 Giacomelli, Irene 1 Katti, Raj 1 Keelveedhi, Sriram 1 Kiltz, Eike 1 Lacerda, Felipe G. 1 Larangeira, Mario 1 Michalas, Antonis 1 Morozov, Kirill Evgen’evich 1 Nagel, Matthias 1 Nilges, Tobias 1 Paladi, Nicolae 1 Pinto, Adriana C. B. 1 van de Graaf, Jeroen 1 Waters, Brent 1 Yilek, Scott Serials 5 IEEE Transactions on Information Theory 1 Journal of Cryptology 1 Computer Science Review Fields 17 Information and communication theory, circuits (94-XX) 4 Computer science (68-XX) 1 Game theory, economics, finance, and other social and behavioral sciences (91-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH 9 Publications have been cited 28 times in 26 Documents Cited by ▼ Year ▼ Standard security does not imply security against selective-opening. Zbl 1297.94046Bellare, Mihir; Dowsley, Rafael; Waters, Brent; Yilek, Scott 12 2012 How secure is deterministic encryption? Zbl 1345.94038Bellare, Mihir; Dowsley, Rafael; Keelveedhi, Sriram 3 2015 A CCA2 secure public key encryption scheme based on the mceliece assumptions in the standard model. Zbl 1237.94060Dowsley, Rafael; Müller-Quade, Jörn; Nascimento, Anderson C. A. 3 2009 Weakening the isolation assumption of tamper-proof hardware tokens. Zbl 1375.94121Dowsley, Rafael; Müller-Quade, Jörn; Nilges, Tobias 2 2015 Universally composable oblivious transfer based on a variant of LPN. Zbl 1378.94036David, Bernardo; Dowsley, Rafael; Nascimento, Anderson C. A. 2 2014 On the impossibility of structure-preserving deterministic primitives. Zbl 1326.94066Abe, Masayuki; Camenisch, Jan; Dowsley, Rafael; Dubovitskaya, Maria 2 2014 Achieving oblivious transfer capacity of generalized erasure channels in the malicious model. Zbl 1365.94129Pinto, Adriana C. B.; Dowsley, Rafael; Morozov, Kirill; Nascimento, Anderson C. A. 2 2011 Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols. Zbl 1388.94047David, Bernardo; Dowsley, Rafael; Katti, Raj; Nascimento, Anderson C. A. 1 2015 A CCA2 secure variant of the McEliece cryptosystem. Zbl 1364.94534Döttling, Nico; Dowsley, Rafael; Müller-Quade, Jörn; Nascimento, Anderson C. A. 1 2012 How secure is deterministic encryption? Zbl 1345.94038Bellare, Mihir; Dowsley, Rafael; Keelveedhi, Sriram 3 2015 Weakening the isolation assumption of tamper-proof hardware tokens. Zbl 1375.94121Dowsley, Rafael; Müller-Quade, Jörn; Nilges, Tobias 2 2015 Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols. Zbl 1388.94047David, Bernardo; Dowsley, Rafael; Katti, Raj; Nascimento, Anderson C. A. 1 2015 Universally composable oblivious transfer based on a variant of LPN. Zbl 1378.94036David, Bernardo; Dowsley, Rafael; Nascimento, Anderson C. A. 2 2014 On the impossibility of structure-preserving deterministic primitives. Zbl 1326.94066Abe, Masayuki; Camenisch, Jan; Dowsley, Rafael; Dubovitskaya, Maria 2 2014 Standard security does not imply security against selective-opening. Zbl 1297.94046Bellare, Mihir; Dowsley, Rafael; Waters, Brent; Yilek, Scott 12 2012 A CCA2 secure variant of the McEliece cryptosystem. Zbl 1364.94534Döttling, Nico; Dowsley, Rafael; Müller-Quade, Jörn; Nascimento, Anderson C. A. 1 2012 Achieving oblivious transfer capacity of generalized erasure channels in the malicious model. Zbl 1365.94129Pinto, Adriana C. B.; Dowsley, Rafael; Morozov, Kirill; Nascimento, Anderson C. A. 2 2011 A CCA2 secure public key encryption scheme based on the mceliece assumptions in the standard model. Zbl 1237.94060Dowsley, Rafael; Müller-Quade, Jörn; Nascimento, Anderson C. A. 3 2009 all cited Publications top 5 cited Publications all top 5 Cited by 81 Authors 3 Hazay, Carmit 3 Venkitasubramaniam, Muthuramakrishnan 2 Heuer, Felix 2 Hofheinz, Dennis 2 Huang, Zhengan 2 Jia, Dingding 2 Kiltz, Eike 2 Li, Bao 2 Lu, Xianhui 2 Polychroniadou, Antigoni 1 Abdalla, Michel 1 Abe, Masayuki 1 Ahlswede, Rudolf 1 Baldi, Marco 1 Bellare, Mihir 1 Bianchi, Marco S. 1 Cascudo, Ignacio 1 Chen, Kefei 1 Chen, Wenbin 1 Cheng, Qiong 1 Chiaraluce, Franco 1 Csiszár, Imre 1 Damgård, Ivan Bjerre 1 De Caro, Angelo 1 Emura, Keita 1 Freeman, David Mandell 1 Fuchsbauer, Georg 1 Fujioka, Atsushi 1 Gao, Chongzhi 1 Goldreich, Oded 1 Groth, Jens 1 Hanaoka, Goichiro 1 Hara, Keisuke 1 He, Pei 1 Hoang, Viet Tung 1 Huang, Meijuan 1 Iovino, Vincenzo 1 Ito, Katsuhiko 1 Jager, Tibor 1 Jiang, Liaoliang 1 Katz, Jonathan N. 1 Kitagawa, Fuyuki 1 Kohlweiss, Markulf 1 Lacerda, Felipe G. 1 Lai, Junzuo 1 Li, Jin 1 Libert, Benoît 1 Liu, Shengli 1 Matsuda, Takahiro 1 Neven, Gregory 1 Ohigashi, Toshihiro 1 Ohkubo, Miyako 1 O’Neill, Adam 1 Peters, Thomas J. 1 Pietrzak, Krzysztof 1 Poettering, Bertram 1 Qian, Chen 1 Qin, Baodong 1 Raees-Ul-haq, Muhammad 1 Ranellucci, Samuel 1 Rao, Vanishree 1 Rosen, Alon 1 Rosenthal, Joachim 1 Rupp, Andy 1 Schipani, Davide 1 Segev, Gil 1 Susilo, Willy 1 Suzuki, Koutarou 1 Tanaka, Keisuke 1 Tibouchi, Mehdi 1 Wang, Xin 1 Wichs, Daniel 1 Xagawa, Keita 1 Xia, Zhe 1 Yang, Bo 1 Yoneyama, Kazuki 1 Yu, Yu 1 Zaheri, Mohammad 1 Zhang, Jiang 1 Zhao, Yi 1 Zhou, Yanwei all top 5 Cited in 7 Serials 5 Journal of Cryptology 2 Information Sciences 2 Designs, Codes and Cryptography 1 Information Processing Letters 1 Journal of Computer and System Sciences 1 Theoretical Computer Science 1 International Journal of Applied Mathematics and Computer Science Cited in 3 Fields 25 Information and communication theory, circuits (94-XX) 4 Computer science (68-XX) 1 Statistics (62-XX) Citations by Year