Recent Publications in Privacy Preserving Machine Learning
Amanda Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento Ander- son, Diego Aranha, ”Fast privacy-preserving text classification based on secure multiparty computation”, IEEE Transactions on Information Forensics and Security, 2022
Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson Nascimento, Davis Railsback, Jianwei Shen, Privacy-Preserving Training of Tree Ensembles over Continuous Data, PoPETS, 2022.
M. De Cock, R. Dowsley; A. C.A. Nascimento; D. Railsback; J. Shen; A. Todoki, High Performance Logistic Regression for Privacy-Preserving Genome Analysis, BMC Medical Genomics, 2021
D. Reich, A. Todoki, R. Dowsley, M. De Cock, A. Nascimento. Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation, in: Advances in Neural Information Processing Systems 32 (NeurIPS), p. 3752-3764, 2019
M. De Cock, R. Dowsley, C. Horst, R. Katti, A. Nascimento, W.-S. Poon, S. Truex. Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation. IEEE Transactions on Dependable and Secure Computing 16(2), p. 217-230, 2019
A. Agarwal, R. Dowsley, N. McKinney, D. Wu, C.-T. Lin, M. De Cock, A. Nascimento. Protecting Privacy of Users in Brain-Computer Interface Applications. IEEE Transactions on Neural Systems \& Rehabilitation Engineering, 27(8), p.1546-1555, 2019
K. Fritchman, K. Saminathan, R. Dowsley, T. Hughes, M. De Cock, A. Nascimento, A. Teredesai. Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare Proceedings of IEEE BigData2018 (2018 IEEE International Conference on Big Data), p. 2412-2421, 2018
S. Wang, W.-S. Poon, G. Farnadi, C. Horst, K. Thompson, M. Nickels, A. Nascimento, M. De Cock. VirtualIdentity: Privacy Preserving User Profiling in: Proceedings of ASONAM 2016 (IEEE/ACM International Conference on Social Networks Analysis and Mining), p.1434-1437, 2016
M. De Cock, R. Dowsley, A. Nascimento, S. Newman. Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data. Proc. of AI-Sec 2015 (8th ACM Workshop on Artificial Intelligence and Security), workshop at ACM CCS2015
Selected Publications in Information Theoretically Secure Cryptography
Crepeau, Claude, Rafael Dowsley, and Anderson CA Nascimento. ”On the commitment capacity of unfair noisy channels.” to appear, IEEE Transactions on Information Theory, 2020
Dowsley, Rafael, Jorn Muller-Quade, and Anderson CA Nascimento. ”On the Composability of Statistically Secure Random Oblivious Transfer.” Entropy 22.1, 2020.
Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento, Commitment and Oblivious Transfer in the Bounded Storage Model with Errors, IEEE Trans on Info Theory, 2018.
Rafael Dowsley, Anderson C A Nascimento, On the Oblivious Transfer Capacity of Generalized Erasure Channels Against Malicious Adversaries: The Case of Low Erasure Probability, 2018 IEEE Trans on Info Theory
Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C A Nascimento, Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model, IEEE Transactions on Information Theory, v. 57, p. 5566-5571, 2011
Anderson C. A. Nascimento ; Andreas Winter . On the Oblivious-Transfer Capacity of Noisy Resources. IEEE Transactions on Information Theory, v. 54, p. 2572-2581, 2008.
Anderson C. A. Nascimento ; Joao Barros ; Stefan Skludarek ; Hideki Imai. The Commitment Capacity of the Gaussian Channel Is Infinite. IEEE Transactions on Information Theory, v. 54, p. 2785-2789, 2008.
Joern Mueller-Quade ; Anderson C. A. Nascimento; Pim Tuyls ; Andreas Winter . An Information Theoretical Model for Quantum Secret Sharing Schemes. Quantum Information & Computation, Princeton, v. 5, n. 1, p. 69-80, 2005.
Andreas Winter; Anderson C. A. Nascimento ; Hideki Imai . Commitment Capacity of Discrete Memoryless Channels, Coding and Cryptography 2003, Lecture Notes in ComputerScience, Berlin, v. 2898, p. 35-51, 2003
Anderson C. A. Nascimento; Joern Mueller-Quade; Hideki Imai. Improving Quantum Secret Sharing Schemes. Physical Review. A, United States, v. 64, n. 042311, p. 1-5, 2001.
Selected Publications in Code-Based Cryptography
Nico Döttling, Rafael Dowsley, Jörn Müller-Quade and Anderson C. A. Nascimento, CCA2 Secure Variant of the McEliece Cryptosystem, IEEE Transactions on Information Theory, v. 58, p. 6672-6680, 2012
Bernardo Machado David, Rafael de Sousa, Anderson C A Nascimento, Efficient Fully Simulatable Oblivious Transfer From The McEliece Assumptions, EICE Transactions on Fundamentals of Electronics, Communications and Computer Science, v. E-95A, p. 567-575, 2012.
Bernardo David, Rafael Dowsley, Anderson Nascimento, Universally Composable Oblivious Transfer based on a variant of LPN accepted to 13th International Conference on Cryptology and Network Security (CANS 2014), 22-24 Oct, Crete, Greece
Nico Doetlling ; Joern Muller-Quade; Anderson C. A. Nascimento. IND-CCA Secure Cryp-tography Based on a Variant of the LPN Problem. In: Advances in Cryptology ASIACRYPT 2012, Pequim. Lecture Notes in Computer Science. Berlin: Springer Berlin Heidelberg,2012. v. 7658. p. 485-503. (Invited to the Journal of Cryptology)
Bernardo Machado David ; Joern Muller-Quade; Anderson C. A. Nascimento. Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions. In:6th International Conference ICITS 2012, 2012, Montreal. Lecture Notes in Computer Sci-ence. Berlin: Springer Berlin Heidelberg, 2012. v. 7412. p. 80-90
Rafael Dowsley ; Joern Mueller-Quade ; Anderson C. A. Nascimento; Jeroen van de Graaf. Oblivious Transfer Based on the McEliece Assumptions. In: International Conferenceon Information Theoretical Cryptography ICITS 2008, Calgary. Lecture Notes in ComputerScience. Berlim : Springer VErlag, 2008. v. 5155. p. 107-117
Full Publication List
Edited Books (Conference Proceedings)
Barreto, P. ; NASCIMENTO, Anderson C A . Information Theoretic Security. 1. ed. Springer International Publishing, 2016. v. 1.
BISHOP, M. ; Anderson C A Nascimento . Information Security. 1. ed. Springer Verlag, 2016. v. 1. 342p .
NASCIMENTO, Anderson C. A. ; SOUSA, R. T. ; Jeroen van de Graaf ; CARMO, L. F. R. ; Nogueira, M. . ANAIS DO 11 SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS.. 11. ed. Porto Alegre: Sociedade Brasileira de Computação, 2011. v. 1. 414p .
;NASCIMENTO, Anderson C. A.; OLIVEIRA, L. B. (Org.) ; NUNES, R. C. (Org.) ; DAHAB, R. (Org.) . ANAIS DO 9° SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS. Porto Alegre: Sociedade Brasileira de Computação, 2009. v. 1. 368p
Journal Papers
Amanda Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento Anderson, Diego Aranha, ”Fast privacy-preserving text classification based on secure multiparty computation”, IEEE Transactions on Information Forensics and Security, 2022
Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson Nascimento, Davis Railsback, Jianwei Shen, Privacy-Preserving Training of Tree Ensembles over Continuous Data, PoPETS, 2022.
M. De Cock, R. Dowsley; A. C.A. Nascimento; D. Railsback; J. Shen; A. Todoki, High Performance Logistic Regression for Privacy-Preserving Genome Analysis, to appear BMC Medical Genomics
Sivaguru, Raaghavi, Jonathan Peck, Femi Olumofin, Anderson Nascimento, and Martine De Cock. ”Inline Detection of DGA Domains Using Side Information.” arXiv preprint arXiv:2003.05703 (2020), to appear, IEEE Access (2020).
Crepeau, Claude, Rafael Dowsley, and Anderson CA Nascimento. ”On the commitment ca- pacity of unfair noisy channels.” to appear, IEEE Transactions on Information Theory, 2020
Dowsley, Rafael, Jorn Muller-Quade, and Anderson CA Nascimento. ”On the Composability of Statistically Secure Random Oblivious Transfer.” Entropy 22.1, 2020.
Jonathan Peck, Claire Nie, Raaghavi Sivaguru, Charles Grumer, Femi Olumofin, Bin Yu, Anderson Nascimento and Martine de Cock, CharBot: A Simple and Effective Method for Evad- ing DGA Classifiers, IEEE Access, 2019.
Anisha Agarwal, Rafael Dowsley, Nicholas D. McKinney, Dongrui Wu, Chin-Teng Lin, Mar- tine De Cock, and Anderson Nascimento, Protecting Privacy of Users in Brain-Computer Interface Applications, IEEE Transactions on Neural Systems Rehabilitation Engineering, 2019
Yu, Bin, Jie Pan, Daniel Gray, Jiaming Hu, Chhaya Choudhary, Anderson Nascimento, and Martine De Cock. ”Weakly Supervised Deep Learning for the Detection of Domain Genera- tion Algorithms.” IEEE Access (2019).
Caleb Horst, Wing-Sea Poon, Stacey Newman, Rafael Dowsley, Martine de Cock, Raj Katti, Anderson C A Nascimento, Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation, IEEE Transactions on Secure and Dependable Computing,2019.
Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento, Commitment and Oblivious Transfer in the Bounded Storage Model with Errors, IEEE Trans on Info Theory, 2018.
Rafael Dowsley, Anderson C A Nascimento, On the Oblivious Transfer Capacity of Generalized Erasure Channels Against Malicious Adversaries: The Case of Low Erasure Probability, 2018 IEEE Trans on Info Theory
Joao Gondim, Robson De Oliveira Albuquerque, Anderson C. A. Nascimento, Luis Villalba, Tai-hoon Kim, A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things, Sensors, 2017.
Stefano Souza, Ricardo Goncalves, Ekaterina Leonova, Ricardo Puttini and Anderson C. A. Nascimento Privacy-ensuring electronic health records on the cloud, Concurrency and Com- putation: Practice and Experience 29, no. 11 (2017)
Bernardo David, Rafael Dowsley, Jeroen van de Graaf, Adriana Pinto, Anderson C A Nascimento, Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra, IEEE Trans on Information Forensics and Security, 2016
Homero Oliveira Martins, Anderson C A Nascimento, QC-MDPC McEliece: an Optimized Implementation of a New McEliece Variant, IEEE Latin America Transactions, (Volume:13 , Issue: 6 ), 2015
Mayana Pereira, Rafael Dowsley, Goichiro Hanaoka, A. C. A. Nascimento, Public-Key En- cryption Schemes with Bounded CCA Security and Optimal Ciphertext Lenght Based on the CDH and HDH Assumptions”, The Computer Journal, Oxford University Press, 2015
RafaelTonicelli,AndersonCANascimento,RafaelDowsley,HidekiImai,GoichiroHanaoka, Akira Otsuka, Joern Muller-Quade, Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model. International Journal of Information Security, Springer Verlag, 2015
Rafael Dowsley, Joern Mueller-Quade, Jeroen van de Graaf, Anderson C. A. Nascimento. On the Composability of Statistically Secure Bit Commitments (invited paper). Journal of Internet Technology, v.14, pg 509-516, 2013
Nico Döttling, Rafael Dowsley, Jörn Müller-Quade and Anderson C. A. Nascimento, CCA2 Secure Variant of the McEliece Cryptosystem, IEEE Transactions on Information Theory, v. 58, p. 6672-6680, 2012
Bernardo Machado David, Rafael de Sousa, Anderson C A Nascimento, Efficient Fully Simulatable Oblivious Transfer From The McEliece Assumptions, EICE Transactions on Fundamentals of Electronics, Communications and Computer Science, v. E-95A, p. 567-575, 2012.
Rafael Dowsley ; Jeroen van de Graaf ; Joern Mueller-Quade ; Anderson C A Nascimento . Oblivious Transfer Based on the McEliece Assumptions. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, v. E-95A, p. 567-575, 2012
Rafael Tonicelli ; Jose Carrijo; Anderson C. A. Nascimento. A Fault Analytic Method against HB+. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sci- ence, v. E94A, p. 885-859, 2011
RafaelDowsley;AkiraOtsuka;GoichiroHanaoka;HidekiImai;AndersonC.A.Nascimento . Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre- Distributed Data. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, v. E94A, p. 725-734, 2011
Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C A Nascimento, Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model, IEEE Transactions on Information Theory, v. 57, p. 5566-5571, 2011
David, Bernardo ; Costa, Joao Paulo ; Anderson C. A. Nascimento ; Marcelo Holtz ; Dino Amaral ; Rafael de Sousa Jr. . A Parallel Approach to PCA Based Malicious Activity Detec- tion in Distributed Honeypot Data. The International Journal of Forensic Computer Science(Impresso), v. 6, p. 8-27, 2011
Rafael Dowsley ; Akira Otsuka ; Goichiro Hanaoka ; Hideki Imai; Anderson C. A. Nasci- mento. Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre- Distributed Data. IEICE Transactions on Fundamentals of Electronics, Commu- nications and Computer Science, v. E94A, p. 725-734, 2011.
Jose Carrijo; Rafael Tonicelli ; Hideki Imai; Anderson C. A. Nascimento. A Novel Proba- bilistic Passive Attack on the Protocols HB and HB+. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, v. E92.A, p. 658-662, 2009.
Anderson C. A. Nascimento ; Andreas Winter . On the Oblivious-Transfer Capacity of Noisy Resources. IEEE Transactions on Information Theory, v. 54, p. 2572-2581, 2008.
Anderson C. A. Nascimento ; Joao Barros ; Stefan Skludarek ; Hideki Imai. The Commitment Capacity of the Gaussian Channel Is Infinite. IEEE Transactions on Information Theory, v. 54, p. 2785-2789, 2008.
Joern Mueller-Quade ; Anderson C. A. Nascimento; Pim Tuyls ; Andreas Winter . An In- formation Theoretical Model for Quantum Secret Sharing Schemes. Quantum Information & Computation, Princeton, v. 5, n. 1, p. 69-80, 2005.
Anderson C. A. Nascimento; Joern Mueller-Quade; Hideki Imai. Improving Quantum Secret Sharing Schemes. Physical Review. A, United States, v. 64, n. 042311, p. 1-5, 2001.
Anderson C A Nascimento; Joern Mueller -Quade; IMAI, Hideki . Quantum Identification Protocols with Technologically Bounded Parties. Electronic Notes in Discrete Mathematics, Holland, v. 06, p. 1-10, 2001.
Papers Published in Peer-Reviewed Conferences and Workshops Proceedings
Admilson Ribeiro, Reneilson Santos, Anderson C. A. Nascimento, Anomaly Detection Technique for Intrusion Detection in SDN Environment using Continuous Data Stream Machine Learning Algorithms, IEEE International Systems Conference (SysCon) 2021
Secure Training of Extra Trees Classifiers over Continuous Data, C. A. Choudhary, M. DeCock, R. Dowsley, A. Nascimento, D. Railsback, in: AAAI-20 Workshop on Privacy-PreservingArtificial Intelligence, 2020 (oral presentation)
Yu, Bin, Giovanna Graciani, Anderson Nascimento, and Juhua Hu. ”Cost-adaptive NeuralNetworks for Peak Volume Prediction with EMM Filtering.” In 2019 IEEE International Con-ference on Big Data (Big Data), pp. 4208-4213. IEEE, 2019
Ribeiro, A. D. R. L., Ordonez, E. D. M., Nascimento, A. C. A. (2019). A Framework for NetworkIntrusion Detection using Network Programmability and Data Stream Clustering MachineLearning Algorithms. Annals of Computer Science and Information Systems, 20, 57-63
Peck, J., Grumer, C., Olumofin, F., Nascimento, A., De Cock, M. (2019). Hardening DGAClassifiers Utilizing IVAP. In IEEE Big Data.
De Cock, M., Dowsley, R., Nascimento, A., Railsback, D., Shen, J., Todoki, A. (2019). FastSecure Logistic Regression for High Dimensional Gene Data. In Privacy in Machine Learning(PriML2019). Workshop at NeurIPS.
Reich, Devin, Ariel Todoki, Rafael Dowsley, Martine De Cock, and Anderson Nascimento,”Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation.” Advances in Neural Information Processing Systems. NeurIPS 2019.
C. Choudhary, R. Sivaguru, M. Pereira, B. Yu, A. Nascimento, M. De Cock, AlgorithmicallyGenerated Domain Detection and Malware Family Classification, Proceedings of the SixthInternational Symposium on Security in Computing and Communications (SSCC’18), Com-munications in Computer and Information Science Series 969, p.640-655, 2019
R. Ahluwalia, E. Shcherbinina, E. Callow, A. Nascimento, M. De Cock, Detecting MisogynousTweets, Proceedings of the Third Workshop on Evaluation of Human Language Technologiesfor Iberian Languages (IberEval 2018), co-located with the 34th Conference of the SpanishSociety for Natural Language Processing (SE- PLN 2018), CEUR-WS, Vol 2150, p. 242-248,2018
R. Ahluwalia, H. Soni, E. Callow, A. Nascimento, M. De Cock, Detecting Hate Speech AgainstWomen in English Tweets, Proceedings of EVALITA 2018, CEUR-WS, Vol 2263, 201811.K. Fritchman, K. Saminathan, R. Dowsley, T. Hughes, M. De Cock, A. Nascimento, A. Tere-desai, Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Health-care, Proceedings of IEEE BigData2018 (2018 IEEE International Conference on Big Data), p.2412-2421, 20185
1M. Pereira, S. Coleman, B. Yu, M. De Cock, A. Nascimento, Dictionary Extraction and De-tection of Algorithmically Generated Domain Names in Passive DNS Traffic, Proceedings ofRAID 2018 (21st International Symposium on Research in Attacks, Intrusions and Defenses),Lecture Notes in Computer Science 11050, p. 295-314, 2018
R. Sivaguru, C. Choudhary, B. Yu, V. Tymchenko, A. Nascimento, M. De Cock, An Evaluationof DGA Classifiers, Proceedings of IEEE BigData2018 (2018 IEEE International Conferenceon Big Data), p. 5051-5060, 2018
Yu, Bin, Jie Pan, Jiaming Hu, Anderson Nascimento, and Martine De Cock. ”Character Levelbased Detection of DGA Domain Names.” International Joint Conference on Neural Net-works (IJCNN 2018)
Yu, Bin, Daniel L. Gray, Jie Pan, Martine De Cock, and Anderson CA Nascimento. ”Inlinedga detection with deep networks.” In 2017 IEEE International Conference on Data MiningWorkshops (ICDMW), pp. 683-692. IEEE, 2017
S. Bhagat, K. Saminathan, A. Agarwal, R. Dowsley, M. De Cock, A. Nascimento, Privacy-Preserving User Profiling with Facebook Likes, Proceedings of IEEE BigData2018 (2018 IEEEInternational Conference on Big Data), p. 5281-5282, 2018
Sisi Wang, Wing-Sea Poon, Golnoosh Farnadi, Caleb Horst, Kebra Thompson, Michael Nick-els, Anderson Nascimento, Martine De Cock, VirtualIdentity: Privacy Preserving User Pro-filing, IEEE/ACM International Conference on Advances in Social Networks Analysis andMining (ASONAM), 18-21, 2016, San Francisco, CA, USA
Goncalves, Ricardo ; Leonova, Ekaterina ; Puttini, Ricardo ; Nascimento, Anderson. A privacy-ensuring scheme for health data outsourcing. In: 2015 International Conference on CloudTechnologies and Applications (CloudTech), 2015, Marrakech. 2015 International Confer-ence on Cloud Technologies and Applications (CloudTech), 2015. p. 1-7.
Rafael Dowsley, Bernardo David, Raj Katti, Anderson C A Nascimento, Practical and Un-conditionally Secure Comparison with Applications for Private Machine Learning, ProvSec2015
Martine de Cock, Rafael Dowsley, Anderson Nascimento and Stacey Newman, Fast, PrivacyPreserving Linear Regression over Distributed Datasets based on Pre-Distributed Data, 8thACM Workshop on Artificial Intelligence and Security with the 22nd ACM Conference onComputer and Communications Security (CCS), 2015
Khot, Amruta, Abdeltawab Hendawi, Anderson Nascimento, Raj Katti, Ankur Teredesai, andMohamed Ali. ”Road network compression techniques in spatiotemporal embedded sys-tems: A survey.” In Proceedings of the 5th ACM SIGSPATIAL International Workshop onGeoStreaming, pp. 33-36. ACM, 2014
Bernardo David, Rafael Dowsley, Anderson Nascimento, Universally Composable ObliviousTransfer based on a variant of LPN accepted to 13th International Conference on Cryptologyand Network Security (CANS 2014), 22-24 Oct, Crete, Greece
Felipe Lacerda, Rafael Dowsley, Anderson C A Nascimento, Oblivious Transfer in the Bounded Storage Model with Errors, IEEE International Symposium on Information Theory (ISIT),Hawaii, 2014
Nico Doetlling ; Joern Muller-Quade; Anderson C. A. Nascimento. IND-CCA Secure Cryp-tography Based on a Variant of the LPN Problem. In: Advances in Cryptology ASIACRYPT 2012, Pequim. Lecture Notes in Computer Science. Berlin: Springer Berlin Heidelberg,2012. v. 7658. p. 485-503. (Invited to the Journal of Cryptology)
Bernardo Machado David ; Joern Muller-Quade; Anderson C. A. Nascimento. Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions. In:6th International Conference ICITS 2012, 2012, Montreal. Lecture Notes in Computer Sci-ence. Berlin: Springer Berlin Heidelberg, 2012. v. 7412. p. 80-90
PINTO, A.B. ; DAVID, B. M. ; Jeroen van de Graaf ; Nascimento, Anderson C. A. . Universally Composable Committed Oblivious Transfer With A Trusted Initializer. In: X II SimposioBrasileiro de Segurança da Informação e de Sistemas Computacionais, 2012, Curitiba. Anaisdo XII Simpósio Brasileiro de Segurança da Informacao e de Sistemas Computacionais. PortoAlegre: Sociedade Brasileira de Computação, 2012. p. 126-139
Max Melgar; Alexandre Zaghetto; Bruno Machiavello; Anderson C A Nascimento; CQRcodes: Colored quick-response codes. In: 2012 IEEE Second International Conference onConsumer Electronics Berlin (ICCEBerlin), 2012, Berlin. 2012 IEEE Second InternationalConference on Consumer Electronics - Berlin (ICCE-Berlin), 2012. p. 321-325
Bernardo Machado David. ; Anderson C. A. Nascimento. Efficient fully simulatable oblivioustransfer from the McEliece assumptions. In: 2011 IEEE Information theory Workshop, 2011,Paraty. Proceedings of the 2011 IEEE Information theory Workshop, 2011. p. 638-642
Carrijo, J. ; Tonicelli, R. ; ALVES, V. M. ; NASCIMENTO, Anderson C. A. . Fault Attacksagainst a Cellular Automata Based Stream Cipher. In: XI Simposio Brasileiro de Segurança daInformação e de Sistemas Computacionais, 2011, Brasilia. Anais do XI Simposio Brasileiro deSegurança da Informação e de Sistemas Computacionais. Porto Alegre : Sociedade Brasileirade Computacao, 2011. p. 85-94
DAVID, B. M. ; Tonicelli, R. ; NASCIMENTO, Anderson C. A. . Obtaining Efficient FullySimulatable Oblivious Transfer from General Assumptions. In: XI Simposio Brasileiro deSegurança da Informação e de Sistemas Computacionais, 2011, Brasilia. Anais do XI Sim-posio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Porto Alegre :Sociedade Brasileira de Computacao, 2011. p. 108-121.
DAVID, B. M. ; Holtz, Marcelo ; Amaral, Dino ; PAULO, J. ; NASCIMENTO, Anderson C. A. ;SOUSA, R. T. . Blind Automatic Malicious Activity Detection in Honeypot Data. In: International Conference on Forensic Computer Science (ICoFCS) 2011, 2011, Curitiba. Proceedingsof the International Conference on Forensic Computer Science (ICoFCS) 2011, 2011. p. 1-8
NOGUEIRA, R. ; NASCIMENTO, Anderson C. A. ; DAVID, B. M. . Oblivious Transfer Basedon the McEliece Assumptions with Unconditional Security for the Sender. In: Proceedings ofthe 10th Brazilian Symposium on Information and Computer Systems Security. Porto Alegre: Brazilian Computer Society (SBC), 2010
Rafael Dowsley ; HANAOKA, Goichiro ; IMAI, Hideki ; NASCIMENTO, Anderson C. A. .Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosyste. In: Pro-ceedings of the 10th Brazilian Symposium on Information and Computer Systems Security.Porto Alegre : Brazilian Computer Society (SBC), 2010
Rafael Dowsley ; Davidson Marques ; Jeroen van de Graaf ; Anderson C. A. Nascimento. ATwo- Party Protocol with Trusted Initializer for Computing the Inner Product. In: 11th Inter-national Workshop on Information Security Applications (WISA 2010), 2010, Cheju Island,Korea. Lecture Notes in Computer Science. Hildeberg, Germany : Springer-Verlag, 2010. v.6513. p. 337-350.7
Rafael Dowsley ; Anderson C. A. Nascimento; Hideki Imai ; Anderson C A Nascimento.Round-Optimal Deniable Ring Authentication in the Presence of Big Brother.. In: 11th International Workshop on Information Security Applications (WISA 2010), 2010, Cheju Island,Korea. Lecture Notes in Computer Science, 2010. v. 6513. p. 307-321
Rafael Dowsley ; Goichiro Hanaoka ; Anderson C. A. Nascimento; Mayana Pereira . PublicKey Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Basedon the CDH Assumption. In: 13th Information Security Conference (ISC 2010)., 2010, BocaRaton, Florida. Lecture Notes in Computer Science. Hildeberg, Germany : Springer-Verlag,2010. v. 6531. p. 299-306
Rodrigo Nogueira. ; Flavio de Moura. Mauricio Ayala Rincon. ; Anderson C. A. Nascimento.Formalization of Security Proofs Using PVS in the Dolev-Yao Model. In: 6th Computabilityin Europe - Programs, Proofs and Processes CiE 2010„ 2010, Azores. Proc. Computability inEurope - Programs, Proofs and Processes (Booklet) CiE 2010, 2010. p. 1-12
Rafael Dowsley ; Joern Mueller-Quade ; Anderson C. A. Nascimento. A CCA2 Secure PublickKey Encryption Scheme Based on the McEliece Assumptions in the Standard Model. In:CT-RSA 2009, 2009, San Francisco. Topics in Cryptology CT-RSA-2009, Lecture Notes inComputer Science. Berlin : Springer Verlag Berlin Heidelberg, 2009. v. 5473. p. 240-251
Rafael Dowsley ; Joern Mueller-Quade ; Anderson C. A. Nascimento; Jeroen van de Graaf. Oblivious Transfer Based on the McEliece Assumptions. In: International Conferenceon Information Theoretical Cryptography ICITS 2008, Calgary. Lecture Notes in ComputerScience. Berlim : Springer VErlag, 2008. v. 5155. p. 107-117
Rafael Dowsley ; Joern Mueller-Quade; Anderson C. A. Nascimento . On the Possibility ofUniversally Composable Commitments Based on Noisy Channels. In: SBSEG 2008, 2008,Gramado-RS. Proceedings of the 8th Brazilian Symposium on Information and ComputerSystems Security. Porto Alegre : Brazilian Computer Society (SBC), 2008
CALMON, F. D. ; COSTA, F. M. ; NASCIMENTO, Anderson C. A. . Desenvolvimento de umaCifra de Fluxo Baseada em Autômatos Celulares. In: XXVI Simpósio Brasileiro de Teleco-municações, 2008, Rio de Janeiro. Anais do XXVI Simpósio Brasileiro de Telecomunicações,2008. p. 1-6
Anderson C. A. NAscimento ; Kirill Morozov ; Hideki Imai. Efficient Oblivious TransferProtocols Achieving a Non-Zero Rate from Any Non-Trivial Noisy Correlation. In: Inter-national Conference on Information Theoretic Security (ICITS) 2007, 2007, madrid. lectureNotes in Computer Science. Berlim : springer Verlag, 2007
Honorio Assis Filho Crispim ; Eduardo T. L. Pastor ; Anderson C. A. Nascimento ; HumbertoAbdalla Jr ; Antonio José Martins Soares . IP/WDM Optical Network Testbed: Design andImplementation. Lecture Notes in Computer Science, v. 42387, p. 441-450, 2006
Anderson C. A. Nascimento ; Andreas Winter. On the Oblivious Transfer Capacity of NoisyCorrelations. In: 2006 IEEE International Symposium on Information Theory, 2006, Chicago.Proceedings of the 2006 IEEE International Symposium on Information Theory, 2006. p.1871-1875.
Joao Barros ; Hideki Imai; Anderson C. A. Nascimento; Stefan Skludarek . Bit Commitmentover Gaussian Channels. In: 2006 IEEE International Symposium on Information Theory,2006, Seatlle. Proceedings of the 2006 IEEE International Symposium on Information Theory,2006. p. 1437-1441.8
Hideki Imai ; Kirill Morozov ; Anderson C. A. Nascimento ; Andreas Winter . Efficient Proto-cols Achieving the Commitment Capacity of Noisy Correlations. In: 2006 IEEE InternationalSymposium on Information Theory, 2006, Seatlle. Proceedings of the 2006 IEEE InternationalSymposium on Information Theory, 2006. p. 1432-1436
Koutarou Suzuki ; Koji chida ; Anderson C. A. Nascimento; Shigenori .Uchiyama. Efficient,Non-Optimistic Secure Circuit Evaluation Based on the ElGamal Encryption, WISA 2005,Lecture Notes in Computer Science, Berlin, v. 3786, p. 328-342, 2005
Anderson C. A. Nascimento; Joern Mueller-Quade ; Hideki Imai . Bit String CommitmentReductions with a Non-Zero Rate, CT-RSA 2004, Lecture Notes in Computer Science, Berlin,v. 2964, p. 179-193, 2004
Anderson C. A. Nascimento; Joern Mueller-quade; Akira Otsuka ; Goichiro Hanaoka . Un-conditionally Non-Interactive Verifiable Secret Sharing Secure Against Faulty Majorities inthe Commodity Based Model, ACNS 2004Lecture Notes in Computer Science, Berlin, v. 3089,p. 355-368, 2004
Goichiro Hanaoka ; Hideki Imai; Joern Mueller-Quade ; Anderson C. A. Nascimento ; Andreas Winter. Information Theoretical Secure Oblivious Polynomial Evaluation: Model,Bounds and Constructions. ACISP 2004, Lecture Notes in Computer Science, Berlin, v. 3108,p. 62-73, 2004
Hideki Imai ; Joern Mueller-Quade ; Anderson C A Nascimento; Andreas Winter . Non-Interactive Commitments based on Unfair Noisy Channels. In: International Symposium onInformation Theory and its Applications, 2004, Parma
Hideki Imai; Joern Mueller-Quade ; Anderson C. A. Nascimento ; Andreas Winter. Rates forCoin Tossing and Commitment from Noisy Correlation. In: IEEE, International Symposiumon Information Theory, 2004, Chicago. Information Theory, 2002. Proceedings. 2004 IEEEInternational Symposium on, 2004
Akira Otsuka ; Anderson C. A. Nascimento. Unconditionally Secure Polynomial EvaluationAnd Its Application To Electronic Voting. In: IEICE Technical Committee Meeting, 2004,Tokyo. IEIC Technical Report. Tokyo : Institute of Electronics, Information and Communication Engineers, 2004. v. 104. p. 157-164
TAKAYUKI, F. ; NASCIMENTO, Anderson C. A. ; MATSUURA, K. ; IMAI, Hideki . Estima-tions of Kolmogorov Complexity and Detection Performance of Denial-of-Service Attacks..In: Joho Shori Gakkai Kenkyu Hokoku, 2004, Tokyo. Joho Shori Gakkai Kenkyu Hokoku,2004. v. 2004. p. 127-132
TAKAYUKI, F. ; MATSUURA, K. ; IMAI, Hideki ; NASCIMENTO, Anderson C. A. . Detec-tion of Several Types of DoS Attacks by Kolmogorov Complexity. In: Joho Shori GakkaiShinpojiumu Ronbunshu, 2004, Tokyo. Joho Shori Gakkai Shinpojiumu Ronbunshu, 2004. v.2004
Anderson C A Nascimento; Joern Mueller-quade ; Hideki Imai . Unconditionally Secure Ho-momorphic Pre-Distributed Commitments AAECC 2003. Lecture Notes in Computer Sci-ence, Berlin, v. 2643, p. 87-97, 2003
Anderson C A Nascimento ; Joern Mueller-Quade ; Akira Otsuka ; Goichiro Hanaoka; HidekiImai . Unconditionally Secure Pre-Distributed Homomorphic Commitments and SecureTwo-Party Computations, ISC 2003 Lecture Notes in Computer Science, Berlin, v. 2851,p. 1561-164, 2003.9
NASCIMENTO, Anderson C A ; QUADE, Joern Mueller ; HANAOKA, Goichiro ; OTSUKA,Akira ; IMAI, Hideki . Secure Two Party Computations. In: Symposium on Cryptographyand Information Security, 2003, 2003
NAKANE, Misa ; NASCIMENTO, Anderson C A ; QUADE, Joern Mueller ; IMAI, Hideki .Improving a Computationally Secure Quantum Bit Commitment Scheme. In: Symposiumon Cryptography and Information Security, 2003, 2003
Anderson C. A. Nascimento ; Joern Mueller-Quade ; Akira Otsuka ; Andreas Winter . Unconditionally Secure Homomorphic Pre-Distributed Commitments. In: IEEE, InternationalSymposium on Information Theory, 2003, Yokohama. Information Theory, 2003. Proceedings. 2002 IEEE International Symposium on, 2003
KENTARO, I. ; NASCIMENTO, Anderson C. A. ; IMAI, Hideki . Gambling with quantumside information. In: Symposium on Information theory and Its Applications, 2003. The proceedings of the Symposium on Information Theory and Its Applications, 2003
Andreas Winter; Anderson C. A. Nascimento ; Hideki Imai . Commitment Capacity of Discrete Memoryless Channels, Coding and Cryptography 2003, Lecture Notes in ComputerScience, Berlin, v. 2898, p. 35-51, 2003
NASCIMENTO, Anderson C A ; QUADE, Joern Mueller ; IMAI, Hideki . Impossibility Resultson Bit Commitment Reductions. In: Symposium on Cryptography and Information Security,2002, 2002
NASCIMENTO, Anderson C A ; QUADE, Joern Mueller ; OTSUKA, Akira ; IMAI, Hideki .Bit Commitments based on a Trusted Initializer with Dynamic Senders. In: InternationalSymposium on Information Theory and its Applications, 2002, Xian, 2002
NASCIMENTO, Anderson C. A. ; RAHMAN, Mohammad Ghulam ; IMAI, Hideki . On Inter-active Key Pre-Distribution Schemes. In: Symposium on Information Theory and its Applications, 2002, 2002
NAKANE, Misa ; NASCIMENTO, Anderson C A ; IMAI, Hideki . Security of Quantum BitCommitment from a Physical Assumption. In: Symposium on Information Theory and itsApplications, 2002, 2002
Anderson C. A. Nascimento; Joern Mueller-Quade ; Hideki Imai . Optimal Multi-Bit Commit-ments to Weak Commitments. In: IEEE, International Symposium on Information Theory,2002, Lausanne. Information Theory, 2002. Proceedings. 2002 IEEE International Sympo-sium on, 2002
NASCIMENTO, Anderson C A ; QUADE, Joern Mueller ; IMAI, Hideki . On AuthenticatedData Transmission Over a Quantum Channel. In: Symposium on Cryptography and Information Security, 2001, 2001
Anderson C A Nascimento; Joern Mueller-Quade ; Hideki .Imai A Coding Scheme for Uncon-ditional Security Over Data Packet Networks,. In: International Symposium on InformationTheory and its Applications, 2001, Honolulu, 2001
Markus Breitbach ; Hideki Imai; Anderson C A Nascimento. Attacks on Watermarks inDigital Images: A Classification from the Copyright Holder’s Viewpoint. In: InternationalSymposium on Information Theory and its Applications, 2001, Honolulu, 2001.10
NASCIMENTO, Anderson C. A. ; QUADE, Joern Mueller ; IMAI, Hideki . Secure WitnessesBased Cryptographic Systems. In: Symposium on Cryptography and Information Security,2000, 2000.72.NASCIMENTO, Anderson C. A. ; QUADE, Joern Mueller ; IMAI, Hideki . Improving DigitalSignatures by Use of Witnesses. In: IEICE, ISEC 11, Technical Meeting, 2000, Tokyo, 2000.