Rafael Dowsley

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
MUSEN: aggregatable key-evolving verifiable random functions and applications2025-01-10Paper
CRAFT: \underline{C}omposable \underline{R}andomness beacons and output-independent \underline{A}bort MPC \underline{F}rom \underline{T}ime
Lecture Notes in Computer Science
2023-11-24Paper
Post-quantum verifiable random function from symmetric primitives in PoS blockchain
Computer Security – ESORICS 2022
2023-07-21Paper
(Public) verifiability for composable protocols without adaptivity or zero-knowledge
Provable and Practical Security
2023-07-21Paper
Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model2023-03-22Paper
TARDIS: a foundation of time-lock puzzles in UC2021-12-08Paper
Insured MPC: efficient secure computation with financial penalties2021-02-08Paper
On the Commitment Capacity of Unfair Noisy Channels
IEEE Transactions on Information Theory
2020-09-29Paper
Efficient UC commitment extension with homomorphism for free (and applications)2020-05-05Paper
On the impossibility of structure-preserving deterministic primitives
Journal of Cryptology
2019-01-29Paper
21 -- bringing down the complexity: fast composable protocols for card games without secret state2018-09-26Paper
Commitment and Oblivious Transfer in the Bounded Storage Model With Errors
IEEE Transactions on Information Theory
2018-09-19Paper
On the Oblivious Transfer Capacity of Generalized Erasure Channels Against Malicious Adversaries: The Case of Low Erasure Probability
IEEE Transactions on Information Theory
2018-06-27Paper
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model
IEEE Transactions on Information Theory
2017-07-12Paper
A CCA2 Secure Variant of the McEliece Cryptosystem
IEEE Transactions on Information Theory
2017-06-08Paper
Efficient unconditionally secure comparison and privacy preserving machine learning classification protocols
Provable Security
2016-01-27Paper
Weakening the isolation assumption of tamper-proof hardware tokens
Lecture Notes in Computer Science
2015-09-24Paper
Digital signatures from strong RSA without prime generation
Lecture Notes in Computer Science
2015-08-27Paper
How secure is deterministic encryption?
Lecture Notes in Computer Science
2015-08-27Paper
Universally composable oblivious transfer based on a variant of LPN
Cryptology and Network Security
2015-02-10Paper
On the impossibility of structure-preserving deterministic primitives
Theory of Cryptography
2014-02-18Paper
Standard security does not imply security against selective-opening
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Oblivious Transfer Based on the McEliece Assumptions
Lecture Notes in Computer Science
2009-01-09Paper


Research outcomes over time


This page was built for person: Rafael Dowsley