Recent Publications in Privacy Preserving Machine Learning

Amanda Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento Ander- son, Diego Aranha, ”Fast privacy-preserving text classification based on secure multiparty computation”, IEEE Transactions on Information Forensics and Security, 2022

Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson Nascimento, Davis Railsback, Jianwei Shen, Privacy-Preserving Training of Tree Ensembles over Continuous Data, PoPETS, 2022.

M. De Cock, R. Dowsley; A. C.A. Nascimento; D. Railsback; J. Shen; A. Todoki, High Performance Logistic Regression for Privacy-Preserving Genome Analysis, BMC Medical Genomics, 2021

D. Reich, A. Todoki, R. Dowsley, M. De Cock, A. Nascimento. Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation, in: Advances in Neural Information Processing Systems 32 (NeurIPS), p. 3752-3764, 2019

M. De Cock, R. Dowsley, C. Horst, R. Katti, A. Nascimento, W.-S. Poon, S. Truex. Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation. IEEE Transactions on Dependable and Secure Computing 16(2), p. 217-230, 2019

A. Agarwal, R. Dowsley, N. McKinney, D. Wu, C.-T. Lin, M. De Cock, A. Nascimento. Protecting Privacy of Users in Brain-Computer Interface Applications. IEEE Transactions on Neural Systems \& Rehabilitation Engineering, 27(8), p.1546-1555, 2019

K. Fritchman, K. Saminathan, R. Dowsley, T. Hughes, M. De Cock, A. Nascimento, A. Teredesai. Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare Proceedings of IEEE BigData2018 (2018 IEEE International Conference on Big Data), p. 2412-2421, 2018

S. Wang, W.-S. Poon, G. Farnadi, C. Horst, K. Thompson, M. Nickels, A. Nascimento, M. De Cock. VirtualIdentity: Privacy Preserving User Profiling in: Proceedings of ASONAM 2016 (IEEE/ACM International Conference on Social Networks Analysis and Mining), p.1434-1437, 2016

M. De Cock, R. Dowsley, A. Nascimento, S. Newman. Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data. Proc. of AI-Sec 2015 (8th ACM Workshop on Artificial Intelligence and Security), workshop at ACM CCS2015

Selected Publications in Information Theoretically Secure Cryptography

Crepeau, Claude, Rafael Dowsley, and Anderson CA Nascimento. ”On the commitment capacity of unfair noisy channels.” to appear, IEEE Transactions on Information Theory, 2020

Dowsley, Rafael, Jorn Muller-Quade, and Anderson CA Nascimento. ”On the Composability of Statistically Secure Random Oblivious Transfer.” Entropy 22.1, 2020.

Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento, Commitment and Oblivious Transfer in the Bounded Storage Model with Errors, IEEE Trans on Info Theory, 2018.

Rafael Dowsley, Anderson C A Nascimento, On the Oblivious Transfer Capacity of Generalized Erasure Channels Against Malicious Adversaries: The Case of Low Erasure Probability, 2018 IEEE Trans on Info Theory

Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C A Nascimento, Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model, IEEE Transactions on Information Theory, v. 57, p. 5566-5571, 2011

Anderson C. A. Nascimento ; Andreas Winter . On the Oblivious-Transfer Capacity of Noisy Resources. IEEE Transactions on Information Theory, v. 54, p. 2572-2581, 2008.

Anderson C. A. Nascimento ; Joao Barros ; Stefan Skludarek ; Hideki Imai. The Commitment Capacity of the Gaussian Channel Is Infinite. IEEE Transactions on Information Theory, v. 54, p. 2785-2789, 2008.

Joern Mueller-Quade ; Anderson C. A. Nascimento; Pim Tuyls ; Andreas Winter . An Information Theoretical Model for Quantum Secret Sharing Schemes. Quantum Information & Computation, Princeton, v. 5, n. 1, p. 69-80, 2005.

Andreas Winter; Anderson C. A. Nascimento ; Hideki Imai . Commitment Capacity of Discrete Memoryless Channels, Coding and Cryptography 2003, Lecture Notes in ComputerScience, Berlin, v. 2898, p. 35-51, 2003

Anderson C. A. Nascimento; Joern Mueller-Quade; Hideki Imai. Improving Quantum Secret Sharing Schemes. Physical Review. A, United States, v. 64, n. 042311, p. 1-5, 2001.

Selected Publications in Code-Based Cryptography

Nico Döttling, Rafael Dowsley, Jörn Müller-Quade and Anderson C. A. Nascimento, CCA2 Secure Variant of the McEliece Cryptosystem, IEEE Transactions on Information Theory, v. 58, p. 6672-6680, 2012

Bernardo Machado David, Rafael de Sousa, Anderson C A Nascimento, Efficient Fully Simulatable Oblivious Transfer From The McEliece Assumptions, EICE Transactions on Fundamentals of Electronics, Communications and Computer Science, v. E-95A, p. 567-575, 2012.

Bernardo David, Rafael Dowsley, Anderson Nascimento, Universally Composable Oblivious Transfer based on a variant of LPN accepted to 13th International Conference on Cryptology and Network Security (CANS 2014), 22-24 Oct, Crete, Greece

Nico Doetlling ; Joern Muller-Quade; Anderson C. A. Nascimento. IND-CCA Secure Cryp-tography Based on a Variant of the LPN Problem. In: Advances in Cryptology ASIACRYPT 2012, Pequim. Lecture Notes in Computer Science. Berlin: Springer Berlin Heidelberg,2012. v. 7658. p. 485-503. (Invited to the Journal of Cryptology)

Bernardo Machado David ; Joern Muller-Quade; Anderson C. A. Nascimento. Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions. In:6th International Conference ICITS 2012, 2012, Montreal. Lecture Notes in Computer Sci-ence. Berlin: Springer Berlin Heidelberg, 2012. v. 7412. p. 80-90

Rafael Dowsley ; Joern Mueller-Quade ; Anderson C. A. Nascimento; Jeroen van de Graaf. Oblivious Transfer Based on the McEliece Assumptions. In: International Conferenceon Information Theoretical Cryptography ICITS 2008, Calgary. Lecture Notes in ComputerScience. Berlim : Springer VErlag, 2008. v. 5155. p. 107-117

Full Publication List

Edited Books (Conference Proceedings)

  1. Barreto, P. ; NASCIMENTO, Anderson C A . Information Theoretic Security. 1. ed. Springer International Publishing, 2016. v. 1.

  2. BISHOP, M. ; Anderson C A Nascimento . Information Security. 1. ed. Springer Verlag, 2016. v. 1. 342p .

  3. NASCIMENTO, Anderson C. A. ; SOUSA, R. T. ; Jeroen van de Graaf ; CARMO, L. F. R. ; Nogueira, M. . ANAIS DO 11 SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS.. 11. ed. Porto Alegre: Sociedade Brasileira de Computação, 2011. v. 1. 414p .

  4. ;NASCIMENTO, Anderson C. A.; OLIVEIRA, L. B. (Org.) ; NUNES, R. C. (Org.) ; DAHAB, R. (Org.) . ANAIS DO 9° SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS. Porto Alegre: Sociedade Brasileira de Computação, 2009. v. 1. 368p

Journal Papers

  1. Amanda Resende, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento Anderson, Diego Aranha, ”Fast privacy-preserving text classification based on secure multiparty computation”, IEEE Transactions on Information Forensics and Security, 2022

  2. Samuel Adams, Chaitali Choudhary, Martine De Cock, Rafael Dowsley, David Melanson, Anderson Nascimento, Davis Railsback, Jianwei Shen, Privacy-Preserving Training of Tree Ensembles over Continuous Data, PoPETS, 2022.

  3. M. De Cock, R. Dowsley; A. C.A. Nascimento; D. Railsback; J. Shen; A. Todoki, High Performance Logistic Regression for Privacy-Preserving Genome Analysis, to appear BMC Medical Genomics

  4. Sivaguru, Raaghavi, Jonathan Peck, Femi Olumofin, Anderson Nascimento, and Martine De Cock. ”Inline Detection of DGA Domains Using Side Information.” arXiv preprint arXiv:2003.05703 (2020), to appear, IEEE Access (2020).

  5. Crepeau, Claude, Rafael Dowsley, and Anderson CA Nascimento. ”On the commitment ca- pacity of unfair noisy channels.” to appear, IEEE Transactions on Information Theory, 2020

  6. Dowsley, Rafael, Jorn Muller-Quade, and Anderson CA Nascimento. ”On the Composability of Statistically Secure Random Oblivious Transfer.” Entropy 22.1, 2020.

  7. Jonathan Peck, Claire Nie, Raaghavi Sivaguru, Charles Grumer, Femi Olumofin, Bin Yu, Anderson Nascimento and Martine de Cock, CharBot: A Simple and Effective Method for Evad- ing DGA Classifiers, IEEE Access, 2019.

  8. Anisha Agarwal, Rafael Dowsley, Nicholas D. McKinney, Dongrui Wu, Chin-Teng Lin, Mar- tine De Cock, and Anderson Nascimento, Protecting Privacy of Users in Brain-Computer Interface Applications, IEEE Transactions on Neural Systems Rehabilitation Engineering, 2019

  9. Yu, Bin, Jie Pan, Daniel Gray, Jiaming Hu, Chhaya Choudhary, Anderson Nascimento, and Martine De Cock. ”Weakly Supervised Deep Learning for the Detection of Domain Genera- tion Algorithms.” IEEE Access (2019).

  10. Caleb Horst, Wing-Sea Poon, Stacey Newman, Rafael Dowsley, Martine de Cock, Raj Katti, Anderson C A Nascimento, Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation, IEEE Transactions on Secure and Dependable Computing,2019.

  11. Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento, Commitment and Oblivious Transfer in the Bounded Storage Model with Errors, IEEE Trans on Info Theory, 2018.

  12. Rafael Dowsley, Anderson C A Nascimento, On the Oblivious Transfer Capacity of Generalized Erasure Channels Against Malicious Adversaries: The Case of Low Erasure Probability, 2018 IEEE Trans on Info Theory

  13. Joao Gondim, Robson De Oliveira Albuquerque, Anderson C. A. Nascimento, Luis Villalba, Tai-hoon Kim, A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things, Sensors, 2017.

  14. Stefano Souza, Ricardo Goncalves, Ekaterina Leonova, Ricardo Puttini and Anderson C. A. Nascimento Privacy-ensuring electronic health records on the cloud, Concurrency and Com- putation: Practice and Experience 29, no. 11 (2017)

  15. Bernardo David, Rafael Dowsley, Jeroen van de Graaf, Adriana Pinto, Anderson C A Nascimento, Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra, IEEE Trans on Information Forensics and Security, 2016

  16. Homero Oliveira Martins, Anderson C A Nascimento, QC-MDPC McEliece: an Optimized Implementation of a New McEliece Variant, IEEE Latin America Transactions, (Volume:13 , Issue: 6 ), 2015

  17. Mayana Pereira, Rafael Dowsley, Goichiro Hanaoka, A. C. A. Nascimento, Public-Key En- cryption Schemes with Bounded CCA Security and Optimal Ciphertext Lenght Based on the CDH and HDH Assumptions”, The Computer Journal, Oxford University Press, 2015

  18. RafaelTonicelli,AndersonCANascimento,RafaelDowsley,HidekiImai,GoichiroHanaoka, Akira Otsuka, Joern Muller-Quade, Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model. International Journal of Information Security, Springer Verlag, 2015

  19. Rafael Dowsley, Joern Mueller-Quade, Jeroen van de Graaf, Anderson C. A. Nascimento. On the Composability of Statistically Secure Bit Commitments (invited paper). Journal of Internet Technology, v.14, pg 509-516, 2013

  20. Nico Döttling, Rafael Dowsley, Jörn Müller-Quade and Anderson C. A. Nascimento, CCA2 Secure Variant of the McEliece Cryptosystem, IEEE Transactions on Information Theory, v. 58, p. 6672-6680, 2012

  21. Bernardo Machado David, Rafael de Sousa, Anderson C A Nascimento, Efficient Fully Simulatable Oblivious Transfer From The McEliece Assumptions, EICE Transactions on Fundamentals of Electronics, Communications and Computer Science, v. E-95A, p. 567-575, 2012.

  22. Rafael Dowsley ; Jeroen van de Graaf ; Joern Mueller-Quade ; Anderson C A Nascimento . Oblivious Transfer Based on the McEliece Assumptions. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, v. E-95A, p. 567-575, 2012

  23. Rafael Tonicelli ; Jose Carrijo; Anderson C. A. Nascimento. A Fault Analytic Method against HB+. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sci- ence, v. E94A, p. 885-859, 2011

  24. RafaelDowsley;AkiraOtsuka;GoichiroHanaoka;HidekiImai;AndersonC.A.Nascimento . Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre- Distributed Data. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, v. E94A, p. 725-734, 2011

  25. Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C A Nascimento, Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model, IEEE Transactions on Information Theory, v. 57, p. 5566-5571, 2011

  26. David, Bernardo ; Costa, Joao Paulo ; Anderson C. A. Nascimento ; Marcelo Holtz ; Dino Amaral ; Rafael de Sousa Jr. . A Parallel Approach to PCA Based Malicious Activity Detec- tion in Distributed Honeypot Data. The International Journal of Forensic Computer Science(Impresso), v. 6, p. 8-27, 2011

  27. Rafael Dowsley ; Akira Otsuka ; Goichiro Hanaoka ; Hideki Imai; Anderson C. A. Nasci- mento. Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre- Distributed Data. IEICE Transactions on Fundamentals of Electronics, Commu- nications and Computer Science, v. E94A, p. 725-734, 2011.

  28. Jose Carrijo; Rafael Tonicelli ; Hideki Imai; Anderson C. A. Nascimento. A Novel Proba- bilistic Passive Attack on the Protocols HB and HB+. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, v. E92.A, p. 658-662, 2009.

  29. Anderson C. A. Nascimento ; Andreas Winter . On the Oblivious-Transfer Capacity of Noisy Resources. IEEE Transactions on Information Theory, v. 54, p. 2572-2581, 2008.

  30. Anderson C. A. Nascimento ; Joao Barros ; Stefan Skludarek ; Hideki Imai. The Commitment Capacity of the Gaussian Channel Is Infinite. IEEE Transactions on Information Theory, v. 54, p. 2785-2789, 2008.

  31. Joern Mueller-Quade ; Anderson C. A. Nascimento; Pim Tuyls ; Andreas Winter . An In- formation Theoretical Model for Quantum Secret Sharing Schemes. Quantum Information & Computation, Princeton, v. 5, n. 1, p. 69-80, 2005.

  32. Anderson C. A. Nascimento; Joern Mueller-Quade; Hideki Imai. Improving Quantum Secret Sharing Schemes. Physical Review. A, United States, v. 64, n. 042311, p. 1-5, 2001.

  33. Anderson C A Nascimento; Joern Mueller -Quade; IMAI, Hideki . Quantum Identification Protocols with Technologically Bounded Parties. Electronic Notes in Discrete Mathematics, Holland, v. 06, p. 1-10, 2001.

Papers Published in Peer-Reviewed Conferences and Workshops Proceedings

  1. Admilson Ribeiro, Reneilson Santos, Anderson C. A. Nascimento, Anomaly Detection Technique for Intrusion Detection in SDN Environment using Continuous Data Stream Machine Learning Algorithms, IEEE International Systems Conference (SysCon) 2021

  2. Secure Training of Extra Trees Classifiers over Continuous Data, C. A. Choudhary, M. DeCock, R. Dowsley, A. Nascimento, D. Railsback, in: AAAI-20 Workshop on Privacy-PreservingArtificial Intelligence, 2020 (oral presentation)

  3. Yu, Bin, Giovanna Graciani, Anderson Nascimento, and Juhua Hu. ”Cost-adaptive NeuralNetworks for Peak Volume Prediction with EMM Filtering.” In 2019 IEEE International Con-ference on Big Data (Big Data), pp. 4208-4213. IEEE, 2019

  4. Ribeiro, A. D. R. L., Ordonez, E. D. M., Nascimento, A. C. A. (2019). A Framework for NetworkIntrusion Detection using Network Programmability and Data Stream Clustering MachineLearning Algorithms. Annals of Computer Science and Information Systems, 20, 57-63

  5. Peck, J., Grumer, C., Olumofin, F., Nascimento, A., De Cock, M. (2019). Hardening DGAClassifiers Utilizing IVAP. In IEEE Big Data.

  6. De Cock, M., Dowsley, R., Nascimento, A., Railsback, D., Shen, J., Todoki, A. (2019). FastSecure Logistic Regression for High Dimensional Gene Data. In Privacy in Machine Learning(PriML2019). Workshop at NeurIPS.

  7. Reich, Devin, Ariel Todoki, Rafael Dowsley, Martine De Cock, and Anderson Nascimento,”Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation.” Advances in Neural Information Processing Systems. NeurIPS 2019.

  8. C. Choudhary, R. Sivaguru, M. Pereira, B. Yu, A. Nascimento, M. De Cock, AlgorithmicallyGenerated Domain Detection and Malware Family Classification, Proceedings of the SixthInternational Symposium on Security in Computing and Communications (SSCC’18), Com-munications in Computer and Information Science Series 969, p.640-655, 2019

  9. R. Ahluwalia, E. Shcherbinina, E. Callow, A. Nascimento, M. De Cock, Detecting MisogynousTweets, Proceedings of the Third Workshop on Evaluation of Human Language Technologiesfor Iberian Languages (IberEval 2018), co-located with the 34th Conference of the SpanishSociety for Natural Language Processing (SE- PLN 2018), CEUR-WS, Vol 2150, p. 242-248,2018

  10. R. Ahluwalia, H. Soni, E. Callow, A. Nascimento, M. De Cock, Detecting Hate Speech AgainstWomen in English Tweets, Proceedings of EVALITA 2018, CEUR-WS, Vol 2263, 201811.K. Fritchman, K. Saminathan, R. Dowsley, T. Hughes, M. De Cock, A. Nascimento, A. Tere-desai, Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Health-care, Proceedings of IEEE BigData2018 (2018 IEEE International Conference on Big Data), p.2412-2421, 20185

  11. 1M. Pereira, S. Coleman, B. Yu, M. De Cock, A. Nascimento, Dictionary Extraction and De-tection of Algorithmically Generated Domain Names in Passive DNS Traffic, Proceedings ofRAID 2018 (21st International Symposium on Research in Attacks, Intrusions and Defenses),Lecture Notes in Computer Science 11050, p. 295-314, 2018

  12. R. Sivaguru, C. Choudhary, B. Yu, V. Tymchenko, A. Nascimento, M. De Cock, An Evaluationof DGA Classifiers, Proceedings of IEEE BigData2018 (2018 IEEE International Conferenceon Big Data), p. 5051-5060, 2018

  13. Yu, Bin, Jie Pan, Jiaming Hu, Anderson Nascimento, and Martine De Cock. ”Character Levelbased Detection of DGA Domain Names.” International Joint Conference on Neural Net-works (IJCNN 2018)

  14. Yu, Bin, Daniel L. Gray, Jie Pan, Martine De Cock, and Anderson CA Nascimento. ”Inlinedga detection with deep networks.” In 2017 IEEE International Conference on Data MiningWorkshops (ICDMW), pp. 683-692. IEEE, 2017

  15. S. Bhagat, K. Saminathan, A. Agarwal, R. Dowsley, M. De Cock, A. Nascimento, Privacy-Preserving User Profiling with Facebook Likes, Proceedings of IEEE BigData2018 (2018 IEEEInternational Conference on Big Data), p. 5281-5282, 2018

  16. Sisi Wang, Wing-Sea Poon, Golnoosh Farnadi, Caleb Horst, Kebra Thompson, Michael Nick-els, Anderson Nascimento, Martine De Cock, VirtualIdentity: Privacy Preserving User Pro-filing, IEEE/ACM International Conference on Advances in Social Networks Analysis andMining (ASONAM), 18-21, 2016, San Francisco, CA, USA

  17. Goncalves, Ricardo ; Leonova, Ekaterina ; Puttini, Ricardo ; Nascimento, Anderson. A privacy-ensuring scheme for health data outsourcing. In: 2015 International Conference on CloudTechnologies and Applications (CloudTech), 2015, Marrakech. 2015 International Confer-ence on Cloud Technologies and Applications (CloudTech), 2015. p. 1-7.

  18. Rafael Dowsley, Bernardo David, Raj Katti, Anderson C A Nascimento, Practical and Un-conditionally Secure Comparison with Applications for Private Machine Learning, ProvSec2015

  19. Martine de Cock, Rafael Dowsley, Anderson Nascimento and Stacey Newman, Fast, PrivacyPreserving Linear Regression over Distributed Datasets based on Pre-Distributed Data, 8thACM Workshop on Artificial Intelligence and Security with the 22nd ACM Conference onComputer and Communications Security (CCS), 2015

  20. Khot, Amruta, Abdeltawab Hendawi, Anderson Nascimento, Raj Katti, Ankur Teredesai, andMohamed Ali. ”Road network compression techniques in spatiotemporal embedded sys-tems: A survey.” In Proceedings of the 5th ACM SIGSPATIAL International Workshop onGeoStreaming, pp. 33-36. ACM, 2014

  21. Bernardo David, Rafael Dowsley, Anderson Nascimento, Universally Composable ObliviousTransfer based on a variant of LPN accepted to 13th International Conference on Cryptologyand Network Security (CANS 2014), 22-24 Oct, Crete, Greece

  22. Felipe Lacerda, Rafael Dowsley, Anderson C A Nascimento, Oblivious Transfer in the Bounded Storage Model with Errors, IEEE International Symposium on Information Theory (ISIT),Hawaii, 2014

  23. Nico Doetlling ; Joern Muller-Quade; Anderson C. A. Nascimento. IND-CCA Secure Cryp-tography Based on a Variant of the LPN Problem. In: Advances in Cryptology ASIACRYPT 2012, Pequim. Lecture Notes in Computer Science. Berlin: Springer Berlin Heidelberg,2012. v. 7658. p. 485-503. (Invited to the Journal of Cryptology)

  24. Bernardo Machado David ; Joern Muller-Quade; Anderson C. A. Nascimento. Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions. In:6th International Conference ICITS 2012, 2012, Montreal. Lecture Notes in Computer Sci-ence. Berlin: Springer Berlin Heidelberg, 2012. v. 7412. p. 80-90

  25. PINTO, A.B. ; DAVID, B. M. ; Jeroen van de Graaf ; Nascimento, Anderson C. A. . Universally Composable Committed Oblivious Transfer With A Trusted Initializer. In: X II SimposioBrasileiro de Segurança da Informação e de Sistemas Computacionais, 2012, Curitiba. Anaisdo XII Simpósio Brasileiro de Segurança da Informacao e de Sistemas Computacionais. PortoAlegre: Sociedade Brasileira de Computação, 2012. p. 126-139

  26. Max Melgar; Alexandre Zaghetto; Bruno Machiavello; Anderson C A Nascimento; CQRcodes: Colored quick-response codes. In: 2012 IEEE Second International Conference onConsumer Electronics Berlin (ICCEBerlin), 2012, Berlin. 2012 IEEE Second InternationalConference on Consumer Electronics - Berlin (ICCE-Berlin), 2012. p. 321-325

  27. Bernardo Machado David. ; Anderson C. A. Nascimento. Efficient fully simulatable oblivioustransfer from the McEliece assumptions. In: 2011 IEEE Information theory Workshop, 2011,Paraty. Proceedings of the 2011 IEEE Information theory Workshop, 2011. p. 638-642

  28. Carrijo, J. ; Tonicelli, R. ; ALVES, V. M. ; NASCIMENTO, Anderson C. A. . Fault Attacksagainst a Cellular Automata Based Stream Cipher. In: XI Simposio Brasileiro de Segurança daInformação e de Sistemas Computacionais, 2011, Brasilia. Anais do XI Simposio Brasileiro deSegurança da Informação e de Sistemas Computacionais. Porto Alegre : Sociedade Brasileirade Computacao, 2011. p. 85-94

  29. DAVID, B. M. ; Tonicelli, R. ; NASCIMENTO, Anderson C. A. . Obtaining Efficient FullySimulatable Oblivious Transfer from General Assumptions. In: XI Simposio Brasileiro deSegurança da Informação e de Sistemas Computacionais, 2011, Brasilia. Anais do XI Sim-posio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Porto Alegre :Sociedade Brasileira de Computacao, 2011. p. 108-121.

  30. DAVID, B. M. ; Holtz, Marcelo ; Amaral, Dino ; PAULO, J. ; NASCIMENTO, Anderson C. A. ;SOUSA, R. T. . Blind Automatic Malicious Activity Detection in Honeypot Data. In: International Conference on Forensic Computer Science (ICoFCS) 2011, 2011, Curitiba. Proceedingsof the International Conference on Forensic Computer Science (ICoFCS) 2011, 2011. p. 1-8

  31. NOGUEIRA, R. ; NASCIMENTO, Anderson C. A. ; DAVID, B. M. . Oblivious Transfer Basedon the McEliece Assumptions with Unconditional Security for the Sender. In: Proceedings ofthe 10th Brazilian Symposium on Information and Computer Systems Security. Porto Alegre: Brazilian Computer Society (SBC), 2010

  32. Rafael Dowsley ; HANAOKA, Goichiro ; IMAI, Hideki ; NASCIMENTO, Anderson C. A. .Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosyste. In: Pro-ceedings of the 10th Brazilian Symposium on Information and Computer Systems Security.Porto Alegre : Brazilian Computer Society (SBC), 2010

  33. Rafael Dowsley ; Davidson Marques ; Jeroen van de Graaf ; Anderson C. A. Nascimento. ATwo- Party Protocol with Trusted Initializer for Computing the Inner Product. In: 11th Inter-national Workshop on Information Security Applications (WISA 2010), 2010, Cheju Island,Korea. Lecture Notes in Computer Science. Hildeberg, Germany : Springer-Verlag, 2010. v.6513. p. 337-350.7

  34. Rafael Dowsley ; Anderson C. A. Nascimento; Hideki Imai ; Anderson C A Nascimento.Round-Optimal Deniable Ring Authentication in the Presence of Big Brother.. In: 11th International Workshop on Information Security Applications (WISA 2010), 2010, Cheju Island,Korea. Lecture Notes in Computer Science, 2010. v. 6513. p. 307-321

  35. Rafael Dowsley ; Goichiro Hanaoka ; Anderson C. A. Nascimento; Mayana Pereira . PublicKey Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Basedon the CDH Assumption. In: 13th Information Security Conference (ISC 2010)., 2010, BocaRaton, Florida. Lecture Notes in Computer Science. Hildeberg, Germany : Springer-Verlag,2010. v. 6531. p. 299-306

  36. Rodrigo Nogueira. ; Flavio de Moura. Mauricio Ayala Rincon. ; Anderson C. A. Nascimento.Formalization of Security Proofs Using PVS in the Dolev-Yao Model. In: 6th Computabilityin Europe - Programs, Proofs and Processes CiE 2010„ 2010, Azores. Proc. Computability inEurope - Programs, Proofs and Processes (Booklet) CiE 2010, 2010. p. 1-12

  37. Rafael Dowsley ; Joern Mueller-Quade ; Anderson C. A. Nascimento. A CCA2 Secure PublickKey Encryption Scheme Based on the McEliece Assumptions in the Standard Model. In:CT-RSA 2009, 2009, San Francisco. Topics in Cryptology CT-RSA-2009, Lecture Notes inComputer Science. Berlin : Springer Verlag Berlin Heidelberg, 2009. v. 5473. p. 240-251

  38. Rafael Dowsley ; Joern Mueller-Quade ; Anderson C. A. Nascimento; Jeroen van de Graaf. Oblivious Transfer Based on the McEliece Assumptions. In: International Conferenceon Information Theoretical Cryptography ICITS 2008, Calgary. Lecture Notes in ComputerScience. Berlim : Springer VErlag, 2008. v. 5155. p. 107-117

  39. Rafael Dowsley ; Joern Mueller-Quade; Anderson C. A. Nascimento . On the Possibility ofUniversally Composable Commitments Based on Noisy Channels. In: SBSEG 2008, 2008,Gramado-RS. Proceedings of the 8th Brazilian Symposium on Information and ComputerSystems Security. Porto Alegre : Brazilian Computer Society (SBC), 2008

  40. CALMON, F. D. ; COSTA, F. M. ; NASCIMENTO, Anderson C. A. . Desenvolvimento de umaCifra de Fluxo Baseada em Autômatos Celulares. In: XXVI Simpósio Brasileiro de Teleco-municações, 2008, Rio de Janeiro. Anais do XXVI Simpósio Brasileiro de Telecomunicações,2008. p. 1-6

  41. Anderson C. A. NAscimento ; Kirill Morozov ; Hideki Imai. Efficient Oblivious TransferProtocols Achieving a Non-Zero Rate from Any Non-Trivial Noisy Correlation. In: Inter-national Conference on Information Theoretic Security (ICITS) 2007, 2007, madrid. lectureNotes in Computer Science. Berlim : springer Verlag, 2007

  42. Honorio Assis Filho Crispim ; Eduardo T. L. Pastor ; Anderson C. A. Nascimento ; HumbertoAbdalla Jr ; Antonio José Martins Soares . IP/WDM Optical Network Testbed: Design andImplementation. Lecture Notes in Computer Science, v. 42387, p. 441-450, 2006

  43. Anderson C. A. Nascimento ; Andreas Winter. On the Oblivious Transfer Capacity of NoisyCorrelations. In: 2006 IEEE International Symposium on Information Theory, 2006, Chicago.Proceedings of the 2006 IEEE International Symposium on Information Theory, 2006. p.1871-1875.

  44. Joao Barros ; Hideki Imai; Anderson C. A. Nascimento; Stefan Skludarek . Bit Commitmentover Gaussian Channels. In: 2006 IEEE International Symposium on Information Theory,2006, Seatlle. Proceedings of the 2006 IEEE International Symposium on Information Theory,2006. p. 1437-1441.8

  45. Hideki Imai ; Kirill Morozov ; Anderson C. A. Nascimento ; Andreas Winter . Efficient Proto-cols Achieving the Commitment Capacity of Noisy Correlations. In: 2006 IEEE InternationalSymposium on Information Theory, 2006, Seatlle. Proceedings of the 2006 IEEE InternationalSymposium on Information Theory, 2006. p. 1432-1436

  46. Koutarou Suzuki ; Koji chida ; Anderson C. A. Nascimento; Shigenori .Uchiyama. Efficient,Non-Optimistic Secure Circuit Evaluation Based on the ElGamal Encryption, WISA 2005,Lecture Notes in Computer Science, Berlin, v. 3786, p. 328-342, 2005

  47. Anderson C. A. Nascimento; Joern Mueller-Quade ; Hideki Imai . Bit String CommitmentReductions with a Non-Zero Rate, CT-RSA 2004, Lecture Notes in Computer Science, Berlin,v. 2964, p. 179-193, 2004

  48. Anderson C. A. Nascimento; Joern Mueller-quade; Akira Otsuka ; Goichiro Hanaoka . Un-conditionally Non-Interactive Verifiable Secret Sharing Secure Against Faulty Majorities inthe Commodity Based Model, ACNS 2004Lecture Notes in Computer Science, Berlin, v. 3089,p. 355-368, 2004

  49. Goichiro Hanaoka ; Hideki Imai; Joern Mueller-Quade ; Anderson C. A. Nascimento ; Andreas Winter. Information Theoretical Secure Oblivious Polynomial Evaluation: Model,Bounds and Constructions. ACISP 2004, Lecture Notes in Computer Science, Berlin, v. 3108,p. 62-73, 2004

  50. Hideki Imai ; Joern Mueller-Quade ; Anderson C A Nascimento; Andreas Winter . Non-Interactive Commitments based on Unfair Noisy Channels. In: International Symposium onInformation Theory and its Applications, 2004, Parma

  51. Hideki Imai; Joern Mueller-Quade ; Anderson C. A. Nascimento ; Andreas Winter. Rates forCoin Tossing and Commitment from Noisy Correlation. In: IEEE, International Symposiumon Information Theory, 2004, Chicago. Information Theory, 2002. Proceedings. 2004 IEEEInternational Symposium on, 2004

  52. Akira Otsuka ; Anderson C. A. Nascimento. Unconditionally Secure Polynomial EvaluationAnd Its Application To Electronic Voting. In: IEICE Technical Committee Meeting, 2004,Tokyo. IEIC Technical Report. Tokyo : Institute of Electronics, Information and Communication Engineers, 2004. v. 104. p. 157-164

  53. TAKAYUKI, F. ; NASCIMENTO, Anderson C. A. ; MATSUURA, K. ; IMAI, Hideki . Estima-tions of Kolmogorov Complexity and Detection Performance of Denial-of-Service Attacks..In: Joho Shori Gakkai Kenkyu Hokoku, 2004, Tokyo. Joho Shori Gakkai Kenkyu Hokoku,2004. v. 2004. p. 127-132

  54. TAKAYUKI, F. ; MATSUURA, K. ; IMAI, Hideki ; NASCIMENTO, Anderson C. A. . Detec-tion of Several Types of DoS Attacks by Kolmogorov Complexity. In: Joho Shori GakkaiShinpojiumu Ronbunshu, 2004, Tokyo. Joho Shori Gakkai Shinpojiumu Ronbunshu, 2004. v.2004

  55. Anderson C A Nascimento; Joern Mueller-quade ; Hideki Imai . Unconditionally Secure Ho-momorphic Pre-Distributed Commitments AAECC 2003. Lecture Notes in Computer Sci-ence, Berlin, v. 2643, p. 87-97, 2003

  56. Anderson C A Nascimento ; Joern Mueller-Quade ; Akira Otsuka ; Goichiro Hanaoka; HidekiImai . Unconditionally Secure Pre-Distributed Homomorphic Commitments and SecureTwo-Party Computations, ISC 2003 Lecture Notes in Computer Science, Berlin, v. 2851,p. 1561-164, 2003.9

  57. NASCIMENTO, Anderson C A ; QUADE, Joern Mueller ; HANAOKA, Goichiro ; OTSUKA,Akira ; IMAI, Hideki . Secure Two Party Computations. In: Symposium on Cryptographyand Information Security, 2003, 2003

  58. NAKANE, Misa ; NASCIMENTO, Anderson C A ; QUADE, Joern Mueller ; IMAI, Hideki .Improving a Computationally Secure Quantum Bit Commitment Scheme. In: Symposiumon Cryptography and Information Security, 2003, 2003

  59. Anderson C. A. Nascimento ; Joern Mueller-Quade ; Akira Otsuka ; Andreas Winter . Unconditionally Secure Homomorphic Pre-Distributed Commitments. In: IEEE, InternationalSymposium on Information Theory, 2003, Yokohama. Information Theory, 2003. Proceedings. 2002 IEEE International Symposium on, 2003

  60. KENTARO, I. ; NASCIMENTO, Anderson C. A. ; IMAI, Hideki . Gambling with quantumside information. In: Symposium on Information theory and Its Applications, 2003. The proceedings of the Symposium on Information Theory and Its Applications, 2003

  61. Andreas Winter; Anderson C. A. Nascimento ; Hideki Imai . Commitment Capacity of Discrete Memoryless Channels, Coding and Cryptography 2003, Lecture Notes in ComputerScience, Berlin, v. 2898, p. 35-51, 2003

  62. NASCIMENTO, Anderson C A ; QUADE, Joern Mueller ; IMAI, Hideki . Impossibility Resultson Bit Commitment Reductions. In: Symposium on Cryptography and Information Security,2002, 2002

  63. NASCIMENTO, Anderson C A ; QUADE, Joern Mueller ; OTSUKA, Akira ; IMAI, Hideki .Bit Commitments based on a Trusted Initializer with Dynamic Senders. In: InternationalSymposium on Information Theory and its Applications, 2002, Xian, 2002

  64. NASCIMENTO, Anderson C. A. ; RAHMAN, Mohammad Ghulam ; IMAI, Hideki . On Inter-active Key Pre-Distribution Schemes. In: Symposium on Information Theory and its Applications, 2002, 2002

  65. NAKANE, Misa ; NASCIMENTO, Anderson C A ; IMAI, Hideki . Security of Quantum BitCommitment from a Physical Assumption. In: Symposium on Information Theory and itsApplications, 2002, 2002

  66. Anderson C. A. Nascimento; Joern Mueller-Quade ; Hideki Imai . Optimal Multi-Bit Commit-ments to Weak Commitments. In: IEEE, International Symposium on Information Theory,2002, Lausanne. Information Theory, 2002. Proceedings. 2002 IEEE International Sympo-sium on, 2002

  67. NASCIMENTO, Anderson C A ; QUADE, Joern Mueller ; IMAI, Hideki . On AuthenticatedData Transmission Over a Quantum Channel. In: Symposium on Cryptography and Information Security, 2001, 2001

  68. Anderson C A Nascimento; Joern Mueller-Quade ; Hideki .Imai A Coding Scheme for Uncon-ditional Security Over Data Packet Networks,. In: International Symposium on InformationTheory and its Applications, 2001, Honolulu, 2001

  69. Markus Breitbach ; Hideki Imai; Anderson C A Nascimento. Attacks on Watermarks inDigital Images: A Classification from the Copyright Holder’s Viewpoint. In: InternationalSymposium on Information Theory and its Applications, 2001, Honolulu, 2001.10

  70. NASCIMENTO, Anderson C. A. ; QUADE, Joern Mueller ; IMAI, Hideki . Secure WitnessesBased Cryptographic Systems. In: Symposium on Cryptography and Information Security,2000, 2000.72.NASCIMENTO, Anderson C. A. ; QUADE, Joern Mueller ; IMAI, Hideki . Improving DigitalSignatures by Use of Witnesses. In: IEICE, ISEC 11, Technical Meeting, 2000, Tokyo, 2000.