Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation M De Cock, R Dowsley, C Horst, R Katti, ACA Nascimento, SC Newman, ... IEEE Transactions on Dependable and Secure Computing 16 (2), 217-230, 2019 | 151 | 2019 |
Do You Know Where Your Cloud Files Are? K Benson, R Dowsley, H Shacham CCSW 2011, 73-82, 2011 | 121 | 2011 |
Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data M Cock, R Dowsley, ACA Nascimento, SC Newman AISec 2015, 3-14, 2015 | 112 | 2015 |
Standard Security Does Not Imply Security against Selective-Opening M Bellare, R Dowsley, B Waters, S Yilek EUROCRYPT 2012, 645-662, 2012 | 86 | 2012 |
Security, privacy, and reliability in digital healthcare systems using blockchain A Ali, HA Rahim, MF Pasha, R Dowsley, M Masud, J Ali, M Baz Electronics 10 (16), 2034, 2021 | 75 | 2021 |
High Performance Logistic Regression for Privacy-Preserving Genome Analysis M De Cock, R Dowsley, ACA Nascimento, D Railsback, J Shen, A Todoki BMC Medical Genomics 14, 23, 2021 | 66 | 2021 |
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation D Reich, A Todoki, R Dowsley, M De Cock, A Nascimento NeurIPS 2019, 3757-3769, 2019 | 65 | 2019 |
Protecting Privacy of Users in Brain-Computer Interface Applications A Agarwal, R Dowsley, ND McKinney, D Wu, CT Lin, M De Cock, ... IEEE Transactions on Neural Systems and Rehabilitation Engineering 27 (8 …, 2019 | 59* | 2019 |
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model R Dowsley, J Müller-Quade, ACA Nascimento CT-RSA 2009, 240-251, 2009 | 59 | 2009 |
A CCA2 Secure Variant of the McEliece Cryptosystem N Döttling, R Dowsley, J Müller-Quade, ACA Nascimento IEEE Transactions on Information Theory 58 (10), 6672-6680, 2012 | 56 | 2012 |
TARDIS: A Foundation of Time-Lock Puzzles in UC C Baum, B David, R Dowsley, JB Nielsen, S Oechsner EUROCRYPT 2021, 429-459, 2021 | 54* | 2021 |
Oblivious Transfer Based on the McEliece Assumptions R Dowsley, J van de Graaf, J Müller-Quade, ACA Nascimento ICITS 2008, 107-117, 2008 | 50 | 2008 |
Insured MPC: Efficient Secure Computation with Financial Penalties C Baum, B David, R Dowsley Financial Cryptography and Data Security (FC) 2020, 404-420, 2020 | 48* | 2020 |
A Survey on Design and Implementation of Protected Searchable Data in the Cloud R Dowsley, A Michalas, M Nagel, N Paladi Computer Science Review 26, 17-30, 2017 | 46* | 2017 |
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model R Tonicelli, ACA Nascimento, R Dowsley, J Müller-Quade, H Imai, ... International Journal of Information Security 14 (1), 73-84, 2015 | 40* | 2015 |
Universally Composable Oblivious Transfer Based on a Variant of LPN B David, R Dowsley, ACA Nascimento CANS 2014, 143-158, 2014 | 40 | 2014 |
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM PSLM Barreto, B David, R Dowsley, K Morozov, ACA Nascimento arXiv preprint arXiv:1710.08256, 2017 | 39 | 2017 |
Privacy-Preserving Feature Selection with Secure Multiparty Computation X Li, R Dowsley, M De Cock ICML 2021, 6326-6336, 2021 | 38 | 2021 |
Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare K Fritchman, K Saminathan, R Dowsley, T Hughes, M De Cock, ... IEEE International Conference on Big Data (Big Data) 2018, 2413-2422, 2018 | 37 | 2018 |
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time C Baum, B David, R Dowsley, R Kishore, JB Nielsen, S Oechsner PKC 2023, 439-470, 2023 | 36* | 2023 |