Edited Books

  1. Barreto, P.  ; NASCIMENTO, Anderson C A  . Information Theoretic Security. 1. ed. Springer International Publishing, 2016. v. 1. 
  2. BISHOP, M. ; Anderson C A Nascimento . Information Security. 1. ed. Springer Verlag, 2016. v. 1. 342p . 
  3. NASCIMENTO, Anderson C. A. ; SOUSA, R. T. ; Jeroen van de Graaf ; CARMO, L. F. R. ; Nogueira, M. . ANAIS DO 11 SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS.. 11. ed. Porto Alegre: Sociedade Brasileira de Computação, 2011. v. 1. 414p . 
  4. ;NASCIMENTO, Anderson C. A.; OLIVEIRA, L. B. (Org.) ; NUNES, R. C. (Org.) ; DAHAB, R. (Org.) . ANAIS DO 9° SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS. Porto Alegre: Sociedade Brasileira de Computação, 2009. v. 1. 368p

Journals

  1. Dowsley, R., & Nascimento, A. C. (2017). On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries: The Case of Low Erasure ProbabilityIEEE Transactions on Information Theory.

  2. De Cock, M., Dowsley, R., Horst, C., Katti, R., Nascimento, A., Poon, W. S., & Truex, S. (2017). Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-ComputationIEEE Transactions on Dependable and Secure Computing.

  3. Costa Gondim, J. J., de Oliveira Albuquerque, R., Clayton Alves Nascimento, A., García Villalba, L. J., & Kim, T. H. (2016). A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of ThingsSensors16(11), 1855.

  4. Souza, S. M. P. C., Gonçalves, R. F., Leonova, E., Puttini, R. S., & Nascimento, A. C. A. (2017). Privacy‐ensuring electronic health records in the cloud. Concurrency and Computation: Practice and Experience29(11).

  5. Bernardo David, Rafael Dowsley, Jeroen van de Graaf, Adriana Pinto, Anderson C A Nascimento, Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra, IEEE Trans on Forensics and Info Security.

  6. Homero Oliveira Martins, Anderson C A Nascimento, QC-MDPC McEliece: an Optimized Implementation of a New McEliece Variant, IEEE Latin America Transactions, (Volume:13 ,  Issue: 6 ), 2015

  7. M. Pereira, R. Dowsley, G. Hanaoka, ACA Nascimento, Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions, Computer Journal, British Computer Society, Oxford University Press, to appear. 

  8. Rafael Tonicelli. ; Rafael Dowsley ; Hideki Imai; Goichiro Hanaoka ; Akira Otsuka ; Jörn Müller-Quade ; Anderson C A . Nascimento, "Information-theoretically secure oblivious polynomial evaluation in the commodity-based model." International Journal of Information Security (2015): 1-12, Springer-Verlag. 

  9. Nico Doetlling ; Joern Muller-Quade; Anderson C. A. Nascimento. IND-CCA Secure Cryptography Based on a Variant of the LPN Problem, (in preparation  - invited to the Journal of Cryptology).

  10. Rafael Dowsley ; Joern Mueller-Quade ; Jeroen van de Graaf ; Anderson C. A. Nascimento. On the Composability of Statistically Secure Bit Commitments (invited paper). Journal of Internet Technology, v.14, pg 509-516, 2013

  11. Nico Dottling, Rafael Dowsley, Jorn Muller-Quade and Anderson C. A. Nascimento, CCA2 Secure Variant of the McEliece Cryptosystem, IEEE Transactions on Information Theory, v. 58, p. 6672-6680, 2012

  12. Bernardo Machado David, Rafael de Sousa, Anderson C A Nascimento, Efficient Fully Simulatable Oblivious Transfer From The McEliece Assumptions, EICE Transactions on Fundamentals of Electronics, Communications and Computer Science, v. E-95A, p. 567-575, 2012.

  13. Rafael Dowsley ; Jeroen van de Graaf ; Joern Mueller-Quade ; ANderson C A Nascimento. Oblivious Transfer Based on the McEliece Assumptions. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, v. E-95A, p. 567-575, 2012

  14. Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov, Anderson C A Nascimento, Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model, IEEE Transactions on Information Theory, v. 57, p. 5566-5571, 2011

  15. Rafael Tonicelli ; Jose Carrijo; Anderson C. A. Nascimento. A Fault Analytic Method against HB+. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, v. E94A, p. 885-859, 2011

  16. David, Bernardo ; Costa, Joao Paulo ; Anderson C. A. Nascimento ; Marcelo Holtz ; Dino Amaral ; Rafael de Sousa Jr. . A Parallel Approach to PCA Based Malicious Activity Detection in Distributed Honeypot Data. The International Journal of Forensic Computer Science (Impresso), v. 6, p. 8-27, 2011

  17. Rafael Dowsley ; Akira Otsuka ; Goichiro Hanaoka ; Hideki Imai; Anderson C. A. Nascimento. Universally Composable and Statistically Secure Veriable Secret Sharing Scheme Based on Pre- Distributed Data. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, v. E94A, p. 725-734, 2011.

  18. Jose Carrijo; Rafael Tonicelli ; Hideki Imai; Anderson C. A. Nascimento. A Novel Probabilistic Passive Attack on the Protocols HB and HB+. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, v. E92.A, p. 658-662, 2009.

  19. Anderson C. A. Nascimento ; Andreas Winter . On the Oblivious-Transfer Capacity of Noisy Resources. IEEE Transactions on Information Theory, v. 54, p. 2572-2581, 2008.

  20. Anderson C. A. Nascimento ; Joao Barros ; Stefan Skludarek ; Hideki Imai. The Commitment Capacity of the Gaussian Channel Is Infinite. IEEE Transactions on Information Theory, v. 54, p. 2785-2789, 2008.

  21. Joern Mueller-Quade ; Anderson C. A. Nascimento; Pim Tuyls ; Andreas Winter . An Information Theoretical Model for Quantum Secret Sharing Schemes. Quantum Information Computation, Princeton, v. 5, n. 1, p. 69-80, 2005.

  22. Anderson C. A. Nascimento; Joern Mueller-Quade; Hideki Imai. Improving Quantum Secret Sharing Schemes. Physical Review. A, United States, v. 64, n. 042311, p. 1-5, 2001.

  23. Anderson C A Nascimento; Joern Mueller -Quade; IMAI, Hideki . Quantum Identification Protocols with Technologically Bounded Parties. Electronic Notes in Discrete Mathematics, Holland, v. 06, p. 1-10, 2001.

Papers Published in Peer-Reviewed Conferences and Workshops Proceedings

  1. WANG, SISI ; POON, WING-SEA ; FARNADI, GOLNOOSH ; HORST, CALEB ; THOMPSON, KEBRA ; NICKELS, MICHAEL ; Nascimento, Anderson ; DE COCK, MARTINE . VirtualIdentity: Privacy preserving user profiling. In: 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2016, San Francisco. 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2016. p. 1434.
  2. GONCALVES, RICARDO ; LEONOVA, EKATERINA ; PUTTINI, RICARDO ; Nascimento, Anderson . A privacy-ensuring scheme for health data outsourcing. In: 2015 International Conference on Cloud Technologies and Applications (CloudTech), 2015, Marrakech. 2015 International Conference on Cloud Technologies and Applications (CloudTech), 2015. p. 1-7.
  3. Rafael Dowsley, Bernardo David, Raj Katti, Anderson C A Nascimento, Practical and Unconditionally Secure Comparison with Applications for Private Machine Learning, to appear, ProvSec 2015
  4. Martine de Cock, Rafael Dowsley, Anderson Nascimento and Stacey Newman, Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data, 8th ACM Workshop on Artificial Intelligence and Security with the 22nd ACM Conference on Computer and Communications Security (CCS), 2015
  5. Khot, Amruta, Abdeltawab Hendawi, Anderson Nascimento, Raj Katti, Ankur Teredesai, and Mohamed Ali. "Road network compression techniques in spatiotemporal embedded systems: A survey." In Proceedings of the 5th ACM SIGSPATIAL International Workshop on GeoStreaming, pp. 33-36. ACM, 2014.
  6. Bernardo David, Rafael Dowsley, Anderson Nascimento, Universally Composable Oblivious Transfer based on a variant of LPN, 13th International Conference on Cryptology and Network Security (CANS 2014), 22-24 Oct, Crete, Greece. 
  7. Felipe Lacerda, Rafael Dowsley, Anderson C A Nascimento, Oblivious Transfer in the Bounded Storage Model with Errors, IEEE International Symposium on Information Theory (ISIT), Hawaii, 2014. 
  8. Nico Doetlling ; Joern Muller-Quade; Anderson C. A. Nascimento. IND-CCA Secure Cryptography Based on a Variant of the LPN Problem. In: Advances in Cryptology ASIACRYPT 2012, 2012, Pequim. Lecture Notes in Computer Science. Berlin: Springer Berlin Heidelberg, 2012. v. 7658. p. 485-503. (Invited to the Journal of Cryptology) 
  9. Bernardo Machado David ; Joern Muller-Quade; Anderson C. A. Nascimento. Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions. In: 6th InternationalConference ICITS 2012, 2012, Montreal. Lecture Notes in Computer Science. Berlin: Springer Berlin Heidelberg, 2012. v. 7412. p. 80-90.
  10. Max Melgar; Alexandre Zaghetto; Bruno Machiavello; Anderson C A Nascimento; CQR codes: Colored quick-response codes. In: 2012 IEEE Second International Conference on Consumer Electronics Berlin (ICCEBerlin), 2012, Berlin. 2012 IEEE Second International Conference on Consumer Electronics - Berlin (ICCE-Berlin), 2012. p. 321-325. 
  11. DAVID, B. M. ; Tonicelli, R. ; NASCIMENTO, Anderson C A ; NASCIMENTO, Anderson C. A. ; DE SOUSA, JR., RAFAEL T. . A framework for secure single sign-on. In: Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais, 2012, Curitiba. Anais do XII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Porto Alegre: Sociedade Brasileira de Computação, 2012. p. 543-554.
  12. PINTO, A.B. ; DAVID, B. M. ; Jeroen van de Graaf ; NASCIMENTO, Anderson C. A. ; NASCIMENTO, Anderson C. A. . Universally Composable Committed Oblivious Transfer With A Trusted Initializer. In: X II Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais, 2012, Curitiba. Anais do XII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Porto Alegre: Sociedade Brasileira de Computação, 2012. p. 126-139.
  13. Bernardo Machado David. ; Anderson C. A. Nascimento. Efficient fully simulatable oblivious transfer from the McEliece assumptions. In: 2011 IEEE Information theory Workshop, 2011, Paraty. Proceedings of the 2011 IEEE Information theory Workshop, 2011. p. 638-642. 
  14. Rafael Dowsley ; Davidson Marques ; Jeroen van de Graaf ; Anderson C. A. Nascimento. A Two- Party Protocol with Trusted Initializer for Computing the Inner Product. In: 11th International Workshop on Information Security Applications (WISA 2010), 2010, Cheju Island, Korea. Lecture Notes in Computer Science. Hildeberg, Germany : Springer-Verlag, 2010. v. 6513. p. 337-350. 
  15. Rafael Dowsley ; Anderson C. A. Nascimento; Hideki Imai ; Anderson C A Nascimento. Round-Optimal Deniable Ring Authentication in the Presence of Big Brother.. In: 11th InternationalWorkshop on Information Security Applications (WISA 2010), 2010, Cheju Island, Korea. Lecture Notes in Computer Science, 2010. v. 6513. p. 307-321. 
  16. Rafael Dowsley ; Goichiro Hanaoka ; Anderson C. A. Nascimento; Mayana Pereira . Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption. In: 13th Information Security Conference (ISC 2010)., 2010, Boca Raton, Florida. Lecture Notes in Computer Science. Hildeberg, Germany : Springer-Verlag, 2010. v. 6531. p. 299-306. 
  17. NOGUEIRA, R. ; NASCIMENTO, Anderson C. A. ; DAVID, B. M. . Oblivious Transfer Based on the McEliece Assumptions with Unconditional Security for the Sender. In: O Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, 2010, Fortaleza. Anais do O Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais. Porto Alegre: Sociedade Brasileira de Computação, 2010. p. 1-12.
  18. Rodrigo Nogueira. ; Flavio de Moura. ; Mauricio Ayala Rincon. ; Anderson C. A. Nascimento. Formalization of Security Proofs Using PVS in the Dolev-Yao Model. In: 6th Computability in Europe - Programs, Proofs and Processes CiE 2010,, 2010, Azores. Proc. Computability in Europe - Programs, Proofs and Processes (Booklet) CiE 2010, 2010. p. 1-12. 
  19. Rafael Dowsley ; Joern Mueller-Quade ; Anderson C. A. Nascimento. A CCA2 Secure Publick Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model. In: CT-RSA 2009, 2009, San Francisco. Topics in Cryptology CT-RSA-2009, Lecture Notes in Computer Science. Berlin : Springer Verlag Berlin Heidelberg, 2009. v. 5473. p. 240-251. 
  20. Rafael Dowsley ; Joern Mueller-Quade ; Anderson C. A. Nascimento; Jeroen van de Graaf . Oblivious Transfer Based on the McEliece Assumptions. In: International Conference on Information Theoretical Cryptography ICITS 2008, Calgary. Lecture Notes in Computer Science. Berlim : Springer VErlag, 2008. v. 5155. p. 107-117. 
  21. Rafael Dowsley ; MUELLER-QUADE, Joern ; NASCIMENTO, Anderson C. A. . On the Possibility of Universally Composable Commitments Based on Noisy Channels. In: SBSEG 2008, 2008, Gramado-RS. Proceedings of the 8th Brazilian Symposium on Information and Computer Systems Security. Porto Alegre: Brazilian Computer Society (SBC), 2008.
  22. Anderson C. A. NAscimento ; Kirill Morozov ; Hideki Imai. Efficient Oblivious Transfer Protocols Achieving a Non-Zero Rate from Any Non-Trivial Noisy Correlation. In: International Conference on Information Theoretic Security (ICITS) 2007, 2007, madrid. lecture Notes in Computer Science. Berlim : springer Verlag, 2007. 
  23. Honorio Assis Filho Crispim ; Eduardo T. L. Pastor ; Anderson C. A. Nascimento; Humberto Abdalla Jr ; Antonio Jos Martins Soares . IP/WDM Optical Network Testbed: Design and Implementation. Lecture Notes in Computer Science, v. 42387, p. 441-450, 2006. 
  24. Anderson C. A. Nascimento ; Andreas Winter. On the Oblivious Transfer Capacity of Noisy Correlations. In: 2006 IEEE International Symposium on Information Theory, 2006, Chicago. Proceedings of the 2006 IEEE International Symposium on Information Theory, 2006. p. 1871-1875. 
  25. Joao Barros ; Hideki Imai; Anderson C. A. Nascimento; Stefan Skludarek . Bit Commitment over Gaussian Channels. In: 2006 IEEE International Symposium on Information Theory, 2006, Seatlle. Proceedings of the 2006 IEEE International Symposium on Information Theory, 2006. p. 1437-1441
  26. Hideki Imai ; Kirill Morozov ; Anderson C. A. Nascimento ; Andreas Winter . Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations. In: 2006 IEEE International Symposium on Information Theory, 2006, Seatlle. Proceedings of the 2006 IEEE International Symposium on Information Theory, 2006. p. 1432-1436. 
  27. Koutarou Suzuki ; Koji chida ; Anderson C. A. Nascimento; Shigenori .Uchiyama. Efficient, Non-Optimistic Secure Circuit Evaluation Based on the ElGamal Encryption, WISA 2005, Lecture Notes in Computer Science, Berlin, v. 3786, p. 328-342, 2005. 
  28. Anderson C. A. Nascimento; Joern Mueller-Quade ; Hideki Imai . Bit String Commitment Reductions with a Non-Zero Rate, CT-RSA 2004, Lecture Notes in Computer Science, Berlin, v. 2964, p. 179-193, 2004. 
  29. Anderson C. A. Nascimento; Joern Mueller-quade; Akira Otsuka ; Goichiro Hanaoka. Unconditionally Non-Interactive Veriable Secret Sharing Secure Against Faulty Majorities in the Commodity Based Model, ACNS 2004Lecture Notes in Computer Science, Berlin, v. 3089, p. 355-368, 2004. 
  30. Goichiro Hanaoka ; Hideki Imai; Joern Mueller-Quade ; Anderson C. A. Nascimento; Andreas Winter. Information Theoretical Secure Oblivious Polynomial Evaluation: Model, Bounds and Constructions. ACISP 2004, Lecture Notes in Computer Science, Berlin, v. 3108, p. 62-73, 2004. 
  31. Hideki Imai ; Joern Mueller-Quade ; Anderson C A Nascimento; Andreas Winter. Non-Interactive Commitments based on Unfair Noisy Channels. In: International Symposium on Information Theory and its Applications, 2004, Parma. 
  32. Hideki Imai; Joern Mueller-Quade ; Anderson C. A. Nascimento ; Andreas Winter. Rates for Coin Tossing and Commitment from Noisy Correlation. In: IEEE, International Symposium on Information Theory, 2004, Chicago. Information Theory, 2002. Proceedings. 2004 IEEE International Symposium on, 2004. 
  33. Akira Otsuka ; Anderson C. A. Nascimento. Unconditionally Secure Polynomial Evaluation And Its Application To Electronic Voting. In: IEICE Technical Committee Meeting, 2004, Tokyo. IEIC Technical Report. Tokyo : Institute of Electronics, Information and Communication Engineers, 2004. v. 104. p. 157-164. 
  34. TAKAYUKI, F. ; MATSUURA, K. ; IMAI, Hideki ; NASCIMENTO, Anderson C. A. . Detection of Several Types of DoS Attacks by Kolmogorov Complexity. In: Joho Shori Gakkai Shinpojiumu Ronbunshu, 2004, Tokyo. Joho Shori Gakkai Shinpojiumu Ronbunshu, 2004. v. 2004.
  35. TAKAYUKI, F. ; NASCIMENTO, Anderson C. A. ; MATSUURA, K. ; IMAI, Hideki . Estimations of Kolmogorov Complexity and Detection Performance of Denial-of-Service Attacks.. In: Joho Shori Gakkai Kenkyu Hokoku, 2004, Tokyo. Joho Shori Gakkai Kenkyu Hokoku, 2004. v. 2004. p. 127-132.
  36. Anderson C A Nascimento; Joern Mueller-quade ; Hideki Imai . Unconditionally Secure Homomorphic Pre-Distributed Commitments AAECC 2003. Lecture Notes in Computer Science, Berlin, v. 2643, p. 87-97, 2003.
  37. NASCIMENTO, Anderson C. A.; NAKANE, Misa ; NASCIMENTO, Anderson C A ; QUADE, Joern Mueller ; IMAI, Hideki . Improving a Computationally Secure Quantum Bit Commitment Scheme. In: Symposium on Cryptography and Information Security, 2003, 2003.
  38. NASCIMENTO, Anderson C. A.; NASCIMENTO, Anderson C A ; QUADE, Joern Mueller ; HANAOKA, Goichiro ; OTSUKA, Akira ; IMAI, Hideki . Secure Two Party Computations. In: Symposium on Cryptography and Information Security, 2003, 2003.
  39. KENTARO, I. ; NASCIMENTO, Anderson C. A. ; IMAI, Hideki . Gambling with quantum side information. In: Symposium on Information theory and Its Applications, 2003. The proceedings of the Symposium on Information Theory and Its Applications, 2003. 
  40. Anderson C A Nascimento ; Joern Mueller-Quade ; Akira Otsuka ; Goichiro Hanaoka; Hideki Imai . Unconditionally Secure Pre-Distributed Homomorphic Commitments and Secure Two-Party Computations, ISC 2003 Lecture Notes in Computer Science, Berlin, v. 2851, p. 1561-164, 2003. 
  41. Anderson C. A. Nascimento ; Joern Mueller-Quade ; Akira Otsuka ; Andreas Winter. Unconditionally Secure Homomorphic Pre-Distributed Commitments. In: IEEE, International Symposium on Information Theory, 2003, Yokohama. Information Theory, 2003. Proceedings. 2002 IEEE International Symposium on, 2003.
  42. Andreas Winter; Anderson C. A. Nascimento ; Hideki Imai . Commitment Capacity of Discrete Memoryless Channels, Coding and Cryptography 2003, Lecture Notes in Computer Science, Berlin, v. 2898, p. 35-51, 2003. 
  43. NASCIMENTO, Anderson C. A.; NASCIMENTO, Anderson C A ; QUADE, Joern Mueller ; IMAI, Hideki . Impossibility Results on Bit Commitment Reductions. In: Symposium on Cryptography and Information Security, 2002, 2002.
  44. Anderson C. A. Nascimento; Joern Mueller-Quade ; Hideki Imai . Optimal Multi- Bit Commitments to Weak Commitments. In: IEEE, International Symposium on Information Theory, 2002, Lausanne. Information Theory, 2002. Proceedings. 2002 IEEE International Symposium on, 2002. 
  45. NASCIMENTO, Anderson C. A.; NAKANE, Misa ; NASCIMENTO, Anderson C A ; IMAI, Hideki . Security of Quantum Bit Commitment from a Physical Assumption. In: Symposium on Information Theory and its Applications, 2002, 2002.
  46. NASCIMENTO, Anderson C. A.; RAHMAN, Mohammad Ghulam ; IMAI, Hideki . On Interactive Key Pre-Distribution Schemes. In: Symposium on Information Theory and its Applications, 2002, 2002.
  47. Anderson C A Nascimento; Joern Mueller-Quade ; Hideki .Imai A Coding Scheme for Unconditional Security Over Data Packet Networks,. In: International Symposium on Information Theory and its Applications, 2001, Honolulu, 2001. 
  48. Markus Breitbach ; Hideki Imai; Anderson C A Nascimento. Attacks on Watermarks in Digital Images: A Classication from the Copyright Holder's Viewpoint. In: International Symposium on Information Theory and its Applications, 2001, Honolulu, 2001.
  49. NASCIMENTO, Anderson C. A.; NASCIMENTO, Anderson C A ; QUADE, Joern Mueller ; IMAI, Hideki . On Authenticated Data Transmission Over a Quantum Channel. In: Symposium on Cryptography and Information Security, 2001, 2001.
  50. NASCIMENTO, Anderson C. A.; QUADE, Joern Mueller ; IMAI, Hideki . Secure Witnesses Based Cryptographic Systems. In: Symposium on Cryptography and Information Security, 2000, 2000.