Toggle navigation
Publications
Researchers
Institutions
0
Sign In
Federated Authentication
(Click on the image)
Local Sign In
Password Recovery
Register
Sign In
Manuel Bernardo Martins Barbosa
AuthID:
R-000-A22
Publications
Confirmed
To Validate
Document Source:
All
Document Type:
All Document Types
Proceedings Paper (58)
Article (35)
Unpublished (15)
Article in Press (5)
Year Start - End:
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
-
2025
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
Order:
Year Dsc
Year Asc
Cit. WOS Dsc
IF WOS Dsc
Cit. Scopus Dsc
IF Scopus Dsc
Title Asc
Title Dsc
Results:
10
20
30
40
50
Confirmed Publications: 113
61
TITLE:
The Related-Key Analysis of Feistel Constructions
AUTHORS:
Manuel Barbosa
;
Pooya Farshim
;
PUBLISHED:
2015
,
SOURCE:
21st International Workshop on Fast Software Encryption (FSE)
in
FAST SOFTWARE ENCRYPTION, FSE 2014,
VOLUME:
8540
INDEXED IN:
Scopus
WOS
DBLP
CrossRef
:
11
IN MY:
ORCID
|
DBLP
62
TITLE:
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
AUTHORS:
José Bacelar Almeida
;
Manuel Barbosa
;
Gilles Barthe
; François Dupressoir;
PUBLISHED:
2015
,
SOURCE:
IACR Cryptology ePrint Archive,
VOLUME:
2015
INDEXED IN:
DBLP
IN MY:
ORCID
|
DBLP
63
TITLE:
CAOVerif: An open-source deductive verification platform for cryptographic software implementations
Full Text
AUTHORS:
Jose Bacelar Almeida
;
Manuel Barbosa
; Jean Christophe Filliatre;
Jorge Sousa Pinto
;
Barbara Vieira
;
PUBLISHED:
2014
,
SOURCE:
SCIENCE OF COMPUTER PROGRAMMING,
VOLUME:
91,
ISSUE:
PART B
INDEXED IN:
Scopus
WOS
DBLP
CrossRef
IN MY:
ORCID
|
DBLP
64
TITLE:
Compiling CAO: From cryptographic specifications to C implementations
AUTHORS:
Barbosa, M
; Castro, D;
Silva, PF
;
PUBLISHED:
2014
,
SOURCE:
3rd International Conference on Principles of Security and Trust, POST 2014 - Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014
in
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
VOLUME:
8414 LNCS
INDEXED IN:
Scopus
DBLP
CrossRef
:
1
IN MY:
ORCID
|
DBLP
65
TITLE:
The Related-Key Analysis of Feistel Constructions
AUTHORS:
Manuel Barbosa
;
Pooya Farshim
;
PUBLISHED:
2014
,
SOURCE:
IACR Cryptology ePrint Archive,
VOLUME:
2014
INDEXED IN:
DBLP
IN MY:
ORCID
|
DBLP
66
TITLE:
Verified Implementations for Secure and Verifiable Computation
AUTHORS:
José Bacelar Almeida
;
Manuel Barbosa
;
Gilles Barthe
; Guillaume Davy; François Dupressoir; Benjamin Grégoire; Pierre Yves Strub;
PUBLISHED:
2014
,
SOURCE:
IACR Cryptology ePrint Archive,
VOLUME:
2014
INDEXED IN:
DBLP
IN MY:
ORCID
|
DBLP
67
TITLE:
Certified computer-aided cryptography: Efficient provably secure machine code from high-level implementations. efficient provably secure machine code from high-level implementations
Full Text
AUTHORS:
Almeida, JB
;
Barbosa, M
;
Barthe, G
; Dupressoir, F;
PUBLISHED:
2013
,
SOURCE:
2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013
in
Proceedings of the ACM Conference on Computer and Communications Security
INDEXED IN:
Scopus
DBLP
CrossRef
:
28
IN MY:
ORCID
|
DBLP
68
TITLE:
Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations
AUTHORS:
José Bacelar Almeida
;
Manuel Barbosa
;
Gilles Barthe
; François Dupressoir;
PUBLISHED:
2013
,
SOURCE:
IACR Cryptology ePrint Archive,
VOLUME:
2013
INDEXED IN:
DBLP
IN MY:
ORCID
|
DBLP
69
TITLE:
Formal verification of side-channel countermeasures using self-composition
Full Text
AUTHORS:
Bacelar Almeida, JB
;
Manuel Barbosa
;
Jorge S Pinto
;
Barbara Vieira
;
PUBLISHED:
2013
,
SOURCE:
SCIENCE OF COMPUTER PROGRAMMING,
VOLUME:
78,
ISSUE:
7
INDEXED IN:
Scopus
WOS
DBLP
CrossRef
:
28
IN MY:
ORCID
|
ResearcherID
|
DBLP
70
TITLE:
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption
AUTHORS:
Alwen, J;
Barbosa, M
;
Farshim, P
; Gennaro, R; Gordon, SD; Tessaro, S; Wilson, DA;
PUBLISHED:
2013
,
SOURCE:
14th IMA International Conference on Cryptography and Coding, IMACC 2013
in
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
VOLUME:
8308 LNCS
INDEXED IN:
Scopus
DBLP
IN MY:
ORCID
|
DBLP
Add to Marked List
Check All
Export
×
Publication Export Settings
BibTex
EndNote
APA
CSV
PDF
Export Preview
Print
×
Publication Print Settings
HTML
PDF
Print Preview
Page 7 of 12. Total results: 113.
<<
<
3
4
5
6
7
8
9
10
11
>
>>
×
Select Source
This publication has:
2 records from
ISI
2 records from
SCOPUS
2 records from
DBLP
2 records from
Unpaywall
2 records from
Openlibrary
2 records from
Handle
Please select which records must be used by Authenticus!
×
Preview Publications
© 2025 CRACS & Inesc TEC - All Rights Reserved
Privacy Policy
|
Terms of Service