Manuel Barbosa
Orcid: 0000-0002-6848-5564
According to our database1,
Manuel Barbosa
authored at least 90 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Faster Verification of Faster Implementations: Combining Deductive and Circuit-Based Reasoning in EasyCrypt.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Formally Verifying Kyber - Episode V: Machine-Checked IND-CCA Security and Correctness of ML-KEM in EasyCrypt.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
C'est Très CHIC: A Compact Password-Authenticated Key Exchange from Lattice-Based KEM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Machine-Checked Security for $\mathrm{XMSS}$ as in RFC 8391 and $\mathrm{SPHINCS}^{+}$.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Practical Aspects of Declarative Languages, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
J. Log. Algebraic Methods Program., 2022
2021
IACR Cryptol. ePrint Arch., 2021
Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head.
CoRR, 2021
CODBS: A cascading oblivious search protocol optimized for real-world relational database indexes.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the ICDCN '21: International Conference on Distributed Computing and Networking, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Machine-checked ZKP for NP relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time Verification.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Labeled Homomorphic Encryption - Scalable and Privacy-Preserving Processing of Outsourced Data.
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the 13th European Dependable Computing Conference, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
2014
CAOVerif: An open-source deductive verification platform for cryptographic software implementations.
Sci. Comput. Program., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Principles of Security and Trust - Third International Conference, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
2013
Sci. Comput. Program., 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012
Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification.
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the Fundamentals of Software Engineering - 4th IPM International Conference, 2011
2010
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2010
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
Proceedings of the Computer Security, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
J. Cryptol., 2009
Deductive Verification of Cryptographic Software.
Proceedings of the First NASA Formal Methods Symposium, 2009
Proceedings of the ISSE 2009, 2009
Verifying Cryptographic Software Correctness with Respect to Reference Implementations.
Proceedings of the Formal Methods for Industrial Critical Systems, 2009
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps.
Proceedings of the Progress in Cryptology, 2009
2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the Cryptography and Coding, 2007
2006
Proceedings of the Progress in Cryptology, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Cryptography and Coding, 2005
Proceedings of the Cryptography and Coding, 2005