Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Portela, Bernardo
add a person with the name Portela, Bernardo
 

Other publications of authors with the same name

A Practical Framework for Privacy-Preserving NoSQL Databases., , , , , , and . SRDS, page 11-20. IEEE Computer Society, (2017)Secure Multiparty Computation from SGX., , , , , , and . Financial Cryptography, volume 10322 of Lecture Notes in Computer Science, page 477-497. Springer, (2017)Foundations of Hardware-Based Attested Computation and Application to SGX., , , and . EuroS&P, page 245-260. IEEE, (2016)Secure Multiparty Computation from SGX., , , , , , and . IACR Cryptology ePrint Archive, (2016)BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage., , , , , and . IACR Cryptology ePrint Archive, (2018)Enforcing Ideal-World Leakage Bounds in Real-World Secret Sharing MPC Frameworks., , , , , and . CSF, page 132-146. IEEE Computer Society, (2018)A Machine-Checked Proof of Security for AWS Key Management Service., , , , , , , , , and . CCS, page 63-78. ACM, (2019)A formal treatment of the role of verified compilers in secure computation., , , , , and . J. Log. Algebraic Methods Program., (2022)