{"id":"https://openalex.org/W4417090542","doi":"https://doi.org/10.1007/978-981-95-5096-8_5","title":"How Hard can it be to\u00a0Formalize a\u00a0Proof?","display_name":"How Hard can it be to\u00a0Formalize a\u00a0Proof?","publication_year":2025,"publication_date":"2025-12-07","ids":{"openalex":"https://openalex.org/W4417090542","doi":"https://doi.org/10.1007/978-981-95-5096-8_5"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-95-5096-8_5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-95-5096-8_5","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-981-95-5096-8_5.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007/978-981-95-5096-8_5.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088006363","display_name":"Fran\u00e7ois Dupressoir","orcid":"https://orcid.org/0000-0003-3497-3110"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Fran\u00e7ois Dupressoir","raw_affiliation_strings":["University of Bristol, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065527777","display_name":"Andreas H\u00fclsing","orcid":"https://orcid.org/0000-0003-2215-4134"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Andreas H\u00fclsing","raw_affiliation_strings":["Eindhoven University of Technology, Eindhoven, The Netherlands","SandboxAQ, Palo Alto, USA"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]},{"raw_affiliation_string":"SandboxAQ, Palo Alto, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111291765","display_name":"Cameron Low","orcid":null},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Cameron Low","raw_affiliation_strings":["University of Bristol, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"University of Bristol, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028437223","display_name":"Matthias Meijers","orcid":"https://orcid.org/0000-0002-5351-991X"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Matthias Meijers","raw_affiliation_strings":["Eindhoven University of Technology, Eindhoven, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120695550","display_name":"Charlotte Mylog","orcid":null},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Charlotte Mylog","raw_affiliation_strings":["Norwegian University of Science and Technology (NTNU), Trondheim, Norway"],"affiliations":[{"raw_affiliation_string":"Norwegian University of Science and Technology (NTNU), Trondheim, Norway","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026765084","display_name":"Sabine Oechsner","orcid":"https://orcid.org/0000-0002-4612-2471"},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Sabine Oechsner","raw_affiliation_strings":["Vrije Universiteit Amsterdam, Amsterdam, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Vrije Universiteit Amsterdam, Amsterdam, The Netherlands","institution_ids":["https://openalex.org/I865915315"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5088006363"],"corresponding_institution_ids":["https://openalex.org/I36234482"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.77610898,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"137","last_page":"167"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.3271999955177307,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.3271999955177307,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.31709998846054077,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.06369999796152115,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.8648999929428101},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4927999973297119},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.47920000553131104},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45730000734329224},{"id":"https://openalex.org/keywords/cornerstone","display_name":"Cornerstone","score":0.45489999651908875},{"id":"https://openalex.org/keywords/formal-proof","display_name":"Formal proof","score":0.4481000006198883},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.39899998903274536},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.3749000132083893}],"concepts":[{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.8648999929428101},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8385999798774719},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5963000059127808},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4927999973297119},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.47920000553131104},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45730000734329224},{"id":"https://openalex.org/C2780616401","wikidata":"https://www.wikidata.org/wiki/Q1133673","display_name":"Cornerstone","level":2,"score":0.45489999651908875},{"id":"https://openalex.org/C94461902","wikidata":"https://www.wikidata.org/wiki/Q2762418","display_name":"Formal proof","level":3,"score":0.4481000006198883},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.39899998903274536},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.3749000132083893},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34790000319480896},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.3425000011920929},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.3312000036239624},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.2971000075340271},{"id":"https://openalex.org/C105605280","wikidata":"https://www.wikidata.org/wiki/Q7249999","display_name":"Proof complexity","level":3,"score":0.29670000076293945},{"id":"https://openalex.org/C2776445246","wikidata":"https://www.wikidata.org/wiki/Q1792644","display_name":"Style (visual arts)","level":2,"score":0.2953000068664551},{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.29179999232292175},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.2791000008583069},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.27469998598098755},{"id":"https://openalex.org/C124978682","wikidata":"https://www.wikidata.org/wiki/Q1201019","display_name":"Proof of concept","level":2,"score":0.26460000872612},{"id":"https://openalex.org/C2318724","wikidata":"https://www.wikidata.org/wiki/Q852732","display_name":"Proof theory","level":3,"score":0.26159998774528503},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.25850000977516174}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-981-95-5096-8_5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-95-5096-8_5","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-981-95-5096-8_5.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.tue.nl:publications/9fe42b11-0671-4343-b8a2-6187095ac08c","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/9fe42b11-0671-4343-b8a2-6187095ac08c","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Dupressoir, F, H\u00fclsing, A, Low, C, Meijers, M, Mylog, C & Oechsner, S 2025, How Hard can it be to\u00a0Formalize a\u00a0Proof? Lessons from Formalizing CryptoBox Three Times in EasyCrypt. in G Hanaoka & B-Y Yang (eds), Advances in Cryptology : 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8\u201312, 2025, Proceedings. vol. II, Lecture Notes in Computer Science (LNCS), vol. 16246, Springer, Singapore, pp. 137-167, 31st Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, Melbourne, Australia, 8/12/25. https://doi.org/10.1007/978-981-95-5096-8_5","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:research.vu.nl:publications/eab9c898-484f-4752-8c33-a31d25846e45","is_oa":false,"landing_page_url":"https://research.vu.nl/en/publications/eab9c898-484f-4752-8c33-a31d25846e45","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Dupressoir, F, H\u00fclsing, A, Low, C, Meijers, M, Mylog, C & Oechsner, S 2026, How Hard can it be to\u00a0Formalize a\u00a0Proof? Lessons from Formalizing CryptoBox Three Times in EasyCrypt. in G Hanaoka & B-Y Yang (eds), Advances in Cryptology \u2013 ASIACRYPT 2025 : 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8\u201312, 2025, Proceedings, Part II. vol. 2, Lecture Notes in Computer Science, vol. 16246 LNCS, ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security, vol. 2025, Springer Nature, pp. 137-167. https://doi.org/10.1007/978-981-95-5096-8_5","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:research.vu.nl:openaire_cris_publications/eab9c898-484f-4752-8c33-a31d25846e45","is_oa":false,"landing_page_url":"https://hdl.handle.net/1871.1/eab9c898-484f-4752-8c33-a31d25846e45","pdf_url":null,"source":{"id":"https://openalex.org/S4306401107","display_name":"VU Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Dupressoir, F, H\u00fclsing, A, Low, C, Meijers, M, Mylog, C & Oechsner, S 2026, How Hard can it be to\u00a0Formalize a\u00a0Proof? Lessons from Formalizing CryptoBox Three Times in EasyCrypt. in G Hanaoka & B-Y Yang (eds), Advances in Cryptology \u2013 ASIACRYPT 2025 : 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8\u201312, 2025, Proceedings, Part II. vol. 2, Lecture Notes in Computer Science, vol. 16246 LNCS, ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security, vol. 2025, Springer Nature, pp. 137-167. https://doi.org/10.1007/978-981-95-5096-8_5","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1007/978-981-95-5096-8_5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-981-95-5096-8_5","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-981-95-5096-8_5.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3462424673","display_name":null,"funder_award_id":"VIDI_grant","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"},{"id":"https://openalex.org/G5231279730","display_name":"A solid theory for post-quantum cryptography","funder_award_id":"VI.Vidi.193.066","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"}],"funders":[{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4417090542.pdf","grobid_xml":"https://content.openalex.org/works/W4417090542.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W18814837","https://openalex.org/W1910751411","https://openalex.org/W2029693536","https://openalex.org/W2070775894","https://openalex.org/W2108978217","https://openalex.org/W2123991163","https://openalex.org/W2156186849","https://openalex.org/W2167606175","https://openalex.org/W2898492666","https://openalex.org/W2967369616","https://openalex.org/W2971494243","https://openalex.org/W3003637591","https://openalex.org/W3152857967","https://openalex.org/W3159613676","https://openalex.org/W3164280722","https://openalex.org/W3201732747","https://openalex.org/W4288057722","https://openalex.org/W4386215101"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-12-07T00:00:00"}
