{"id":"https://openalex.org/W2294778415","doi":"https://doi.org/10.1109/csfw.2002.1021819","title":"Cryptographic types","display_name":"Cryptographic types","publication_year":2003,"publication_date":"2003-06-25","ids":{"openalex":"https://openalex.org/W2294778415","doi":"https://doi.org/10.1109/csfw.2002.1021819","mag":"2294778415"},"language":"en","primary_location":{"id":"doi:10.1109/csfw.2002.1021819","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csfw.2002.1021819","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084881756","display_name":"Dominic Duggan","orcid":null},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"D. Duggan","raw_affiliation_strings":["Department of Computer Science, Stevens Institute of Technology, Hoboken, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Stevens Institute of Technology, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5084881756"],"corresponding_institution_ids":["https://openalex.org/I108468826"],"apc_list":null,"apc_paid":null,"fwci":3.7437,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.93751916,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"238","last_page":"252"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8051925897598267},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.733322024345398},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.6919589638710022},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6006397604942322},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.5801339149475098},{"id":"https://openalex.org/keywords/security-of-cryptographic-hash-functions","display_name":"Security of cryptographic hash functions","score":0.45574402809143066},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.29681646823883057},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2159382402896881}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8051925897598267},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.733322024345398},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6919589638710022},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6006397604942322},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.5801339149475098},{"id":"https://openalex.org/C165511393","wikidata":"https://www.wikidata.org/wiki/Q7252276","display_name":"Security of cryptographic hash functions","level":5,"score":0.45574402809143066},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.29681646823883057},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2159382402896881}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/csfw.2002.1021819","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csfw.2002.1021819","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.19.8471","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.8471","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://guinness.cs.stevens-tech.edu/~dduggan/Public/Papers/crypto-types.ps","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W1487583155","https://openalex.org/W1505578292","https://openalex.org/W1518533182","https://openalex.org/W1523525039","https://openalex.org/W1562901937","https://openalex.org/W1591694044","https://openalex.org/W1605033550","https://openalex.org/W1841523394","https://openalex.org/W1965012291","https://openalex.org/W1966219798","https://openalex.org/W1987203566","https://openalex.org/W1987379210","https://openalex.org/W1991354622","https://openalex.org/W1994676271","https://openalex.org/W1995469872","https://openalex.org/W2011333687","https://openalex.org/W2019545801","https://openalex.org/W2024300530","https://openalex.org/W2034419863","https://openalex.org/W2034711041","https://openalex.org/W2067580212","https://openalex.org/W2076212434","https://openalex.org/W2097166325","https://openalex.org/W2101085206","https://openalex.org/W2103201802","https://openalex.org/W2104130981","https://openalex.org/W2104204098","https://openalex.org/W2110012131","https://openalex.org/W2111477637","https://openalex.org/W2127625071","https://openalex.org/W2129278597","https://openalex.org/W2136134319","https://openalex.org/W2144711132","https://openalex.org/W2150735864","https://openalex.org/W2150769115","https://openalex.org/W2161246822","https://openalex.org/W2170496240","https://openalex.org/W2171807364","https://openalex.org/W2481588761","https://openalex.org/W2987525079","https://openalex.org/W3022452059","https://openalex.org/W3023231920","https://openalex.org/W4231861573","https://openalex.org/W4237928050","https://openalex.org/W4243186596","https://openalex.org/W4248223175","https://openalex.org/W6630965296","https://openalex.org/W6635082193","https://openalex.org/W6685262851"],"related_works":["https://openalex.org/W4210360768","https://openalex.org/W1982325601","https://openalex.org/W1554274402","https://openalex.org/W89505464","https://openalex.org/W4240432851","https://openalex.org/W4230679059","https://openalex.org/W2904818008","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W3011048805"],"abstract_inverted_index":{"Cryptographic":[0,101,128],"types":[1,102,129],"are":[2,40,43,54,130],"a":[3,14,18,33,78,86,98,134,143],"way":[4],"to":[5,28,59,107,149],"express":[6],"cryptographic":[7,62,72,150],"guarantees":[8,27,93],"(of":[9],"secrecy":[10],"and":[11,53,89],"integrity)":[12],"in":[13,114],"type":[15,147],"system":[16],"for":[17,125,142,145],"network":[19,34,99],"programming":[20],"language.":[21],"This":[22],"allows":[23],"some":[24],"of":[25,70,94,97,118],"these":[26,42],"be":[29,105],"checked":[30],"statically,":[31],"before":[32],"program":[35],"executes.":[36],"Where":[37],"dynamic":[38,51],"checks":[39],"required,":[41],"represented":[44],"at":[45],"the":[46,57,67,82,95,115,119,137],"source":[47],"language":[48],"level":[49,61],"as":[50],"type-checking,":[52],"translated":[55],"by":[56],"compiler":[58],"lower":[60,116],"operations.":[63,151],"Static":[64],"checking":[65],"avoids":[66],"unnecessary":[68],"overhead":[69],"run-time":[71],"operations":[73,148],"where":[74,112],"communication":[75],"is":[76,140],"through":[77],"trusted":[79,87],"medium":[80],"(e.g.":[81],"OS":[83],"kernel,":[84],"or":[85],"subnet),":[88],"also":[90,104],"provides":[91],"static":[92],"reliability":[96],"application.":[100],"can":[103],"used":[106],"build":[108],"application-specific":[109],"security":[110,123],"protocols,":[111],"type-checking":[113],"layers":[117],"protocol":[120],"stack":[121],"verifies":[122],"properties":[124],"upper":[126],"layers.":[127],"described":[131],"formally":[132],"using":[133],"process":[135],"calculus,":[136],"ec-calculus.":[138],"Correctness":[139],"verified":[141],"scheme":[144],"compiling":[146]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
