{"id":"https://openalex.org/W4313214001","doi":"https://doi.org/10.1134/s0361768822080035","title":"Optimization of ProVerif Programs for AKE Protocols","display_name":"Optimization of ProVerif Programs for AKE Protocols","publication_year":2022,"publication_date":"2022-12-01","ids":{"openalex":"https://openalex.org/W4313214001","doi":"https://doi.org/10.1134/s0361768822080035"},"language":"en","primary_location":{"id":"doi:10.1134/s0361768822080035","is_oa":false,"landing_page_url":"https://doi.org/10.1134/s0361768822080035","pdf_url":null,"source":{"id":"https://openalex.org/S150218641","display_name":"Programming and Computer Software","issn_l":"0361-7688","issn":["0361-7688","1608-3261"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Programming and Computer Software","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016699441","display_name":"Evgenii Vinarskii","orcid":"https://orcid.org/0000-0002-7328-0942"},"institutions":[{"id":"https://openalex.org/I118501908","display_name":"National Research University Higher School of Economics","ror":"https://ror.org/055f7t516","country_code":"RU","type":"education","lineage":["https://openalex.org/I118501908"]},{"id":"https://openalex.org/I4210101868","display_name":"Institute for System Programming","ror":"https://ror.org/017ef8252","country_code":"RU","type":"facility","lineage":["https://openalex.org/I1313323035","https://openalex.org/I4210101868","https://openalex.org/I4210124601"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"E. M. Vinarskii","raw_affiliation_strings":["Ivannikov Institute for System Programming, Russian Academy of Sciences, ul. Solzhenitsyna 25, 109004, Moscow, Russia","National Research University Higher School of Economics, Pokrovskii bul\u2019v. 11, 109028, Moscow, Russia","Ivannikov Institute for System Programming, Russian Academy of Sciences, Moscow, Russia","National Research University Higher School of Economics, Moscow, Russia"],"raw_orcid":"https://orcid.org/0000-0002-7328-0942","affiliations":[{"raw_affiliation_string":"Ivannikov Institute for System Programming, Russian Academy of Sciences, ul. Solzhenitsyna 25, 109004, Moscow, Russia","institution_ids":["https://openalex.org/I4210101868"]},{"raw_affiliation_string":"National Research University Higher School of Economics, Pokrovskii bul\u2019v. 11, 109028, Moscow, Russia","institution_ids":["https://openalex.org/I118501908"]},{"raw_affiliation_string":"Ivannikov Institute for System Programming, Russian Academy of Sciences, Moscow, Russia","institution_ids":["https://openalex.org/I4210101868"]},{"raw_affiliation_string":"National Research University Higher School of Economics, Moscow, Russia","institution_ids":["https://openalex.org/I118501908"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070370142","display_name":"Alexey Vasilyevich Demakov","orcid":"https://orcid.org/0000-0001-6573-7925"},"institutions":[{"id":"https://openalex.org/I4210101868","display_name":"Institute for System Programming","ror":"https://ror.org/017ef8252","country_code":"RU","type":"facility","lineage":["https://openalex.org/I1313323035","https://openalex.org/I4210101868","https://openalex.org/I4210124601"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"A. V. Demakov","raw_affiliation_strings":["Ivannikov Institute for System Programming, Russian Academy of Sciences, ul. Solzhenitsyna 25, 109004, Moscow, Russia","Ivannikov Institute for System Programming, Russian Academy of Sciences, Moscow, Russia"],"raw_orcid":"https://orcid.org/0000-0001-6573-7925","affiliations":[{"raw_affiliation_string":"Ivannikov Institute for System Programming, Russian Academy of Sciences, ul. Solzhenitsyna 25, 109004, Moscow, Russia","institution_ids":["https://openalex.org/I4210101868"]},{"raw_affiliation_string":"Ivannikov Institute for System Programming, Russian Academy of Sciences, Moscow, Russia","institution_ids":["https://openalex.org/I4210101868"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5016699441","https://openalex.org/A5070370142"],"corresponding_institution_ids":["https://openalex.org/I118501908","https://openalex.org/I4210101868"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18992613,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"48","issue":"8","first_page":"781","last_page":"787"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6844313144683838}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6844313144683838}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1134/s0361768822080035","is_oa":false,"landing_page_url":"https://doi.org/10.1134/s0361768822080035","pdf_url":null,"source":{"id":"https://openalex.org/S150218641","display_name":"Programming and Computer Software","issn_l":"0361-7688","issn":["0361-7688","1608-3261"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Programming and Computer Software","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W134285089","https://openalex.org/W146244851","https://openalex.org/W2108834246","https://openalex.org/W2108978217","https://openalex.org/W2161706819","https://openalex.org/W2544274814","https://openalex.org/W2618267215","https://openalex.org/W2620223972"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2093578348","https://openalex.org/W2376932109","https://openalex.org/W2382290278","https://openalex.org/W2766271392","https://openalex.org/W2350741829","https://openalex.org/W3004735627"],"abstract_inverted_index":{"Cryptographic":[0],"protocols":[1,168],"are":[2,37,147],"used":[3],"to":[4,71,88,111,150,162,185],"establish":[5],"secure":[6],"connection":[7],"between":[8],"agents":[9],"who":[10],"communicate":[11],"strictly":[12],"in":[13,143],"accordance":[14],"with":[15],"the":[16,20,72,75,97,120,123,132,144,152,171,192,195,201],"rules":[17],"specified":[18],"by":[19,90],"protocol.":[21],"To":[22],"make":[23,182],"sure":[24],"that":[25,74,169,181,190,207],"a":[26,45,52,79,140,160,187],"newly":[27],"designed":[28],"cryptographic":[29,46,81,105],"protocol":[30,47,82,124],"is":[31,48,94,134,210],"cryptographically":[32],"strong,":[33],"various":[34],"software":[35],"tools":[36,100],"usually":[38],"employed.":[39],"However,":[40,107],"an":[41],"adequate":[42],"specification":[43,77,189],"of":[44,54,58,66,78,96,104,122,139,215],"generally":[49],"represented":[50],"as":[51],"set":[53],"requirements":[55,69],"for":[56,101,166,194,200,212],"sequences":[57],"transmitted":[59],"messages,":[60],"including":[61],"their":[62],"format.":[63],"The":[64],"fulfillment":[65],"all":[67],"these":[68,129],"leads":[70],"fact":[73],"formal":[76,91,102],"real-world":[80,216],"becomes":[83],"cumbersome":[84],"and,":[85],"therefore,":[86],"difficult":[87],"analyze":[89,112],"methods.":[92],"ProVerif":[93,108,145,153,164,188,196],"one":[95],"intensively":[98],"developed":[99],"verification":[103,214],"protocols.":[106,217],"often":[109],"fails":[110],"large":[113],"protocols,":[114],"i.e.,":[115],"it":[116,183],"can":[117],"neither":[118],"prove":[119],"security":[121],"nor":[125],"refute":[126],"it.":[127],"In":[128,155,175],"cases,":[130],"either":[131],"problem":[133],"approximated":[135],"or":[136],"equivalent":[137,179],"transformations":[138,180],"program":[141],"model":[142],"language":[146],"carried":[148],"out":[149],"simplify":[151,163],"model.":[154],"this":[156,208],"paper,":[157],"we":[158,177],"propose":[159],"technique":[161],"specifications":[165],"AKE":[167],"use":[170],"ElGamal":[172],"encryption":[173],"scheme.":[174],"particular,":[176],"define":[178],"possible":[184],"construct":[186],"facilitates":[191],"analysis":[193],"tool.":[197],"Experimental":[198],"results":[199],"Needham\u2013Schroeder":[202],"and":[203],"Yahalom":[204],"cryptoprotocols":[205],"show":[206],"approach":[209],"promising":[211],"automatic":[213]},"counts_by_year":[],"updated_date":"2026-04-02T13:48:15.688549","created_date":"2025-10-10T00:00:00"}
