{"id":"https://openalex.org/W2011086847","doi":"https://doi.org/10.1145/1480881.1480894","title":"Formal certification of code-based cryptographic proofs","display_name":"Formal certification of code-based cryptographic proofs","publication_year":2009,"publication_date":"2009-01-20","ids":{"openalex":"https://openalex.org/W2011086847","doi":"https://doi.org/10.1145/1480881.1480894","mag":"2011086847"},"language":"en","primary_location":{"id":"doi:10.1145/1480881.1480894","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1480881.1480894","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075577852","display_name":"Gilles Barthe","orcid":"https://orcid.org/0000-0002-3853-1777"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Gilles Barthe","raw_affiliation_strings":["Instituto Madrile\u00f1o de Estudios Avanzados, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"Instituto Madrile\u00f1o de Estudios Avanzados, Madrid, Spain","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103256238","display_name":"Benjamin Gr\u00e9goire","orcid":"https://orcid.org/0000-0001-6650-9924"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I4210115519","display_name":"Centre de Recherche en Informatique","ror":"https://ror.org/020cdve92","country_code":"FR","type":"facility","lineage":["https://openalex.org/I190752583","https://openalex.org/I2746051580","https://openalex.org/I4210091621","https://openalex.org/I4210115519","https://openalex.org/I70768539"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Benjamin Gr\u00e9goire","raw_affiliation_strings":["Institut National de Recherche en Informatique et en Automatique, Sophia Antipolis, France","[Institut National de Recherche en Informatique et en Automatique, Sophia Antipolis, France]"],"affiliations":[{"raw_affiliation_string":"Institut National de Recherche en Informatique et en Automatique, Sophia Antipolis, France","institution_ids":["https://openalex.org/I4210115519"]},{"raw_affiliation_string":"[Institut National de Recherche en Informatique et en Automatique, Sophia Antipolis, France]","institution_ids":["https://openalex.org/I1326498283"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088954009","display_name":"Santiago Zanella-B\u00e9guelin","orcid":"https://orcid.org/0000-0003-0479-9967"},"institutions":[{"id":"https://openalex.org/I4210115519","display_name":"Centre de Recherche en Informatique","ror":"https://ror.org/020cdve92","country_code":"FR","type":"facility","lineage":["https://openalex.org/I190752583","https://openalex.org/I2746051580","https://openalex.org/I4210091621","https://openalex.org/I4210115519","https://openalex.org/I70768539"]},{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Santiago Zanella B\u00e9guelin","raw_affiliation_strings":["Institut National de Recherche en Informatique et en Automatique, Sophia Antipolis, France","[Institut National de Recherche en Informatique et en Automatique, Sophia Antipolis, France]"],"affiliations":[{"raw_affiliation_string":"Institut National de Recherche en Informatique et en Automatique, Sophia Antipolis, France","institution_ids":["https://openalex.org/I4210115519"]},{"raw_affiliation_string":"[Institut National de Recherche en Informatique et en Automatique, Sophia Antipolis, France]","institution_ids":["https://openalex.org/I1326498283"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075577852"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":29.3575,"has_fulltext":false,"cited_by_count":263,"citation_normalized_percentile":{"value":0.99723024,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"90","last_page":"101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.8473459482192993},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7624504566192627},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5440279245376587},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5373929738998413},{"id":"https://openalex.org/keywords/proof-assistant","display_name":"Proof assistant","score":0.5347100496292114},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4923173189163208},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.48324474692344666},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4383169710636139},{"id":"https://openalex.org/keywords/formal-proof","display_name":"Formal proof","score":0.4333553910255432},{"id":"https://openalex.org/keywords/observational-equivalence","display_name":"Observational equivalence","score":0.4177710711956024},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2104066014289856},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17221763730049133}],"concepts":[{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.8473459482192993},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7624504566192627},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5440279245376587},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5373929738998413},{"id":"https://openalex.org/C203265346","wikidata":"https://www.wikidata.org/wiki/Q11387554","display_name":"Proof assistant","level":3,"score":0.5347100496292114},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4923173189163208},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.48324474692344666},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4383169710636139},{"id":"https://openalex.org/C94461902","wikidata":"https://www.wikidata.org/wiki/Q2762418","display_name":"Formal proof","level":3,"score":0.4333553910255432},{"id":"https://openalex.org/C2777721189","wikidata":"https://www.wikidata.org/wiki/Q17121921","display_name":"Observational equivalence","level":2,"score":0.4177710711956024},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2104066014289856},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17221763730049133},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1480881.1480894","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1480881.1480894","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":73,"referenced_works":["https://openalex.org/W19911921","https://openalex.org/W178666261","https://openalex.org/W187962066","https://openalex.org/W1490590996","https://openalex.org/W1493079268","https://openalex.org/W1499994393","https://openalex.org/W1499996761","https://openalex.org/W1512460175","https://openalex.org/W1519566437","https://openalex.org/W1540546860","https://openalex.org/W1552695147","https://openalex.org/W1554259298","https://openalex.org/W1560144628","https://openalex.org/W1560272532","https://openalex.org/W1577115042","https://openalex.org/W1589034595","https://openalex.org/W1589586740","https://openalex.org/W1597181838","https://openalex.org/W1603876738","https://openalex.org/W1733287636","https://openalex.org/W1805549252","https://openalex.org/W1817126074","https://openalex.org/W1871739018","https://openalex.org/W1882430379","https://openalex.org/W1908897196","https://openalex.org/W1970606468","https://openalex.org/W1979215153","https://openalex.org/W1986681115","https://openalex.org/W2004881597","https://openalex.org/W2015880590","https://openalex.org/W2024355065","https://openalex.org/W2038517014","https://openalex.org/W2050509196","https://openalex.org/W2050586071","https://openalex.org/W2052735108","https://openalex.org/W2059808351","https://openalex.org/W2072920688","https://openalex.org/W2077300005","https://openalex.org/W2095708839","https://openalex.org/W2106218479","https://openalex.org/W2108834246","https://openalex.org/W2108978217","https://openalex.org/W2110172854","https://openalex.org/W2113005412","https://openalex.org/W2113081700","https://openalex.org/W2113999696","https://openalex.org/W2117362057","https://openalex.org/W2125500714","https://openalex.org/W2125894704","https://openalex.org/W2126267504","https://openalex.org/W2127035198","https://openalex.org/W2129695855","https://openalex.org/W2132022887","https://openalex.org/W2135000443","https://openalex.org/W2136310957","https://openalex.org/W2145188057","https://openalex.org/W2149996206","https://openalex.org/W2152688060","https://openalex.org/W2154231274","https://openalex.org/W2159543798","https://openalex.org/W2162653919","https://openalex.org/W2166957790","https://openalex.org/W2167606175","https://openalex.org/W2168418017","https://openalex.org/W2179025976","https://openalex.org/W2286477783","https://openalex.org/W2561675875","https://openalex.org/W2753555060","https://openalex.org/W2912926260","https://openalex.org/W3031048092","https://openalex.org/W3162919972","https://openalex.org/W4210300416","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W4392244959","https://openalex.org/W1938475825","https://openalex.org/W1588028307","https://openalex.org/W2521663436","https://openalex.org/W646737329","https://openalex.org/W2802459825","https://openalex.org/W2102593138","https://openalex.org/W1492993410","https://openalex.org/W2560470168"],"abstract_inverted_index":{"As":[0],"cryptographic":[1,236],"proofs":[2,31,91,94],"have":[3,8],"become":[4],"essentially":[5],"unverifiable,":[6],"cryptographers":[7],"argued":[9],"in":[10,29,39],"favor":[11],"of":[12,20,36,46,56,64,110,124,147,159,169,186,196,199,213,216,231],"developing":[13],"techniques":[14,24,52,79,177],"that":[15,59,67,100,117,204],"help":[16],"tame":[17],"the":[18,44,83,119,131,157],"complexity":[19],"their":[21],"proofs.":[22,126,237],"Game-based":[23],"provide":[25],"a":[26,61,107,115,163,167,194,202,211,222],"popular":[27],"approach":[28,58],"which":[30,40],"are":[32,95],"structured":[33],"as":[34,179],"sequences":[35],"games":[37],"and":[38,66,87,98,122,136,145,175,210],"proof":[41,75,133,195,212],"steps":[42],"establish":[43],"validity":[45],"transitions":[47],"between":[48],"successive":[49],"games.":[50],"Code-based":[51],"form":[53],"an":[54],"instance":[55],"this":[57],"takes":[60],"code-centric":[62],"view":[63],"games,":[65],"relies":[68],"on":[69,138],"programming":[70,148],"language":[71],"theory":[72,168],"to":[73,81,88,105,154],"justify":[74],"steps.":[76],"While":[77],"code-based":[78,125],"contribute":[80],"formalize":[82],"security":[84,198],"statements":[85],"precisely":[86],"carry":[89],"out":[90],"systematically,":[92],"typical":[93],"so":[96],"long":[97],"involved":[99],"formal":[101],"verification":[102,123],"is":[103,128,188],"necessary":[104],"achieve":[106],"high":[108],"degree":[109],"confidence.":[111],"We":[112],"present":[113],"Certicrypt,":[114],"framework":[116],"enables":[118],"machine-checked":[120],"construction":[121],"Certicrypt":[127,150,187],"built":[129],"upon":[130,206],"general-purpose":[132],"assistant":[134],"Coq,":[135],"draws":[137],"many":[139],"areas,":[140],"including":[141,162,193],"probability,":[142],"complexity,":[143],"algebra,":[144],"semantics":[146],"languages.":[149],"provides":[151,221],"certified":[152],"tools":[153],"reason":[155],"about":[156,181],"equivalence":[158],"probabilistic":[160],"programs,":[161],"relational":[164],"Hoare":[165],"logic,":[166],"observational":[170],"equivalence,":[171],"verified":[172],"program":[173],"transformations,":[174],"game-based":[176],"such":[178],"reasoning":[180],"failure":[182],"events.":[183],"The":[184],"usefulness":[185],"demonstrated":[189],"through":[190],"various":[191],"examples,":[192],"semantic":[197],"OAEP":[200],"(with":[201],"bound":[203],"improves":[205],"existing":[207],"published":[208],"results),":[209],"existential":[214],"unforgeability":[215],"FDH":[217],"signatures.":[218],"Our":[219],"work":[220],"first":[223],"yet":[224],"significant":[225],"step":[226],"towards":[227],"Halevi's":[228],"ambitious":[229],"programme":[230],"providing":[232],"tool":[233],"support":[234],"for":[235]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":17},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":21},{"year":2018,"cited_by_count":19},{"year":2017,"cited_by_count":12},{"year":2016,"cited_by_count":16},{"year":2015,"cited_by_count":19},{"year":2014,"cited_by_count":15},{"year":2013,"cited_by_count":19},{"year":2012,"cited_by_count":26}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
