{"id":"https://openalex.org/W2248876515","doi":"https://doi.org/10.1145/2728816.2728822","title":"The Joint EasyCrypt-F*-CryptoVerif School 2014","display_name":"The Joint EasyCrypt-F*-CryptoVerif School 2014","publication_year":2015,"publication_date":"2015-01-28","ids":{"openalex":"https://openalex.org/W2248876515","doi":"https://doi.org/10.1145/2728816.2728822","mag":"2248876515"},"language":"en","primary_location":{"id":"doi:10.1145/2728816.2728822","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2728816.2728822","pdf_url":null,"source":{"id":"https://openalex.org/S4210221220","display_name":"ACM SIGLOG News","issn_l":"2372-3491","issn":["2372-3491"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGLOG News","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106466226","display_name":"C\u0103t\u0103lin Hri\u0163cu","orcid":"https://orcid.org/0000-0001-8919-8081"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"C\u0103t\u0103lin Hri\u0163cu","raw_affiliation_strings":["Inria Paris-Rocquencourt"],"affiliations":[{"raw_affiliation_string":"Inria Paris-Rocquencourt","institution_ids":["https://openalex.org/I1326498283"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5106466226"],"corresponding_institution_ids":["https://openalex.org/I1326498283"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13820058,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":"1","first_page":"23","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9710999727249146,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9301000237464905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6231513619422913},{"id":"https://openalex.org/keywords/soundness","display_name":"Soundness","score":0.6015142202377319},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5496165156364441},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5405349731445312},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5360209345817566},{"id":"https://openalex.org/keywords/electronic-voting","display_name":"Electronic voting","score":0.5334176421165466},{"id":"https://openalex.org/keywords/voting","display_name":"Voting","score":0.49878573417663574},{"id":"https://openalex.org/keywords/joint","display_name":"Joint (building)","score":0.4842838644981384},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.45946502685546875},{"id":"https://openalex.org/keywords/maturity","display_name":"Maturity (psychological)","score":0.4542839527130127},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.44308099150657654},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.43418505787849426},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4164021611213684},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3103393316268921},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.20506665110588074},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.17345589399337769},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1609976589679718},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.0833713710308075}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6231513619422913},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.6015142202377319},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5496165156364441},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5405349731445312},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5360209345817566},{"id":"https://openalex.org/C2780612046","wikidata":"https://www.wikidata.org/wiki/Q926161","display_name":"Electronic voting","level":4,"score":0.5334176421165466},{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.49878573417663574},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.4842838644981384},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.45946502685546875},{"id":"https://openalex.org/C101433766","wikidata":"https://www.wikidata.org/wiki/Q3543263","display_name":"Maturity (psychological)","level":2,"score":0.4542839527130127},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.44308099150657654},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.43418505787849426},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4164021611213684},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3103393316268921},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.20506665110588074},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.17345589399337769},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1609976589679718},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0833713710308075},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C170154142","wikidata":"https://www.wikidata.org/wiki/Q150737","display_name":"Architectural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C138496976","wikidata":"https://www.wikidata.org/wiki/Q175002","display_name":"Developmental psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2728816.2728822","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2728816.2728822","pdf_url":null,"source":{"id":"https://openalex.org/S4210221220","display_name":"ACM SIGLOG News","issn_l":"2372-3491","issn":["2372-3491"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGLOG News","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320313934","display_name":"Institut national de recherche en informatique et en automatique (INRIA)","ror":"https://ror.org/02kvxyf05"},{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W120743831","https://openalex.org/W2151232226","https://openalex.org/W2998799569","https://openalex.org/W2997649880","https://openalex.org/W180758165","https://openalex.org/W3107462019","https://openalex.org/W2273545368","https://openalex.org/W3029753489","https://openalex.org/W3049088603","https://openalex.org/W2113158062"],"abstract_inverted_index":{"Formal":[0],"security":[1,30],"verification":[2,31],"tools":[3],"are":[4],"slowly":[5],"reaching":[6],"maturity.":[7],"The":[8,47,67,110],"Joint":[9],"EasyCrypt-F*-CryptoVerif":[10],"School":[11],"took":[12],"place":[13],"between":[14,76],"24":[15],"and":[16,22,64,78,88,92,134],"28":[17],"November":[18],"2014":[19],"in":[20,144],"Paris":[21],"taught":[23],"participants":[24,37,53,86],"how":[25],"to":[26],"use":[27],"three":[28,114],"state-of-the-art":[29],"tools,":[32],"as":[33,35],"well":[34],"gave":[36],"a":[38],"glimpse":[39],"of":[40,69,101,107,129,140],"the":[41,70,83,99,104,108],"formal":[42,65],"foundations":[43],"behind":[44],"these":[45],"tools.":[46,109],"school":[48,71,111],"brought":[49],"together":[50],"over":[51],"80":[52],"from":[54,103],"12":[55],"countries,":[56],"with":[57],"backgrounds":[58],"spanning":[59],"security,":[60],"cryptography,":[61],"programming":[62],"languages,":[63],"methods.":[66],"time":[68],"was":[72],"roughly":[73],"evenly":[74],"split":[75],"lectures":[77],"hands-on":[79],"exercise":[80,84],"sessions.":[81],"For":[82],"sessions":[85],"installed":[87],"tried":[89],"EasyCrypt,":[90],"F*,":[91],"CryptoVerif":[93],"on":[94,120,126,137],"their":[95],"own":[96],"laptops,":[97],"under":[98],"guidance":[100],"members":[102],"developer":[105],"teams":[106],"also":[112],"contained":[113],"short":[115],"invited":[116],"talks:":[117],"Hubert":[118],"Comon":[119],"Unconditional":[121],"Soundness":[122],",":[123,133],"V\u00e9ronique":[124],"Cortier":[125],"Type-Based":[127],"Verification":[128],"Electronic":[130],"Voting":[131],"Protocols":[132],"Matteo":[135],"Maffei":[136],"Logical":[138],"Foundations":[139],"Secure":[141],"Resource":[142],"Management":[143],"Protocol":[145],"Implementations.":[146]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
