{"id":"https://openalex.org/W3205600320","doi":"https://doi.org/10.1145/3460120.3484567","title":"EasyPQC: Verifying Post-Quantum Cryptography","display_name":"EasyPQC: Verifying Post-Quantum Cryptography","publication_year":2021,"publication_date":"2021-11-12","ids":{"openalex":"https://openalex.org/W3205600320","doi":"https://doi.org/10.1145/3460120.3484567","mag":"3205600320"},"language":"en","primary_location":{"id":"doi:10.1145/3460120.3484567","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3460120.3484567","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3460120.3484567","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3460120.3484567","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065970435","display_name":"Manuel Barbosa","orcid":"https://orcid.org/0000-0002-6848-5564"},"institutions":[{"id":"https://openalex.org/I4210166615","display_name":"INESC TEC","ror":"https://ror.org/05fa8ka61","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210125590","https://openalex.org/I4210166615"]},{"id":"https://openalex.org/I182534213","display_name":"Universidade do Porto","ror":"https://ror.org/043pwc612","country_code":"PT","type":"education","lineage":["https://openalex.org/I182534213"]}],"countries":["PT"],"is_corresponding":true,"raw_author_name":"Manuel Barbosa","raw_affiliation_strings":["University of Porto (FCUP) and INESC TEC, Porto, Portugal"],"affiliations":[{"raw_affiliation_string":"University of Porto (FCUP) and INESC TEC, Porto, Portugal","institution_ids":["https://openalex.org/I4210166615","https://openalex.org/I182534213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075577852","display_name":"Gilles Barthe","orcid":"https://orcid.org/0000-0002-3853-1777"},"institutions":[{"id":"https://openalex.org/I4210087817","display_name":"Software (Germany)","ror":"https://ror.org/004g36n56","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210087817"]},{"id":"https://openalex.org/I4210096592","display_name":"Max Planck Institute for Security and Privacy","ror":"https://ror.org/00bj0r217","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210096592"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Gilles Barthe","raw_affiliation_strings":["MPI-SP and IMDEA Software Institute, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"MPI-SP and IMDEA Software Institute, Bochum, Germany","institution_ids":["https://openalex.org/I4210087817","https://openalex.org/I4210096592"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035320534","display_name":"Xiong Fan","orcid":"https://orcid.org/0000-0002-0166-0794"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiong Fan","raw_affiliation_strings":["Algorand, Inc., Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Algorand, Inc., Boston, MA, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103256238","display_name":"Benjamin Gr\u00e9goire","orcid":"https://orcid.org/0000-0001-6650-9924"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Benjamin Gr\u00e9goire","raw_affiliation_strings":["INRIA, Sophia-Antipolis, France"],"affiliations":[{"raw_affiliation_string":"INRIA, Sophia-Antipolis, France","institution_ids":["https://openalex.org/I1326498283"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102827941","display_name":"Shih-Han Hung","orcid":"https://orcid.org/0000-0003-3410-7466"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shih-Han Hung","raw_affiliation_strings":["University of Texas, Austin, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas, Austin, TX, USA","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053223081","display_name":"Jonathan Katz","orcid":"https://orcid.org/0000-0001-6084-9303"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jonathan Katz","raw_affiliation_strings":["University of Maryland, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033447950","display_name":"Pierre-Yves Strub","orcid":"https://orcid.org/0000-0002-8196-7875"},"institutions":[{"id":"https://openalex.org/I142476485","display_name":"\u00c9cole Polytechnique","ror":"https://ror.org/05hy3tk52","country_code":"FR","type":"education","lineage":["https://openalex.org/I142476485","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Pierre-Yves Strub","raw_affiliation_strings":["\u00c9cole Polytechnique, Paris, France"],"affiliations":[{"raw_affiliation_string":"\u00c9cole Polytechnique, Paris, France","institution_ids":["https://openalex.org/I142476485"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044901410","display_name":"Xiaodi Wu","orcid":"https://orcid.org/0000-0001-8877-9802"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaodi Wu","raw_affiliation_strings":["University of Maryland, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051561743","display_name":"Li Zhou","orcid":"https://orcid.org/0000-0002-9868-8477"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li Zhou","raw_affiliation_strings":["MPI-SP, Bochum, Ghana"],"affiliations":[{"raw_affiliation_string":"MPI-SP, Bochum, Ghana","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5065970435"],"corresponding_institution_ids":["https://openalex.org/I182534213","https://openalex.org/I4210166615"],"apc_list":null,"apc_paid":null,"fwci":0.2799,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64892613,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2021","issue":null,"first_page":"2564","last_page":"2586"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9781000018119812,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.7663795351982117},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.706305742263794},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5521449446678162},{"id":"https://openalex.org/keywords/extension","display_name":"Extension (predicate logic)","score":0.5138809680938721},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4924512803554535},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4893466830253601},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.47697314620018005},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4369882643222809},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.35695981979370117},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3224691152572632},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2354544997215271},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2032645344734192}],"concepts":[{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.7663795351982117},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.706305742263794},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5521449446678162},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.5138809680938721},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4924512803554535},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4893466830253601},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.47697314620018005},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4369882643222809},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.35695981979370117},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3224691152572632},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2354544997215271},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2032645344734192},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3460120.3484567","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3460120.3484567","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3460120.3484567","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"mag:3205600320","is_oa":false,"landing_page_url":"https://eprint.iacr.org/2021/1253.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S2764847869","display_name":"IACR Cryptology ePrint Archive","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":["https://openalex.org/P4322614454"],"host_organization_lineage_names":["Cryptology ePrint Archive"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Cryptology ePrint Archive","raw_type":null},{"id":"pmh:oai:HAL:hal-03529301v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-03529301","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ACM CCS 2021 - ACM SIGSAC Conference on Computer and Communications Security, Nov 2021, Virtual Event, South Korea. pp.2564-2586, &#x27E8;10.1145/3460120.3484567&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"doi:10.1145/3460120.3484567","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3460120.3484567","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3460120.3484567","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.5299999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G5680113809","display_name":null,"funder_award_id":"NSF-CCF-1942837","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3205600320.pdf","grobid_xml":"https://content.openalex.org/works/W3205600320.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1480477462","https://openalex.org/W1498858133","https://openalex.org/W1559699582","https://openalex.org/W1999626800","https://openalex.org/W2011086847","https://openalex.org/W2038761522","https://openalex.org/W2044357043","https://openalex.org/W2052267638","https://openalex.org/W2061949491","https://openalex.org/W2086590681","https://openalex.org/W2108978217","https://openalex.org/W2121087903","https://openalex.org/W2155544688","https://openalex.org/W2208601686","https://openalex.org/W2787461609","https://openalex.org/W2890237875","https://openalex.org/W2899524259","https://openalex.org/W2912352268","https://openalex.org/W2962712042","https://openalex.org/W2968763694","https://openalex.org/W2969498931","https://openalex.org/W2993800728","https://openalex.org/W2995073199","https://openalex.org/W3097686387","https://openalex.org/W3152271084","https://openalex.org/W3152857967","https://openalex.org/W3175664396","https://openalex.org/W4230556510","https://openalex.org/W4233762729"],"related_works":["https://openalex.org/W3214036351","https://openalex.org/W3212833711","https://openalex.org/W2015340470","https://openalex.org/W2809380763","https://openalex.org/W2282867171","https://openalex.org/W2991562218","https://openalex.org/W2614608017","https://openalex.org/W1430738455","https://openalex.org/W2952716275","https://openalex.org/W2097924903","https://openalex.org/W2101645518","https://openalex.org/W2972185435","https://openalex.org/W2126267504","https://openalex.org/W118984323","https://openalex.org/W2016172583","https://openalex.org/W194467232","https://openalex.org/W1987581799","https://openalex.org/W3101926357","https://openalex.org/W1939647617","https://openalex.org/W2895157835"],"abstract_inverted_index":{"EasyCrypt":[0,18,51,81],"is":[1],"a":[2,46,56,64],"formal":[3,19],"verification":[4],"tool":[5],"used":[6],"extensively":[7],"for":[8,82],"formalizing":[9],"concrete":[10],"security":[11,30,84,93],"proofs":[12,31],"of":[13,49,59,80,94],"cryptographic":[14],"constructions.":[15],"However,":[16],"the":[17,50],"logics":[20,53],"consider":[21],"only":[22],"classical":[23],"at-":[24],"tackers,":[25],"which":[26],"means":[27],"that":[28,45],"post-quantum":[29,60,83],"cannot":[32],"be":[33],"formalized":[34],"and":[35,86,103],"machine-checked":[36],"with":[37],"this":[38,41],"tool.":[39],"In":[40],"paper":[42],"we":[43,75],"prove":[44],"natural":[47],"extension":[48,79],"core":[52],"permits":[54],"capturing":[55],"wide":[57],"class":[58],"cryptography":[61],"proofs,":[62,85],"settling":[63],"question":[65],"raised":[66],"by":[67],"(Unruh,":[68],"POPL":[69],"2019).":[70],"Leveraging":[71],"our":[72],"positive":[73],"result,":[74],"implement":[76],"EasyPQC,":[77],"an":[78],"use":[87],"EasyPQC":[88],"to":[89],"verify":[90],"post-":[91],"quantum":[92],"three":[95],"classic":[96],"constructions:":[97],"PRF-based":[98],"MAC,":[99],"Full":[100],"Domain":[101],"Hash":[102],"GPV08":[104],"identity-based":[105],"encryption.":[106]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
