Issue No. 01 - January (1996 vol. 22)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/32.481513
<p><b>Abstract</b>—We present principles for designing cryptographic protocols. The principles are neither necessary nor sufficient for correctness. They are however helpful, in that adherence to them would have prevented a number of published errors.</p><p>Our principles are informal guidelines; they complement formal methods, but do not assume them. In order to demonstrate the actual applicability of these guidelines, we discuss some instructive examples from the literature.</p>
Cryptography, authentication, cryptographic protocols, authentication protocols, security.
MartÍn Abadi, Roger Needham, "Prudent Engineering Practice for Cryptographic Protocols", IEEE Transactions on Software Engineering, vol. 22, no. , pp. 6-15, January 1996, doi:10.1109/32.481513