The Community for Technology Leaders
Green Image
<p><b>Abstract</b>—We present principles for designing cryptographic protocols. The principles are neither necessary nor sufficient for correctness. They are however helpful, in that adherence to them would have prevented a number of published errors.</p><p>Our principles are informal guidelines; they complement formal methods, but do not assume them. In order to demonstrate the actual applicability of these guidelines, we discuss some instructive examples from the literature.</p>
Cryptography, authentication, cryptographic protocols, authentication protocols, security.
MartÍn Abadi, Roger Needham, "Prudent Engineering Practice for Cryptographic Protocols", IEEE Transactions on Software Engineering, vol. 22, no. , pp. 6-15, January 1996, doi:10.1109/32.481513
99 ms
(Ver 3.3 (11022016))