The Community for Technology Leaders
Green Image
<p><b>Abstract</b>—We present principles for designing cryptographic protocols. The principles are neither necessary nor sufficient for correctness. They are however helpful, in that adherence to them would have prevented a number of published errors.</p><p>Our principles are informal guidelines; they complement formal methods, but do not assume them. In order to demonstrate the actual applicability of these guidelines, we discuss some instructive examples from the literature.</p>
Cryptography, authentication, cryptographic protocols, authentication protocols, security.

M. Abadi and R. Needham, "Prudent Engineering Practice for Cryptographic Protocols," in IEEE Transactions on Software Engineering, vol. 22, no. , pp. 6-15, 1996.
87 ms
(Ver 3.3 (11022016))