Abstract | ||
---|---|---|
We present principles for the design of cryptographic protocols. The principles are neither necessary nor sufficient for correctness. They are however helpful, in that adherence to them would have avoided a considerable number of published errors. Our principles are informal guidelines. They complement formal methods, but do not assume them. In order to demonstrate the actual applicability of these guidelines, we discuss some instructive examples from the literature. |
Year | DOI | Venue |
---|---|---|
1996 | 10.1109/32.481513 | IEEE Transactions on Software Engineering |
Keywords | DocType | Volume |
protocol security,informal guideline,composition theorem,actual applicability,sufficient condition,cryptographic protocol,published error,instructive example,cryptographic protocols,prudent engineering practice,present principle,formal method,formal model,cryptography,logic,graphics,authentication,protocols | Journal | 22 |
Issue | ISSN | Citations |
1 | 0098-5589 | 305 |
PageRank | References | Authors |
38.44 | 30 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Martín Abadi | 1 | 12074 | 1324.31 |
Roger M. Needham | 2 | 4648 | 2075.99 |