Prudent Engineering Practice for Cryptographic Protocols (1994)

by Martin Abadi , Roger Needhamt
Venue:Proc. IEEE Computer Society Symposium on Research in Security and Privacy
Citations:356 - 17 self

Documents Related by Co-Citation

1143 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
866 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978
2728 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
136 Three systems for cryptographic protocol analysis – R Kemmerer, C Meadows, J Millen - 1994
615 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
786 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
2928 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
249 G.M.: Timestamps in key distribution protocols – D E Denning, Sacco - 1981
276 Why Cryptosystems Fail – Ross Anderson - 2005
245 Secrecy by Typing in Security Protocols – Martín Abadi - 1998
85 Programming Satan's Computer – Ross Anderson, Roger Needham
55 What do we mean by entity authentication – D Gollmann - 1996
43 A Lesson on Authentication Protocol Design – Thomas Y.C. Woo, Thomas Y. C, Woo Simon, Simon S. Lam - 1994
1053 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
213 An Attack on the Needham-Schroeder Public-Key Authentication Protocol – Gavin Lowe - 1995
1015 Applied Cryptography – Bruce Schneier
95 Integrating Security in a Large Distributed System – M. Satyanarayanan - 1989
57 Secrecy Types for Asymmetric Communication – Martín Abadi, Bruno Blanchet - 2001
469 Entity Authentication and Key Distribution – Mihir Bellare, Phillip Rogaway - 1993