--- a/index.html Fri Sep 20 11:35:35 2019 +0100
+++ b/index.html Fri Sep 20 11:43:23 2019 +0100
@@ -249,7 +249,7 @@
In our formalisation we use the inductive method we learned from
<A HREF="https://www.cl.cam.ac.uk/~lp15/">Prof. Larry Paulson</A>.
- He used this method in order to prove the correctness of security
+ He used this method in order to prove the correctness of cryptographic
protocols. We have implemented our algorithm on top of the
the small <A HREF="https://en.wikipedia.org/wiki/Pintos">PINTOS</A>
operating system used for teaching (we passed all their test cases and were