/a-ləs ən(d) bäb/Cryptographic protocols are often made clearer by considering parties A and B, or Alice and Bob, performing some protocol.Eve the Eavesdropper, Paul the Prover, and Vic the Verifier are other common stand-in names. WhatIs