M. Abadi, M. Baudet, and B. Warinschi, Guessing Attacks and the Computational Soundness of Static Equivalence, Proc. 9th International Conference on Foundations of Software Science and Computation Structures (FoS- SaCS'06), pp.398-412, 2006.
DOI : 10.1007/11690634_27

M. Abadi and C. Fournet, Mobile values, new names, and secure communication, Proc. 28th Symposium on Principles of Programming Languages (POPL'01), pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Abadi and A. D. Gordon, A calculus for cryptographic protocols, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.36-47, 1997.
DOI : 10.1145/266420.266432

M. Abdalla, C. Chevalier, L. Granboulan, and D. Pointcheval, Contributory Password-Authenticated Group Key Exchange with Join Capability, Proc. The Cryptographers' Track at the RSA Conference (CT-RSA'11), pp.142-160, 2011.
DOI : 10.1017/CBO9781139165464

URL : https://hal.archives-ouvertes.fr/hal-00915828

M. Abdalla, C. Chevalier, and D. Pointcheval, Smooth Projective Hashing for Conditionally Extractable Commitments, Advances in Cryptology ? CRYPTO'09, pp.671-689, 2009.
DOI : 10.1007/978-3-642-03356-8_39

URL : https://hal.archives-ouvertes.fr/inria-00419145

S. Andova, C. J. Cremers, K. Gjøsteen, S. Mauw, S. F. Mjølsnes et al., A framework for compositional verification of security protocols, Information and Computation, vol.206, issue.2-4, pp.425-459, 2008.
DOI : 10.1016/j.ic.2007.07.002

M. Arapinis, S. Delaune, and S. Kremer, From One Session to Many: Dynamic Tags for Security Protocols, Proc. 15th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'08), pp.128-142, 2008.
DOI : 10.1007/978-3-540-89439-1_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.1133

M. Arapinis and M. Duflot, Bounding Messages for Free in Security??Protocols, Proc. 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FST&TCS'07), pp.376-387, 2007.
DOI : 10.1007/978-3-540-77050-3_31

URL : https://hal.archives-ouvertes.fr/hal-01195943

A. Armando, D. A. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proc. 17th International Conference on Computer Aided Verification (CAV'05), pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

B. Barak, Y. Lindell, and T. Rabin, Protocol initialization for the framework of universal composability, Cryptology ePrint Archive, 2004.

M. Baudet, Deciding security of protocols against off-line guessing attacks, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.16-25, 2005.
DOI : 10.1145/1102120.1102125

M. Baudet, Sécurité des protocoles cryptographiques : aspects logiques et calculatoires, Thèse de doctorat, 2007.

S. M. Bellovin and M. Merritt, Encrypted key exchange: password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.72-84, 1992.
DOI : 10.1109/RISP.1992.213269

URL : http://academiccommons.columbia.edu/download/fedora_content/download/ac:127104/CONTENT/neke.pdf

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.82-96, 2001.
DOI : 10.1109/CSFW.2001.930138

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.5150

B. Blanchet, Automatic proof of strong secrecy for security protocols, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.86-100, 2004.
DOI : 10.1109/SECPRI.2004.1301317

B. Blanchet and A. Podelski, Verification of Cryptographic Protocols: Tagging Enforces Termination, Proc. Foundations of Software Science and Computation Structures (FoS- SaCS'03), pp.136-152, 2003.
DOI : 10.1007/3-540-36576-1_9

X. Boyen, C. Chevalier, G. Fuchsbauer, and D. Pointcheval, Strong Cryptography from Weak Secrets, Progress in Cryptology ? AFRICACRYPT'10, pp.297-315, 2010.
DOI : 10.1007/978-3-642-12678-9_18

URL : https://hal.archives-ouvertes.fr/inria-00539542

V. Boyko, P. D. Mackenzie, and S. Patel, Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman, Advances in Cryptology ? EUROCRYPT'00, pp.156-171, 2000.
DOI : 10.1007/3-540-45539-6_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.7667

R. Canetti, Universally composable security: a new paradigm for cryptographic protocols, Proceedings 2001 IEEE International Conference on Cluster Computing, pp.136-145, 2001.
DOI : 10.1109/SFCS.2001.959888

R. Canetti, S. Halevi, J. Katz, Y. Lindell, and P. D. Mackenzie, Universally Composable Password-Based Key Exchange, Advances in Cryptology ? EUROCRYPT'05, pp.404-421, 2005.
DOI : 10.1007/11426639_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.419

E. Cohen, Proving cryptographic protocols safe from guessing attacks, Proc. Foundations of Computer Security (FCS'02), 2002.

R. Corin, J. Doumen, and S. Etalle, Analysing Password Protocol Security Against Off-line Dictionary Attacks, Electronic Notes in Theoretical Computer Science, vol.121, pp.47-63, 2005.
DOI : 10.1016/j.entcs.2004.10.007

URL : http://doi.org/10.1016/j.entcs.2004.10.007

R. Corin, S. Malladi, J. Alves-foss, and S. Etalle, Guess what? Here is a new tool that finds some new guessing attacks, Proc. of the Workshop on Issues in the Theory of Security (WITS'03), 2003.

V. Cortier, J. Delaitre, and S. Delaune, Safely composing security protocols, Proc. 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), Lecture Notes in Computer Science, 2007.
DOI : 10.1007/978-3-540-77050-3_29

URL : https://hal.archives-ouvertes.fr/inria-00157889

V. Cortier and S. Delaune, Safely composing security protocols. Formal Methods in System Design, pp.1-36, 2009.
DOI : 10.1007/978-3-540-77050-3_29

URL : https://hal.archives-ouvertes.fr/inria-00157889

A. Datta, A. Derek, J. Mitchell, and D. Pavlovic, A derivation system and compositional logic for security protocols, Journal of Computer Security, vol.13, issue.3, pp.423-482, 2005.
DOI : 10.3233/JCS-2005-13304

URL : http://doi.org/10.3233/jcs-2005-13304

S. Delaune and F. Jacquemard, Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks, Journal of Automated Reasoning, vol.40, issue.2, pp.85-124, 2006.
DOI : 10.1007/s10817-005-9017-7

URL : https://hal.archives-ouvertes.fr/inria-00578855

J. D. Guttman and F. J. Thayer, Protocol independence through disjoint encryption, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, pp.24-34, 2000.
DOI : 10.1109/CSFW.2000.856923

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.298.3042

F. Hao and P. Y. Ryan, Password Authenticated Key Exchange by Juggling, Proc. 16th International Security Protocols Workshop, pp.159-171, 2008.
DOI : 10.1016/j.tcs.2005.11.038

F. Hao and P. Y. Ryan, How to Sync with Alice, 19th International Security Protocols Workshop, pp.170-178, 2011.
DOI : 10.1109/LCOMM.2003.822506

D. Jablon, Strong password-only authenticated key exchange, ACM SIGCOMM Computer Communication Review, vol.26, issue.5, pp.5-26, 1996.
DOI : 10.1145/242896.242897

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.41.3216

J. Katz, R. Ostrovsky, and M. Yung, Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords, Advances in Cryptology ? EUROCRYPT'01, pp.475-494, 2001.
DOI : 10.1007/3-540-44987-6_29

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.9319

G. Lowe, Analysing protocols subject to guessing attacks, Journal of Computer Security, vol.12, issue.1, pp.83-98, 2004.
DOI : 10.3233/JCS-2004-12104

S. Malladi, J. Alves-foss, and S. Malladi, What are multi-protocol guessing attacks and how to prevent them, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.77-82, 2002.
DOI : 10.1109/ENABL.2002.1029992

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.5700

S. Patel, Number theoretic attacks on secure password schemes, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.236-247, 1997.
DOI : 10.1109/SECPRI.1997.601340

R. Ramanujam and S. P. Suresh, Decidability of context-explicit security protocols, Journal of Computer Security, vol.13, issue.1, pp.135-165, 2005.
DOI : 10.3233/JCS-2005-13106

C. Trusted and . Group, TPM Specification version 1.2. Parts 1?3, revision 103, 2007.