L. [. Baltag, S. Moss, and . Solecki, The Logic of Public Announcements, Common Knowledge, and Private Suspicions, Proceedings of TARK'98, pp.43-56, 1998.
DOI : 10.1007/978-3-319-20451-2_38

]. J. Bvek06, J. Van-benthem, B. Van-eijck, and . Kooi, Logics of communication and change. Information and Computation, pp.1620-1662, 2006.

M. Cohen and M. Dams, A complete axiomatisation of knowledge and cryptography, Proceedings of the 22nd Annual IEEE Symposium on Logic in Computer Science, pp.77-88, 2007.

W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

A. Hans-van-ditmarsch and . Herzig, Emiliano Lorini, and Frano¸isFrano¸is Schwarzentruber. Listen to me! public announcements to agents that pay attention ? or not, Proceedings of LORI, 2013.

H. Delfs and H. Knebl, Introduction To Cryptography ? Principles and Applications, 2002.

F. Dechesne and Y. Wang, Dynamic epistemic verification of security protocols: framework and case study, Meeting of the minds: Proceedings of the workshop Logic, Rationality and Interaction, 2007.

D. Dolev and A. C. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983.
DOI : 10.1109/TIT.1983.1056650

J. Van-eijck and S. Orzan, Modelling the epistemics of communication with functional programming, Sixth Symposium on Trends in Functional Programming TFP 2005, pp.44-59, 2005.

[. Van-eijck, F. Sietsma, and Y. Wang, Composing models, Journal of Applied Non-Classical Logics, vol.34, issue.2, pp.397-425, 2011.
DOI : 10.3166/jancl.21.397-425

URL : https://hal.archives-ouvertes.fr/inria-00535882

[. Gattinger, Epistemic crypto logic ? functional programming and model checking of cryptographic protocols Exam paper for the course 'Functional Specification of Algo- rithms, ILLC

[. Kramer, Logical concepts in cryptography, ACM SIGACT News, vol.38, issue.4, 2007.
DOI : 10.1145/1345189.1345205

L. Gary and . Miller, Riemann's hypothesis and tests for primality, Journal of Computer and System Sciences, vol.13, issue.3, pp.300-317, 1976.

K. Ron-van-der-meyden and . Su, Symbolic model checking the knowledge of the dining cryptographers, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., p.280, 2004.
DOI : 10.1109/CSFW.2004.1310747

T. Ron-van-der-meyden and . Wilke, Preservation of epistemic properties in security protocol implementations, Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge , TARK '07, pp.212-221, 2007.
DOI : 10.1145/1324249.1324278

C. Paar and J. Pelzl, Understanding Cryptography ? A Textbook for Students and Practitioners, 2009.

O. Michael and . Rabin, Probabilistic algorithm for testing primality, Journal of Number Theory, vol.12, issue.1, pp.128-138, 1980.

[. Wang, Epistemic Modelling and Protocol Dynamics, ILLC, 2010.