M. Abdalla and M. Bellare, Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques, LNCS, pp.546-559, 1976.
DOI : 10.1007/3-540-44448-3_42

D. Adrian, K. Bhargavan, Z. Durumeric, P. Gaudry, M. Green et al., Imperfect Forward Secrecy, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.5-17, 2015.
DOI : 10.1145/2810103.2813707

URL : https://hal.archives-ouvertes.fr/hal-01184171

N. J. Alfardan, D. J. Bernstein, K. G. Paterson, B. Poettering, and J. C. Schuldt, On the Security of RC4 in TLS, USENIX Security, pp.305-320, 2013.

N. J. Alfardan and K. G. Paterson, Lucky thirteen: Breaking the TLS and DTLS record protocols, 2013 IEEE Symposium on Security and Privacy, pp.526-540, 2013.

M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, A concrete security treatment of symmetric encryption, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.394-403, 1997.
DOI : 10.1109/SFCS.1997.646128

M. Bellare, J. Kilian, and P. Rogaway, The Security of Cipher Block Chaining, LNCS, vol.839, issue.94, pp.341-358
DOI : 10.1007/3-540-48658-5_32

M. Bellare, T. Kohno, and C. Namprempre, The Secure Shell (SSH) Transport Layer Encryption Modes, 2006.
DOI : 10.17487/rfc4344

B. Beurdouche, K. Bhargavan, A. Delignat-lavaud, C. Fournet, M. Kohlweiss et al., A messy state of the union, 2015 IEEE Symposium on Security and Privacy, pp.535-552, 2015.
DOI : 10.1145/3023357

URL : https://hal.archives-ouvertes.fr/hal-01114250

K. Bhargavan and G. Leurent, Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH, ISOC Network and Distributed System Security Symposium (NDSS16), 2016.
URL : https://hal.archives-ouvertes.fr/hal-01244855

K. K. Bodo-moller and T. Duong, This POODLE Bites: Exploiting The SSL 3.0 Fallback, 2014.

A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann et al., PRESENT: An Ultra-Lightweight Block Cipher, CHES 2007, pp.450-466
DOI : 10.1007/978-3-540-74735-2_31

T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246, 2008.

W. Diffie and M. E. Hellman, Privacy and authentication: An introduction to cryptography, Proceedings of the IEEE, pp.397-427, 1979.
DOI : 10.1109/PROC.1979.11256

T. Duong and J. Rizzo, Here come the ? ninjas. Unpublished manuscript, 2011.

M. Dworkin, Recommendation for Block Cipher Modes of Operation, National Institute for Standards and Technology, 2001.

P. Erdos and A. Rényi, On the evolution of random graphs, Bull. Inst. Internat. Statist, vol.38, issue.4, pp.343-347, 1961.

S. Frankel, S. Krishnan-]-c, K. G. Garman, T. V. Paterson, and . Der-merwe, IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap. IETF RFC 6071 Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS, USENIX Security, pp.113-128, 2011.
DOI : 10.17487/rfc6071

D. Hong, J. Sung, S. Hong, J. Lim, S. Lee et al., HIGHT: A New Block Cipher Suitable for Low-Resource Device, LNCS, vol.4249, pp.46-59, 2006.
DOI : 10.1007/11894063_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

T. Iwata, New Blockcipher Modes of Operation with Beyond the Birthday Bound Security, LNCS, vol.4047, pp.310-327, 2006.
DOI : 10.1007/11799313_20

A. Langley, N. Modadugu, and B. Moeller, Transport Layer Security (TLS) False Start, Internet Draft, 2015.
DOI : 10.17487/RFC7918

A. Luykx and K. G. Paterson, Limits on authenticated encryption use in TLS, 2016.

D. Mcgrew, Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes, Fast Software Encryption Workshop (FSE), 2013.

D. Mcgrew and P. Hoffman, Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH), 2014.
DOI : 10.17487/rfc7321

E. Petrank and C. Rackoff, CBC MAC for Real-Time Data Sources, Journal of Cryptology, vol.13, issue.3, pp.315-338, 2000.
DOI : 10.1007/s001450010009

J. Rizzo and T. Duong, The crime attack, EKOparty Security Conference, 2012.

P. Rogaway, Problems with Proposed IP Cryptography Unpublished draft, 1995.

P. Rogaway, Evaluation of Some Blockcipher Modes of Operation, CRYPREC, 2011.

P. C. Van-oorschot and M. J. Wiener, Parallel Collision Search with Cryptanalytic Applications, Journal of Cryptology, vol.12, issue.1, pp.1-28, 1999.
DOI : 10.1007/PL00003816

M. Vanhoef and F. Piessens, All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS, USENIX Security, pp.97-112, 2015.

K. Yasuda, A New Variant of PMAC: Beyond the Birthday Bound, LNCS, vol.6841, pp.596-609, 2011.
DOI : 10.1007/978-3-642-22792-9_34

T. Ylonen and C. Lonvick, The Secure Shell (SSH) Transport Layer Protocol, IETF RFC, vol.4253, 2006.
DOI : 10.17487/rfc4253