M. Abdalla and M. Bellare, Increasing the lifetime of a key: a comparative analysis of the security of re-keying techniques, LNCS, vol.1976, pp.546-559, 2000.

D. Adrian, K. Bhargavan, Z. Durumeric, P. Gaudry, M. Green et al., Imperfect forward secrecy: How Diffie-Hellman fails in practice, ACM CCS 15, pp.5-17, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01184171

N. J. Alfardan, D. J. Bernstein, K. G. Paterson, B. Poettering, and J. C. Schuldt, On the Security of RC4 in TLS, USENIX Security, pp.305-320, 2013.

N. J. Alfardan and K. G. Paterson, Lucky thirteen: Breaking the TLS and DTLS record protocols, 2013 IEEE Symposium on Security and Privacy, pp.526-540, 2013.

N. Aviram, S. Schinzel, J. Somorovsky, N. Heninger, M. Dankel et al., DROWN: Breaking TLS using SSLv2, 2016.

M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, A concrete security treatment of symmetric encryption, 38th FOCS, pp.394-403, 1997.

M. Bellare, J. Kilian, and P. Rogaway, The security of cipher block chaining, LNCS, vol.94, pp.341-358

. Springer, , 1994.

M. Bellare, T. Kohno, and C. Namprempre, The Secure Shell (SSH) Transport Layer Encryption Modes, IETF RFC, vol.4344, 2006.
DOI : 10.17487/rfc4344

URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc4344.txt.pdf

B. Beurdouche, K. Bhargavan, A. Delignat-lavaud, C. Fournet, M. Kohlweiss et al., A messy state of the union: Taming the composite state machines of TLS, 2015 IEEE Symposium on Security and Privacy, pp.535-552, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01114250

K. Bhargavan and G. Leurent, Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH, ISOC Network and Distributed System Security Symposium (NDSS16), 2016.
DOI : 10.14722/ndss.2016.23418

URL : https://hal.archives-ouvertes.fr/hal-01244855

K. K. Bodo-moller and T. Duong, This POODLE Bites: Exploiting The SSL 3.0 Fallback, 2014.

A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann et al., PRESENT: An ultra-lightweight block cipher, LNCS, vol.4727, pp.450-466, 2007.
DOI : 10.1007/978-3-540-74735-2_31

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-74735-2_31.pdf

. Springer, , 2007.

T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246, 2008.

W. Diffie and M. E. Hellman, Privacy and authentication: An introduction to cryptography, Proceedings of the IEEE, vol.67, issue.3, pp.397-427, 1979.

T. Duong and J. Rizzo, Here come the ? ninjas. Unpublished manuscript, 2011.

M. Dworkin, Recommendation for Block Cipher Modes of Operation, NIST Special Publication, vol.800, 2001.

P. Erdos and A. Rényi, On the evolution of random graphs, Bull. Inst. Internat. Statist, vol.38, issue.4, pp.343-347, 1961.

S. Frankel and S. Krishnan, IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap, IETF RFC, vol.6071, 2011.

C. Garman, K. G. Paterson, and T. V. Der-merwe, Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS, USENIX Security, pp.113-128, 2015.

D. Hong, J. Sung, S. Hong, J. Lim, S. Lee et al., HIGHT: A new block cipher suitable for low-resource device, LNCS, vol.4249, pp.46-59, 2006.

, On the Assessment of Cryptographic Techniques and Key Lengths

, Standing Document 12, 2014.

T. Iwata, New blockcipher modes of operation with beyond the birthday bound security, LNCS, vol.4047, pp.310-327, 2006.

A. Langley, N. Modadugu, and B. Moeller, Transport Layer Security (TLS) False Start. Internet Draft, 2015.
DOI : 10.17487/rfc7918

URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc7918.txt.pdf

A. Luykx and K. G. Paterson, Limits on authenticated encryption use in TLS, 2016.

D. Mcgrew, Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes, Fast Software Encryption Workshop (FSE), 2013.

D. Mcgrew and P. Hoffman, Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH). IETF RFC 7321, 2014.

E. Petrank and C. Rackoff, CBC MAC for real-time data sources, Journal of Cryptology, vol.13, issue.3, pp.315-338, 2000.

J. Rizzo and T. Duong, The crime attack, EKOparty Security Conference, vol.2012, 2012.

P. Rogaway, Problems with Proposed IP Cryptography, 1995.

P. Rogaway, Evaluation of Some Blockcipher Modes of Operation, CRYPREC, 2011.

P. C. Van-oorschot and M. J. Wiener, Parallel collision search with cryptanalytic applications, Journal of Cryptology, vol.12, issue.1, pp.1-28, 1999.

M. Vanhoef and F. Piessens, All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS, USENIX Security, pp.97-112, 2015.

K. Yasuda, A new variant of PMAC: Beyond the birthday bound, LNCS, vol.6841, pp.596-609, 2011.

T. Ylonen and C. Lonvick, The Secure Shell (SSH) Transport Layer Protocol, IETF RFC, vol.4253, 2006.