M. Abadi and C. Fournet, Mobile values, new names, and secure communication, Proceedings of the 28th Symposium on Principles of Programming Languages (POPL'01, 2001.
DOI : 10.1145/373243.360213

URL : https://hal.archives-ouvertes.fr/hal-01423924

A. Armando, D. A. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proc. 17th International Conference on Computer Aided Verification (CAV'05), pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

D. A. Basin, C. Cremers, and S. Meier, Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication, Journal of Computer Security, vol.21, issue.6, pp.817-846, 2013.
DOI : 10.1007/978-3-642-28641-4_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.377.9839

D. A. Basin, S. Radomirovic, and L. Schmid, Modeling Human Errors in Security Protocols, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.325-340, 2016.
DOI : 10.1109/CSF.2016.30

B. Blanchet, An automatic security protocol verifier based on resolution theorem proving (invited tutorial), Proceedings of the 20th International Conference on Automated Deduction (CADE-20), 2005.

B. Blanchet, B. Smyth, and V. Cheval, Automatic Cryptographic Protocol Verifier, 2016.

R. Chadha, V. Cheval, S. ¸. Ciobâc?, and S. Kremer, Automated verification of equivalence properties of cryptographic protocol, ACM Transactions on Computational Logic, 2016.

T. Chothia, B. Smyth, and C. Staite, Automatically Checking Commitment Protocols in ProVerif without False Attacks, Proceedings of the 4th International Conference on Principles of Security and Trust (POST'15), pp.137-155, 2015.
DOI : 10.1007/978-3-662-46666-7_8

H. Comon-lundh and S. Delaune, The Finite Variant Property: How to Get Rid of Some Algebraic Properties, Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), pp.294-307, 2005.
DOI : 10.1007/978-3-540-32033-3_22

R. Corin, J. Doumen, and S. Etalle, Analysing Password Protocol Security Against Off-line Dictionary Attacks, Electronic Notes in Theoretical Computer Science, vol.121, pp.47-63, 2005.
DOI : 10.1016/j.entcs.2004.10.007

URL : http://doi.org/10.1016/j.entcs.2004.10.007

S. Delaune and F. Jacquemard, Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks, Journal of Automated Reasoning, vol.40, issue.2, pp.85-124, 2006.
DOI : 10.1007/s10817-005-9017-7

URL : https://hal.archives-ouvertes.fr/inria-00578855

S. Delaune, S. Kremer, and L. Robin, Formal verification of protocols based on short authenticated strings (extended version) Research report, Inria Nancy -Grand Est (Villers-l` es, 2017.

D. Dolev and A. C. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-207, 1983.
DOI : 10.1109/TIT.1983.1056650

C. Ellison, Ceremony design and analysis. Cryptology ePrint Archive, Report, vol.399399, 2007.

S. Escobar, C. Meadows, and J. Meseguer, Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, Foundations of Security Analysis and Design V, pp.1-50, 2009.
DOI : 10.1007/s10990-007-9000-6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.3197

]. S. Escobar, R. Sasse, and J. Meseguer, Folding variant narrowing and optimal variant termination, The Journal of Logic and Algebraic Programming, vol.81, issue.7-8, pp.898-928, 2012.
DOI : 10.1016/j.jlap.2012.01.002

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.3740

G. S. Grewal, M. Ryan, L. Chen, and M. Clarkson, Du-Vote: Remote Electronic Voting with Untrusted Computers, 2015 IEEE 28th Computer Security Foundations Symposium, pp.155-169, 2015.
DOI : 10.1109/CSF.2015.18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.696.4425

G. Lowe, Analysing protocols subject to guessing attacks, Journal of Computer Security, vol.12, issue.1, pp.83-98, 2004.
DOI : 10.3233/JCS-2004-12104

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.8012

D. Pavlovic and C. A. Meadows, Deriving Ephemeral Authentication Using Channel Axioms, Proc. 17th International Workshop on Security Protocols, pp.240-261, 2009.
DOI : 10.1007/978-3-642-36213-2_27

A. Roscoe, T. Smyth, and L. Nguyen, Model checking cryptographic protocols subject to combinatorial attack, 2012.

P. Y. Ryan and V. Teague, Pretty good democracy, Proc. 17th International Workshop on Security Protocols. Revised Selected Papers, pp.111-130, 2009.
DOI : 10.1007/978-3-642-36213-2_15

B. Schmidt, S. Meier, C. Cremers, and D. Basin, The tamarin prover for the symbolic analysis of security protocols, Proc. 25th International Conference on Computer Aided Verification (CAV'13), pp.696-701, 2013.