J. Nadhem, D. J. Alfardan, K. G. Bernstein, B. Paterson, J. C. Poettering et al., On the Security of RC4 in TLS, pp.305-320, 2013.

M. R. Albrecht, J. Paul-degabriele, T. Brandt-hansen, and K. G. Paterson, A Surfeit of SSH Cipher Suites, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.1480-1491, 2016.
DOI : 10.1007/11761679_23

M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, A concrete security treatment of symmetric encryption, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.394-403, 1997.
DOI : 10.1109/SFCS.1997.646128

J. Daniel and . Bernstein, The poly1305-AES message-authentication code, FSE 2005, pp.32-49, 2005.

M. Bellare, T. Kohno, and C. Namprempre, The Secure Shell (SSH) Transport Layer Encryption Modes, 2006.
DOI : 10.17487/rfc4344

[. Bhargavan and G. Leurent, On the Practical (In-)Security of 64-bit Block Ciphers, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.456-467, 2016.
DOI : 10.1007/PL00003816

URL : https://hal.archives-ouvertes.fr/hal-01105128

E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, vol.36, issue.4, pp.3-72, 1991.
DOI : 10.1007/BF00630563

R. Beaulieu, D. Shors, J. Smith, S. Treatman-clark, B. Weeks et al., SIMON and SPECK : Block ciphers for the internet of things, Cryptology ePrint Archive, vol.585585, 2015.

J. Daemen, L. R. Knudsen, and V. Rijmen, The block cipher Square, FSE'97, pp.149-165, 1997.
DOI : 10.1007/BFb0052343

[. Dinur and G. Leurent, Improved generic attacks against hashbased MACs and HAIFA, CRYPTO 2014, pp.149-168, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01086177

T. Duong and J. Rizzo, Here come the ? ninjas, 2011.

[. Ferguson, /. St-/-toolkit, and /. Bcm, Authentication weaknesses in gcm Comment to NIST Collision attacks against CAESAR candidates -forgery and key-recovery against AEZ and Marble, ASIACRYPT 2015, pp.510-532, 2005.

[. Ferguson, B. Schneier, and T. Kohno, Cryptography engineering : design principles and practical applications, 2011.
DOI : 10.1002/9781118722367

J. Guo, T. Peyrin, Y. Sasaki, and L. Wang, Updates on Generic Attacks against HMAC and NMAC, CRYPTO 2014, pp.131-148, 2014.
DOI : 10.1007/978-3-662-44371-2_8

J. Lks-+-06-]-changhoon-lee, J. Kim, S. Sung, S. Hong, and . Lee, Forgery and key recovery attacks on PMAC and mitchell's TMAC variant, ACISP 06, pp.421-431, 2006.

A. Luykx and K. G. Paterson, Limits on authenticated encryption use in TLS, march 2016

G. Leurent, T. Peyrin, and L. Wang, New Generic Attacks against Hash-Based MACs, ASIACRYPT 2013, pp.1-20, 2013.
DOI : 10.1007/978-3-642-42045-0_1

M. Matsui, Linear cryptoanalysis method for DES cipher, EUROCRYPT'93, pp.386-397, 1994.

D. Mcgrew, Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes, Cryptology ePrint Archive, vol.623, 2012.

A. David, J. Mcgrew, and . Viega, The security and performance of the Galois/counter mode (GCM) of operation, LNCS, vol.3348, pp.343-355, 2004.

B. Preneel and P. C. Van-oorschot, MDx-MAC and Building Fast MACs from Hash Functions, CRYPTO'95, pp.1-14, 1995.
DOI : 10.1007/3-540-44750-4_1

B. Preneel and P. C. Van-oorschot, On the Security of Two MAC Algorithms, LNCS, vol.1070, issue.96, pp.19-32, 1996.
DOI : 10.1007/3-540-68339-9_3

T. Peyrin and L. Wang, Generic Universal Forgery Attack on Iterative Hash-Based MACs, EURO- CRYPT 2014, pp.147-164, 2014.
DOI : 10.1007/978-3-642-55220-5_9

P. Rogaway, Evaluation of some blockcipher modes of operation, 2011.