A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The avispa tool for the automated validation of internet security protocols and applications, Proceedings of CAV'2005, vol.3576, pp.281-285, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00000408

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proc. CSFW'01, pp.82-96, 2001.

B. Blanchet, Automatic verification of correspondences for security protocols, Journal of Computer Security, 2009.
DOI : 10.3233/jcs-2009-0339

URL : http://arxiv.org/pdf/0802.3444

F. Cayre and . Cryptographie,

C. J. Cremers, The Scyther Tool: Verification, falsification, and analysis of security protocols, Computer Aided Verification, 20th International Conference, vol.5123, pp.414-418, 2008.

. Mathieu-cunche,

J. Daemen and V. Rijmen, The Design of Rijndael, 2002.

G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, Proc. 2nd International Workshop on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), vol.1055, pp.147-166, 1996.
DOI : 10.1007/3-540-61042-1_43

URL : https://link.springer.com/content/pdf/10.1007%2F3-540-61042-1_43.pdf

R. Needham and M. Schroeder, Using encryption for authentification in large networks of computers, Communications of the ACM, vol.21, issue.12, pp.993-999, 1978.

J. Touboul, Nombres premiers et cryptologie : lalgorithme rsa
URL : https://hal.archives-ouvertes.fr/inria-00203028