The avispa tool for the automated validation of internet security protocols and applications, Proceedings of CAV'2005, vol.3576, pp.281-285, 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00000408
An efficient cryptographic protocol verifier based on prolog rules, Proc. CSFW'01, pp.82-96, 2001. ,
Automatic verification of correspondences for security protocols, Journal of Computer Security, 2009. ,
DOI : 10.3233/jcs-2009-0339
URL : http://arxiv.org/pdf/0802.3444
,
The Scyther Tool: Verification, falsification, and analysis of security protocols, Computer Aided Verification, 20th International Conference, vol.5123, pp.414-418, 2008. ,
,
The Design of Rijndael, 2002. ,
Breaking and fixing the Needham-Schroeder public-key protocol using FDR, Proc. 2nd International Workshop on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), vol.1055, pp.147-166, 1996. ,
DOI : 10.1007/3-540-61042-1_43
URL : https://link.springer.com/content/pdf/10.1007%2F3-540-61042-1_43.pdf
Using encryption for authentification in large networks of computers, Communications of the ACM, vol.21, issue.12, pp.993-999, 1978. ,
Nombres premiers et cryptologie : lalgorithme rsa ,
URL : https://hal.archives-ouvertes.fr/inria-00203028