. Gsverif, https://sites.google.com/site/globalstatesverif, 2018.

M. Abadi and C. Fournet, Mobile values, new names, and secure communication, Proc. of the 28th ACM Symposium on Principles of Programming Languages (POPL'01), pp.104-115, 2001.
DOI : 10.1145/360204.360213

URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Arapinis, J. Phillips, E. Ritter, and M. Ryan, StatVerif: Verification of stateful processes, Journal of Computer Security, vol.22, issue.5, pp.743-821, 2014.
DOI : 10.3233/JCS-140501

URL : http://www.cs.bham.ac.uk/%7Emdr/research/papers/pdf/11-state-appi.pdf

A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, 17th International Conference on Computer Aided Verification, pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

C. Bansal, K. Bhargavan, and S. Maffeis, Discovering Concrete Attacks on Website Authorization by Formal Analysis, 2012 IEEE 25th Computer Security Foundations Symposium, 2012.
DOI : 10.1109/CSF.2012.27

URL : https://hal.archives-ouvertes.fr/hal-01102202

K. Bhargavan, R. Corin, C. Fournet, and E. Zalinescu, Cryptographically verified implementations for TLS, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.459-468, 2008.
DOI : 10.1145/1455770.1455828

B. Blanchet, An automatic security protocol verifier based on resolution theorem proving (invited tutorial), 20th International Conference on Automated Deduction (CADE-20), 2005.

B. Blanchet, Modeling and verifying security protocols with the applied pi calculus and ProVerif. Foundations and Trends in Privacy and Security, pp.1-135, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01423760

B. Blanchet, Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols, 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp.68-82, 2017.
DOI : 10.1109/CSF.2017.7

URL : https://hal.archives-ouvertes.fr/hal-01575861

B. Blanchet, B. Smyth, V. Cheval, and M. Sylvestre, Proverif 1.97: Automatic cryptographic protocol verifier, p.2017

A. Bruni, S. Moedersheim, F. Nielson, and H. R. Nielson, Set-Pi: Set Membership p-Calculus, 2015 IEEE 28th Computer Security Foundations Symposium, 2015.
DOI : 10.1109/CSF.2015.20

URL : http://orbit.dtu.dk/files/120567254/extended.pdf

V. Cortier, A. Filipiak, J. Florent, S. Gharout, and J. Traoré, Designing and Proving an EMV-Compliant Payment Protocol for Mobile Devices, 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp.467-480, 2017.
DOI : 10.1109/EuroSP.2017.19

URL : https://hal.archives-ouvertes.fr/hal-01408584

V. Cortier, D. Galindo, and M. Turuani, A formal analysis of the neuchâtel e-voting protocol, 3rd IEEE European Symposium on Security and Privacy (EuroSP'18), 2018.

V. Cortier and C. Wiedling, A formal analysis of the Norwegian E-voting protocol, Journal of Computer Security, vol.5, issue.1, pp.21-57, 2017.
DOI : 10.1109/CSF.2010.28

URL : https://hal.archives-ouvertes.fr/hal-00732907

C. Cremers, The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Computer Aided Verification, 20th International Conference, pp.414-418, 2008.
DOI : 10.1007/978-3-540-70545-1_38

S. Delaune, S. Kremer, and M. D. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.
DOI : 10.3233/JCS-2009-0340

S. Delaune, S. Kremer, M. D. Ryan, and G. Steel, Formal Analysis of Protocols Based on TPM State Registers, 2011 IEEE 24th Computer Security Foundations Symposium, pp.66-82, 2011.
DOI : 10.1109/CSF.2011.12

URL : https://hal.archives-ouvertes.fr/inria-00636747

S. Escobar, C. Meadows, and J. Meseguer, A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties, Theoretical Computer Science, vol.367, issue.1-2, pp.162-202, 2006.
DOI : 10.1016/j.tcs.2006.08.035

D. Galindo, S. Guasch, and J. Puiggali, 2015 Neuch??tel???s Cast-as-Intended Verification Mechanism, 5th International Conference, pp.3-18, 2015.
DOI : 10.1007/978-3-319-22270-7_1

J. A. Garay, M. Jakobsson, and P. Mackenzie, Abuse-Free Optimistic Contract Signing, 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'99), pp.449-466, 1999.
DOI : 10.1007/3-540-48405-1_29

URL : http://www.mathmagic.cn/crypt1998-2003/papers/1666/16660449.pdf

J. A. Garay, M. Jakobsson, and P. Mackenzie, Abuse-Free Optimistic Contract Signing, pp.449-466, 1999.
DOI : 10.1007/3-540-48405-1_29

URL : http://www.mathmagic.cn/crypt1998-2003/papers/1666/16660449.pdf

A. V. Herrewege, D. Singelee, and I. Verbauwhede, CANAuth-A simple, backward compatible broadcast authentication protocol for CAN bus, Proceedings of ECRYPT, 2011.

N. Kobeissi, K. Bhargavan, and B. Blanchet, Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach, 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp.435-450, 2017.
DOI : 10.1109/EuroSP.2017.38

URL : https://hal.archives-ouvertes.fr/hal-01575923

S. Kremer and R. Künnemann, Automated analysis of security protocols with global state, Journal of Computer Security, vol.11, issue.1, pp.583-616, 2016.
DOI : 10.1109/SP.2014.19

URL : https://hal.archives-ouvertes.fr/hal-01351388

S. Meier, Advancing automated security protocol verification, 2013.

S. Meier, B. Schmidt, C. Cremers, and D. Basin, The TAMARIN Prover for the Symbolic Analysis of Security Protocols, International Conference on Computer Aided Verification (CAV'13), pp.696-701, 2013.
DOI : 10.1007/978-3-642-39799-8_48

S. Moedersheim and A. Bruni, AIF- $$\omega $$ ?? : Set-Based Protocol Abstraction with Countable Families, 5th Conference on Principles of Security and Trust (POST'16), 2016.
DOI : 10.1007/978-3-642-02959-2_10

V. R. Pratt, Two easy theories whose combination is hard, 1977.

R. Security-inc and . Pkcs-#11, Cryptographic Token Interface Standard , v2, 2004.

B. Schmidt, S. Meier, C. Cremers, and D. Basin, Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, pp.78-94, 2012.
DOI : 10.1109/CSF.2012.25

A. Schutt and P. J. Stuckey, Incremental Satisfiability and Implication for UTVPI Constraints, INFORMS Journal on Computing, vol.22, issue.4, pp.514-527, 2010.
DOI : 10.1287/ijoc.1090.0369

URL : http://arxiv.org/pdf/0709.2961

A. Yubico, The YubiKey Manual -Usage, configuration and introduction of basic concepts (Version 2, p.2010