P. A. Grassi, M. E. Garcia, and J. L. Fenton, Nist special publication 800-63-3-digital identity guidelines, 2017.

R. Morris and K. Thompson, Password security: A case history, Communications of the ACM, vol.22, issue.11, pp.594-597, 1979.

P. A. Grassi, J. L. Fenton, E. M. Newton, R. A. Perlner, A. R. Regenscheid et al., Nist special publication 800-63b-digital identity guidelinesauthentication and lifecycle management, 2017.

, Google 2 Step

&. Fido and Y. ,

J. Bonneau, C. Herley, P. C. Oorschot, and F. Stajano, The quest to replace passwords: A framework for comparative evaluation of web authentication schemes, Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP '12, pp.553-567, 2012.

,

O. Pereira, F. Rochet, and C. Wiedling, Formal Analysis of the Fido 1.x Protocol, The 10th International Symposium on Foundations & Practice of Security, ser. Lecture Notes in Computer Science (LNCS), vol.10, p.2017

S. Kremer and R. Künnemann, Automated analysis of security protocols with global state, CoRR, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00955869

R. Künnemann and G. Steel, YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM, pp.257-272, 2013.

A. Armando, R. Carbone, and L. Zanetti, Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols, pp.728-734, 2013.

D. Basin, S. Radomirovic, and L. Schmid, Modeling human errors in security protocols, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.325-340, 2016.

D. A. Basin, S. Radomirovic, and M. Schläpfer, A complete characterization of secure human-server communication, IEEE 28th Computer Security Foundations Symposium, pp.199-213, 2015.

, G Suite updates-Improved phone prompts for 2-Step Verification

D. Dolev and A. Yao, On the security of public key protocols, Proc. 22nd Symp. on Foundations of Computer Science (FOCS'81), pp.350-357, 1981.

M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas et al., , 2018.

P. Kocher, D. Genkin, D. Gruss, W. Haas, M. Hamburg et al., Spectre attacks: Exploiting speculative execution, 2018.

M. Abadi and C. Fournet, Mobile values, new names, and secure communication, SIGPLAN Not, vol.36, issue.3, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Abadi, B. Blanchet, and C. Fournet, The applied pi calculus: Mobile values, new names, and secure communication, Journal of the ACM, vol.65, issue.1, pp.1-1, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01423924

B. Blanchet, Modeling and verifying security protocols with the applied pi calculus and proverif, Foundations and Trends R in Privacy and Security, vol.1, issue.1-2, pp.1-135, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01423760

,

, Proverif source files

A. Popov, M. Nystrom, D. Balfanz, A. Langley, N. Harper et al., Internet Engineering Task Force, Internet-Draft draft-ietf-tokbind-https-12, 2018.