S. Alt, P. Fouque, G. Macario-rat, C. Onete, and B. Richard, A cryptographic analysis of UMTS/LTE AKA, Proceedings of ACNS, vol.9696, pp.18-35, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01510791

M. Bellare and P. Rogaway, Entity authentication and key distribution, Advances in Cryptology-CRYPTO, pp.232-249, 1993.
DOI : 10.1007/3-540-48329-2_21

URL : https://link.springer.com/content/pdf/10.1007%2F3-540-48329-2_21.pdf

K. Bhargavan, B. Blanchet, and N. Kobeissi, Verified models and reference implementations for the TLS 1.3 standard candidate, Proceedings of S&P, pp.483-502, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01575920

K. Bhargavan, I. Boureanu, P. Fouque, C. Onete, and B. Richard, Content delivery over TLS: a cryptographic analysis of Keyless SSL, Proceedings of Euro S&P, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01673853

K. Bhargavan, A. Delignat-lavaud, C. Fournet, M. Kohlweiss, J. Pan et al., Implementing and proving the tls 1.3 record layer, Cryptology ePrint Archive, 1178.
URL : https://hal.archives-ouvertes.fr/hal-01674096

K. Bhargavan, A. Delignat-lavaud, C. Fournet, A. Pironti, and P. Strub, Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS, Proceedings of IEEE S&P 2014, pp.98-113, 2014.
DOI : 10.1109/sp.2014.14

URL : https://hal.archives-ouvertes.fr/hal-01102259

K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, and P. Strub, Implementing TLS with verified cryptopgrahic security, Proceedings of IEEE S&P 2013, pp.445-469, 2013.
DOI : 10.1109/sp.2013.37

URL : http://ieee-security.org/TC/SP2013/papers/4977a445.pdf

K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, P. Strub et al., Proving the TLS handshake secure (as it is), CRYPTO, pp.235-255, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01102231

C. Brzuska, M. Fischlin, N. Smart, B. Warinschi, and S. Williams, Less is more: Relaxed yet composable security notions for key exchange, International Journal of Information Security, vol.12, issue.4, pp.267-297, 2013.
DOI : 10.1007/s10207-013-0192-y

URL : http://eprint.iacr.org/2012/242.pdf

C. Brzuska and H. Kon-jacobsen, A modular security analysis of EAP and IEEE 802.11, Proceedings of PKC, vol.10175, 2017.

C. Brzuska, H. Kon-jacobsen, and D. Stebila, Safely exporting keys from secure channels: on the security of EAP-TLS and TLS key exporters, 2016.

B. B. Delignat-lavaud, N. Kobeissi, A. Pironti, and K. Bhargavan, FLEXTLS: A tool for testing TLS implementations, Proceedings of USENIX WOOT 2015, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01295035

B. Dowling, M. Fischlin, F. Günther, and D. Stebila, A cryptographic analysis of the TLS 1.3 handshake protocol candidates, ACM CCS, pp.1197-1210, 2015.

B. Dowling, M. Fischlin, F. Günther, and D. Stebila, A cryptographic analysis of the TLS 1.3 draft-10 full and pre-shared key handshake protocol, 2016.

Z. Durumeric, Z. Ma, D. Springall, R. Barnes, N. Sullivan et al., The security impact of HTTPS interception, Proceedings of NDSS, 2017.

M. Fischlin and F. Günther, Replay attacks on zero roundtrip time: the case of the TLS 1.3 handshake candidates, Proceedings of Euro S& P, pp.60-75, 2017.

P. Fouque, G. Macario-rat, C. Onete, and B. Richard, Achieving better privacy for the 3gpp aka protocol, Proceedings of PETS (PoPETS), 2016.
URL : https://hal.archives-ouvertes.fr/hal-01510801

R. Grahm, Extracting the SuperFish certificate

F. Günther, B. Hale, T. Jager, and S. Lauer, 0-RTT key exchange with full forward secrecy, Advances in cryptology-EUROCRYPT, vol.10212, pp.519-548

. Springer, , 2017.

T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, On the security of TLS-DHE in the standard model, Advances in Cryptology-CRYPTO, vol.7417, pp.273-293, 2012.

T. Jager, J. Schwenk, and J. Somorovsky, On the security of TLS 1.3 and QUIC against weaknesses in PKCS#1 v1.5 encryption, Proceedings of ACM CCS 2015, 2015.

M. Kohlweiss, U. Maurer, C. Onete, B. Tackmann, and D. Venturi, de-)constructing TLS. IACR ePrint archive, vol.020, 2014.
DOI : 10.1007/978-3-319-26617-6_5

URL : https://zenodo.org/record/56510/files/8-De-Constructing_TLS.pdf

M. Kohlweiss, U. Maurer, C. Onete, B. Tackmann, and D. Venturi, De-)constructing TLS 1.3, Proceedings of Indocrypt, vol.9462, pp.85-102, 2015.
DOI : 10.1007/978-3-319-26617-6_5

URL : https://zenodo.org/record/56510/files/8-De-Constructing_TLS.pdf

H. Jacobsen, A modular security analysis of eap and ieee 802.11, 2017.

H. Krawczyk, K. Paterson, and H. Wee, On the security of the TLS protocol: A systematic analysis, Proceedings of CRYPTO 2013, vol.8042, pp.429-448, 2013.

H. Krawczyk and H. Wee, The OPTLS protocol and tls 1.3, Proceedings of Euro S&P, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01378195

O. Levillain, B. Gourdin, and H. Debar, TLS record protocol: Security analysis and defense-in-depth countermeasures, Proceedings of ACM ASIACCS 2015, pp.225-236, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01154820

X. Li, J. Xu, Z. Zhang, D. Feng, and H. Hu, Multiple handshakes security of TLS 1.3 candidates, Proceedings of S&P, pp.485-505, 2016.

A. T. Ltd, Comparing approaches for web and DNS infrastructure security. goo.gl/PBD2N6, 2016.

D. Migault, K. Ma, R. Ericsson, . Rich, S. Akamai et al., Lurk tls dtls use cases, 2016.

P. Morrissey, N. Smart, and B. Warinschi, A modular security analysis of the TLS handshake protocol, Proceedings of ASIACRYPT 2008, vol.5350, pp.55-73, 2008.

D. Naylor, R. Li, C. Gkantsidis, T. Karagiannis, and P. Steenkiste, And then there were more: Secure communication for more than two parties, the 13th International Conference on emerging Networking EXperiments and Technologies, pp.88-100, 2017.

D. Naylor, K. Schomp, M. Varvello, I. Leontiadis, J. Blackburn et al., Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS, Proceedings of SIGCOMM 2015, pp.199-212, 2015.

M. O'neill, S. Ruoti, K. Seamons, and D. Zappala, TLS proxies: Friend or foe, Proceedings of IMC, pp.551-557, 2016.

T. Ormandy, Cloudflare reverse proxies are dumping uninitialized memory, 2015.

K. Paterson, T. Ristenpart, and T. Shrimpton, Tag size does matter: Attacks and proofs for the TLS record protocol, Advances in Cryptology-ASIACRYPT 2011, vol.7073, pp.372-389, 2011.

N. Swamy, C. Hritcu, C. Keller, A. Rastogi, A. Delignatlavaud et al., Dependent types and multi-monadic effects in F*, 43nd ACM Symposium on Principles of Programming Languages, pp.256-270, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01265793

J. K. Zinzindohoué, K. Bhargavan, J. Protzenko, and B. , Beurdouche. Hacl*: A verified modern cryptographic library, ACM CCS 2017. Cryptology ePrint Archive, 2017.