V. Cheval and B. Blanchet, Proving more observational equivalences with ProVerif, International Conference on Principles of Security and Trust, pp.226-246, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00863377

H. Krawczyk, Cryptographic extraction and key derivation: The hkdf scheme, Cryptology ePrint Archive, 2010.

L. Lamport, Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981.

P. Syverson, C. Meadows, and I. Cervesato, Dolev-Yao is no better than machiavelli, 2000.

, WebAssembly Core Specification, 2018.

J. Protzenko, J. Zinzindohoué, A. Rastogi, T. Ramananandro, P. Wang et al., Verified low-level programming embedded in F, Proceedings of the ACM on Programming Languages, vol.1, p.17, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01672706

P. Wang, K. Bhargavan, J. Zinzindohoué, A. Anand, C. Fournet et al.,

J. Zinzindohoué, K. Bhargavan, J. Protzenko, and B. Beurdouche, HACL*: A verified modern cryptographic library, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.1789-1806, 2017.