A survey of identity-based cryptography, Proc. of Australian Unix Users Group Annual Conference, pp.95-102, 2004. ,
Modeling and analyzing security in the presence of compromising adversaries, Computer Security -ESORICS 2010, vol.6345, pp.340-356, 2010. ,
Know your enemy: Compromising adversaries in protocol analysis, ACM Trans. Inf. Syst. Secur, vol.17, issue.2, p.31, 2014. ,
Model checking security protocols, Handbook of Model Checking, pp.727-762, 2018. ,
A formal analysis of 5G authentication, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS '18, pp.1383-1396, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01898050
Automated symbolic proofs of observational equivalence, Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security, pp.1144-1155, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01337409
Case study Tamarin models, pp.2019-2022, 2019. ,
Identity-based encryption from the weil pairing, Annual international cryptology conference, pp.213-229, 2001. ,
An identity-based signature from gap diffiehellman groups, International workshop on public key cryptography, pp.18-30, 2003. ,
All about maude-a high-performance logical framework: how to specify, program and verify systems in rewriting logic, 2007. ,
A comprehensive symbolic analysis of tls 1.3, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.1773-1788, 2017. ,
On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1983. ,
A cryptographic analysis of the tls 1.3 handshake protocol candidates, Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp.1197-1210, 2015. ,
Automated unbounded verification of stateful cryptographic protocols with exclusive OR, 31st IEEE Computer Security Foundations Symposium, pp.359-373, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01780603
A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties, Theoretical Computer Science, vol.367, issue.1-2, pp.162-202, 2006. ,
How to prove yourself: Practical solutions to identification and signature problems, Advances in Cryptology -CRYPTO'86, pp.186-194, 1986. ,
An automatic search for security flaws in key management schemes, Computers & Security, vol.11, issue.1, pp.75-89, 1992. ,
The NRL Protocol Analyzer: An overview, Journal of Logic Programming, vol.26, issue.2, pp.113-131, 1996. ,
Cas Cremers, and David Basin. The TAMARIN prover for the symbolic analysis of security protocols, International Conference on Computer Aided Verification, pp.696-701, 2013. ,
Constraint solving for bounded-process cryptographic protocol analysis, Proceedings of the 8th ACM conference on Computer and Communications Security, pp.166-175, 2001. ,
The Interrogator: Protocol security analysis, IEEE Transactions on Software Engineering, vol.13, issue.2, pp.274-288, 1987. ,
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF), pp.78-94, 2012. ,
Automated verification of group key agreement protocols, 2014 IEEE Symposium on Security and Privacy, pp.179-194, 2014. ,
Identity-based cryptosystems and signature schemes, Workshop on the theory and application of cryptographic techniques, pp.47-53, 1984. ,
A formal language for cryptographic protocol requirements. Designs, Codes and Cryptography, vol.7, pp.27-59, 1996. ,