J. Baek, J. Newmarch, R. Safavi-naini, and W. Susilo, A survey of identity-based cryptography, Proc. of Australian Unix Users Group Annual Conference, pp.95-102, 2004.

D. Basin and C. Cremers, Modeling and analyzing security in the presence of compromising adversaries, Computer Security -ESORICS 2010, vol.6345, pp.340-356, 2010.

D. Basin and C. Cremers, Know your enemy: Compromising adversaries in protocol analysis, ACM Trans. Inf. Syst. Secur, vol.17, issue.2, p.31, 2014.

D. Basin, C. Cremers, and C. Meadows, Model checking security protocols, Handbook of Model Checking, pp.727-762, 2018.

D. Basin, J. Dreier, L. Hirschi, S. Radomirovi?, R. Sasse et al., A formal analysis of 5G authentication, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS '18, pp.1383-1396, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01898050

D. Basin, J. Dreier, and R. Sasse, Automated symbolic proofs of observational equivalence, Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security, pp.1144-1155, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01337409

D. Basin, L. Hirschi, and R. Sasse, Case study Tamarin models, pp.2019-2022, 2019.

D. Boneh and M. Franklin, Identity-based encryption from the weil pairing, Annual international cryptology conference, pp.213-229, 2001.

J. Cha-choon and J. Hee-cheon, An identity-based signature from gap diffiehellman groups, International workshop on public key cryptography, pp.18-30, 2003.

M. Clavel, F. Durán, S. Eker, P. Lincoln, N. Martí-oliet et al., All about maude-a high-performance logical framework: how to specify, program and verify systems in rewriting logic, 2007.

C. Cremers, M. Horvat, J. Hoyland, S. Scott, and T. Van-der-merwe, A comprehensive symbolic analysis of tls 1.3, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.1773-1788, 2017.

D. Dolev and A. C. Yao, On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1983.

B. Dowling, M. Fischlin, F. Günther, and D. Stebila, A cryptographic analysis of the tls 1.3 handshake protocol candidates, Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp.1197-1210, 2015.

J. Dreier, L. Hirschi, S. Radomirovi?, and R. Sasse, Automated unbounded verification of stateful cryptographic protocols with exclusive OR, 31st IEEE Computer Security Foundations Symposium, pp.359-373, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01780603

S. Escobar, C. Meadows, and J. Meseguer, A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties, Theoretical Computer Science, vol.367, issue.1-2, pp.162-202, 2006.

A. Fiat and A. Shamir, How to prove yourself: Practical solutions to identification and signature problems, Advances in Cryptology -CRYPTO'86, pp.186-194, 1986.

D. Longley and S. Rigby, An automatic search for security flaws in key management schemes, Computers & Security, vol.11, issue.1, pp.75-89, 1992.

C. Meadows, The NRL Protocol Analyzer: An overview, Journal of Logic Programming, vol.26, issue.2, pp.113-131, 1996.

S. Meier and B. Schmidt, Cas Cremers, and David Basin. The TAMARIN prover for the symbolic analysis of security protocols, International Conference on Computer Aided Verification, pp.696-701, 2013.

J. Millen and V. Shmatikov, Constraint solving for bounded-process cryptographic protocol analysis, Proceedings of the 8th ACM conference on Computer and Communications Security, pp.166-175, 2001.

J. K. Millen, S. C. Clark, and S. B. Freedman, The Interrogator: Protocol security analysis, IEEE Transactions on Software Engineering, vol.13, issue.2, pp.274-288, 1987.

B. Schmidt, S. Meier, C. Cremers, and D. Basin, Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF), pp.78-94, 2012.

B. Schmidt, R. Sasse, C. Cremers, and D. A. Basin, Automated verification of group key agreement protocols, 2014 IEEE Symposium on Security and Privacy, pp.179-194, 2014.

A. Shamir, Identity-based cryptosystems and signature schemes, Workshop on the theory and application of cryptographic techniques, pp.47-53, 1984.

F. Paul, C. Syverson, and . Meadows, A formal language for cryptographic protocol requirements. Designs, Codes and Cryptography, vol.7, pp.27-59, 1996.