C. J. Cremers, The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Proc. 20th International Conference on Computer Aided Verification (CAV'08), vol.5123, pp.414-418, 2008.

B. Schmidt, S. Meier, C. Cremers, and D. Basin, The TAMARIN Prover for the Symbolic Analysis of Security Protocols, Proc. 25th International Conference on Computer Aided Verification (CAV'13), vol.8044, pp.696-701, 2013.

J. K. Millen and V. Shmatikov, Constraint solving for bounded-process cryptographic protocol analysis, Proc. 8th Conference on Computer and Communications Security, pp.166-175, 2001.

L. C. Paulson, The inductive approach to verifying cryptographic protocols, Journal of Computer Security, vol.6, issue.1/, pp.85-128, 1998.

P. Y. Ryan, S. A. Schneider, M. Goldsmith, G. Lowe, and A. W. Roscoe, Modelling and Analysis of Security Protocols, 2000.

M. Abadi and A. D. Gordon, A Calculus for Cryptographic Protocols: The spi Calculus, Inf. Comput, vol.148, issue.1, pp.1-70, 1999.

M. Abadi and C. Fournet, 28th Symposium on Principles of Programming Languages (POPL'01), pp.104-115, 2001.

F. J. Thayer-fabrega, J. C. Herzog, J. D. Guttman, and S. Spaces, Journal of Computer Security, vol.7, issue.2/3, pp.191-230, 1999.

S. Delaune, S. Kremer, and M. D. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.

M. Arapinis, T. Chothia, E. Ritter, and M. Ryan, Analysing Unlinkability and Anonymity Using the Applied Pi Calculus, Proc. 23rd Computer Security Foundations Symposium (CSF'10), pp.107-121, 2010.

N. Dong, H. Jonker, and J. Pang, Analysis of a receipt-free auction protocol in the applied pi calculus, Proc. International Workshop on Formal Aspects in Security and Trust (FAST'10, 2010.

B. Blanchet, M. Abadi, and C. Fournet, Automated verification of selected equivalences for security protocols, Journal of Logic and Algebraic Programming, vol.75, issue.1, pp.3-51, 2008.

A. Tiu and J. E. Dawson, Automating Open Bisimulation Checking for the Spi Calculus, Proc. 23rd Computer Security Foundations Symp. (CSF'10), pp.307-321, 2010.

V. Cheval, H. Comon-lundh, and S. Delaune, Trace Equivalence Decision: Negative Tests and Nondeterminism, Proc. 18th ACM Conference on Computer and Communications Security (CCS'11), 2011.

R. Chadha, V. Cheval, ?. Ciobâc?, and S. Kremer, Automated verification of equivalence properties of cryptographic protocol, ACM Transactions on Computational Logic, vol.17, issue.4, pp.1-32, 2016.

V. Cortier, S. Delaune, and A. Dallon, SAT-Equiv: an efficient tool for equivalence properties, Proceedings of the 30th IEEE Computer Security Foundations Symposium (CSF'17), pp.481-494, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01624274

V. Cheval, S. Kremer, and I. Rakotonirina, DEEPSEC: Deciding Equivalence Properties in Security Protocols -Theory and Practice, Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P'18), pp.525-542, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01698177

V. Cheval, V. Cortier, and S. Delaune, Deciding equivalence-based properties using constraint solving, Theoretical, Computer Science, vol.492, pp.1-39, 2013.

D. Baelde, S. Delaune, and L. Hirschi, Partial Order Reduction for Security Protocols, Proceedings of the 26th International Conference on Concurrency Theory (CONCUR'15, vol.42, pp.497-510, 2015.

K. Babel, V. Cheval, and S. Kremer, On communication models when verifying equivalence properties, 6th International Conference on Principles of Security and Trust (POST'17), vol.10204, pp.141-163, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01450898

B. Blanchet, Automatic Verification of Correspondences for Security Protocols, Journal of Computer Security, vol.17, issue.4, pp.363-434, 2009.

V. Cheval, S. Kremer, and I. Rakotonirina, , 2019.

M. Abadi and C. Fournet, Private Authentication, Theor. Comput. Sci, vol.322, issue.3, pp.427-476, 2004.