M. Bellare and G. Neven, Multi-signatures in the plain public-Key model and a general forking lemma, Proceedings of the 13th ACM conference on Computer and communications security - CCS '06, pp.390-399, 2006.

D. Bernhard, V. Cortier, D. Galindo, O. Pereira, and B. Warinschi, SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions, 2015 IEEE Symposium on Security and Privacy, vol.00, pp.499-516, 2015.

D. Bernhard, O. Pereira, and B. Warinschi, How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios, Advances in Cryptology ? ASIACRYPT 2012, vol.7658, pp.626-643, 2012.

D. Bernhard and B. Warinschi, Cryptographic Voting ? A Gentle Introduction, Foundations of Security Analysis and Design VII, pp.167-211, 2014.

B. Blanchet, Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif, Foundations of Security Analysis and Design VII, vol.8604, pp.54-87, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01102136

B. Blanchet, Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif, Foundations and Trends® in Privacy and Security, vol.1, issue.1-2, pp.1-135, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01423760

D. Boneh and R. Venkatesan, Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes, Advances in Cryptology ? CRYPTO ?96, pp.129-142, 1996.

V. Cheval, V. Cortier, and M. Turuani, A Little More Conversation, a Little Less Action, a Lot More Satisfaction: Global States in ProVerif, 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 2018.
URL : https://hal.archives-ouvertes.fr/hal-01774803

V. Cortier, D. Galindo, R. Kusters, J. Muller, and T. Truderung, SoK: Verifiability Notions for E-Voting Protocols, 2016 IEEE Symposium on Security and Privacy (SP), vol.00, pp.779-798, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01280445

V. Cortier, D. Galindo, and M. Turuani, A Formal Analysis of the Neuchatel e-Voting Protocol, 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018.
URL : https://hal.archives-ouvertes.fr/hal-01647150

R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, Secure Distributed Key Generation for Discrete-Log Based Cryptosystems, Journal of Cryptology, vol.20, issue.1, pp.51-83, 2006.

R. Haenni, P. Locher, R. E. Koenig, and E. Dubuis, Pseudo-Code Algorithms for Verifiable Re-encryption Mix-Nets, Financial Cryptography and Data Security, pp.370-384, 2017.

G. Lowe, A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop

T. P. Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Advances in Cryptology ? CRYPTO ?91, pp.129-140

B. Schmidt, S. Meier, C. Cremers, and D. Basin, Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, pp.78-94, 2012.

V. Shoup, U.S.-India Security Ties, 2005.