M. Abadi and C. Fournet, Private authentication, Special issue on Foundations of Wide Area Network Computing. Parts of this work were presented at PET'02 (LNCS 2482) and ISSS'02, pp.427-476, 2004.
DOI : 10.1016/j.tcs.2003.12.023

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.1266

M. Abadi, C. Fournet, and G. Gonthier, Authentication primitives and their compilation, Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '00, pp.302-315, 2000.
DOI : 10.1145/325694.325734

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.43.2930

M. Abadi, C. Fournet, and G. Gonthier, Secure Implementation of Channel Abstractions, Information and Computation, vol.174, issue.1, pp.37-83, 2002.
DOI : 10.1006/inco.2002.3086

M. Abadi and P. Rogaway, Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)*, Journal of Cryptology, vol.15, issue.2, pp.103-127, 2002.
DOI : 10.1007/s00145-001-0014-7

P. Adão, G. Bana, and A. Scedrov, Computational and Information-Theoretic Soundness and Completeness of Formal Encryption, 18th IEEE Computer Security Foundations Workshop (CSFW'05), pp.170-184, 2005.
DOI : 10.1109/CSFW.2005.13

P. Adão and C. Fournet, Cryptographically sound implementations for communicating processes (extended abstract) Draft technical report available from http, 33rd International Colloquium on Automata, Languages and Programming (ICALP), pp.83-94, 2006.

M. Backes and B. Pfitzmann, Symmetric encryption in a simulatable Dolev-Yao style cryptographic library, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., pp.204-218, 2004.
DOI : 10.1109/CSFW.2004.1310742

M. Backes, B. Pfitzmann, and M. Waidner, A composable cryptographic library with nested operations, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.220-230, 2003.
DOI : 10.1145/948109.948140

M. Backes, B. Pfitzmann, and M. Waidner, Symmetric Authentication within a Simulatable Cryptographic Library, International Journal of Information Security, vol.4, issue.3, pp.135-154, 2005.
DOI : 10.1007/978-3-540-39650-5_16

B. Blanchet, A computationally sound mechanized prover for security protocols, Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P, 2006.

V. Cortier and B. Warinschi, Computationally Sound, Automated Proofs for Security Protocols, Proceedings of the 14th European Symposium on Programming, pp.157-171, 2005.
DOI : 10.1007/978-3-540-31987-0_12

URL : https://hal.archives-ouvertes.fr/inria-00000556

P. Laud, Secrecy types for a simulatable cryptographic library, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.26-35, 2005.
DOI : 10.1145/1102120.1102126

D. Micciancio and B. Warinschi, Soundness of Formal Encryption in the Presence of Active Adversaries, Proceedings of the 1st Theory of Cryptography Conference (TCC), pp.133-151, 2004.
DOI : 10.1007/978-3-540-24638-1_8