M. Abadi and P. Rogaway, Reconciling two views of cryptography (the computational soundness of formal encryption), IFIP International Conference on Theoretical Computer Science (IFIP TCS2000), 2000.

E. Bresson, O. Chevassut, and D. Pointcheval, The Group Diffie-Hellman Problems, Proceedings of Selected Areas in Cryptography, 2002.
DOI : 10.1007/3-540-36492-7_21

M. Burmester and Y. Desmedt, A secure and efficient conference key distribution system (extended abstract), EUROCRYPT, pp.275-286, 1994.

M. Burmester and Y. Desmedt, A secure and scalable Group Key Exchange system, Information Processing Letters, vol.94, issue.3, pp.137-143, 2005.
DOI : 10.1016/j.ipl.2005.01.003

F. Bao, R. Deng, and H. Zhu, Variations of Diffie-Hellman Problem, Proceedings of the Fifth Conference on Information and Communications Security (ICIS 2003), pp.301-312, 2003.
DOI : 10.1007/978-3-540-39927-8_28

Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani, Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents, Proceedings of the Twenty-Third Conference on Foundations of Software Technology and Theoretical Computer Science, 2003.
DOI : 10.1007/978-3-540-24597-1_11

URL : https://hal.archives-ouvertes.fr/inria-00103935

W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, 1976.
DOI : 10.1109/TIT.1976.1055638

D. Dolev and A. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, 1983.

P. Gupta and V. Shmatikov, Towards computationally sound symbolic analysis of key exchange protocols, Proceedings of the 2005 ACM workshop on Formal methods in security engineering , FMSE '05, 2005.
DOI : 10.1145/1103576.1103580

J. Herzog, Computational soundness for standard assumptions of formal cryptography, 2004.

J. Katz and M. Yung, Scalable Protocols for Authenticated Group Key Exchange, Proc. of Crypto '03, pp.110-125, 2003.
DOI : 10.1007/978-3-540-45146-4_7

D. Micciancio and S. Panjwani, Adaptive Security of Symbolic Encryption, Proceedings of the Theory of cryptography conference, 2005.
DOI : 10.1007/978-3-540-30576-7_10

J. Millen and V. Shmatikov, Symbolic protocol analysis with products and diffiehellman exponentiation, Proceedings of the Sixteenth Computer Security Foundations Workshop, 2003.

M. Steiner, G. Tsudik, and M. Waidner, Diffie-Hellman key distribution extended to group communication, Proceedings of the 3rd ACM conference on Computer and communications security , CCS '96, 1996.
DOI : 10.1145/238168.238182