R. Amadio, D. Lugiez, and V. Vanackère, On the symbolic reduction of processes with cryptographic functions, Theoretical Computer Science, vol.290, issue.1, pp.695-740, 2003.
DOI : 10.1016/S0304-3975(02)00090-7

URL : https://hal.archives-ouvertes.fr/inria-00072478

A. The and . Team, The Avispa Tool for the automated validation of internet security protocols and applications, Proceedings of CAV 2005, Computer Aided Verification

A. Armando and L. Compagna, An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols, Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, pp.91-108, 2004.
DOI : 10.1016/j.entcs.2004.05.021

F. Baader and K. U. Schulz, Unification in the Union of Disjoint Equational Theories: Combining Decision Procedures, Journal of Symbolic Computing, pp.211-243, 1996.

D. Basin, S. Mödersheim, and L. Viganò, OFMC: A symbolic model checker for security protocols, International Journal of Information Security, vol.7, issue.3, pp.181-208, 2005.
DOI : 10.1007/s10207-004-0055-7

Y. Boichut, P. Héam, and O. Kouchnarenko, Automatic Verification of Security Protocols Using Approximations, INRIA Research Report, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00070291

M. Boreale, Symbolic Trace Analysis of Cryptographic Protocols, Proceedings of the 28th ICALP'01, pp.667-681, 2001.
DOI : 10.1007/3-540-48224-5_55

Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani, An NP decision procedure for protocol insecurity with XOR, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings., 2003.
DOI : 10.1109/LICS.2003.1210066

URL : https://hal.archives-ouvertes.fr/inria-00071889

Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani, Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents, Proceedings of the Foundations of Software Technology and Theoretical Computer Science (FSTTCS'03), 2003.
DOI : 10.1007/978-3-540-24597-1_11

URL : https://hal.archives-ouvertes.fr/inria-00103935

Y. Chevalier and L. Vigneron, A tool for lazy verification of security protocols, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001), 2001.
DOI : 10.1109/ASE.2001.989832

URL : https://hal.archives-ouvertes.fr/inria-00107545

J. Clark and J. Jacob, A Survey of Authentication Protocol Literature: Version 1.0, 17, 1997.

R. Corin and S. Etalle, An Improved Constraint-Based System for the Verification of Security Protocols, SAS, pp.326-341, 2002.
DOI : 10.1007/3-540-45789-5_24

D. Dolev and A. C. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983.
DOI : 10.1109/TIT.1983.1056650

C. Meadows, Open issues in formal methods for cryptographic protocol analysis, Proceedings of DISCEX 2000, pp.237-250, 2000.

J. Millen and V. Shmatikov, Symbolic protocol analysis with products and Diffie-Hellman exponentiation, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., pp.47-61, 2003.
DOI : 10.1109/CSFW.2003.1212704

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.1609

M. Rusinowitch and M. Turuani, Protocol insecurity with finite number of sessions is NP-complete, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.174-190, 2001.
DOI : 10.1109/CSFW.2001.930145

URL : https://hal.archives-ouvertes.fr/inria-00100411