M. Bond, Attacks on Cryptoprocessor Transaction Sets, Proceedings of the 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES'01), pp.220-234, 2001.
DOI : 10.1007/3-540-44709-1_19

Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani, An NP decision procedure for protocol insecurity with XOR, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings., 2003.
DOI : 10.1109/LICS.2003.1210066

URL : https://hal.archives-ouvertes.fr/inria-00103954

R. Clayton and M. Bond, Experience Using a Low-Cost FPGA Design to Crack DES Keys, Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded System (CHES'02), pp.579-592, 2003.
DOI : 10.1007/3-540-36400-5_42

J. Clulow, On the Security of PKCS #11, Proceedings of the 5th International Worshop on Cryptographic Hardware and Embedded Systems (CHES'03), pp.411-425, 2003.
DOI : 10.1007/978-3-540-45238-6_32

H. Comon-lundh and V. Cortier, New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols, Proceedings of the 14th International Conference on Rewriting Techniques and Applications (RTA'2003), pp.148-164, 2003.
DOI : 10.1007/3-540-44881-0_12

H. Comon-lundh and S. Delaune, The Finite Variant Property: How to Get Rid of Some Algebraic Properties, Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), pp.294-307, 2005.
DOI : 10.1007/978-3-540-32033-3_22

H. Comon-lundh and V. Shmatikov, Intruder deductions, constraint solving and insecurity decision in presence of exclusive or, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings., pp.271-280, 2003.
DOI : 10.1109/LICS.2003.1210067

V. Cortier, G. Keighren, and G. Steel, Automatic analysis of the security of xorbased key management schemes, Proceedings of the 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'07), pp.538-552, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00181616

J. Courant and J. Monin, Defending the bank with a proof assistant, Proceedings of Workshop on Issues in the Theory of Security (WITS '06), 2006.

N. Dershowitz and J. Jouannaud, Rewrite Systems, Handbook of Theoretical Computer Science, 1990.
DOI : 10.1016/B978-0-444-88074-1.50011-1

D. Dolev and A. Yao, On the security of public key protocols, IEEE Transactions in Information Theory, vol.2, issue.29, pp.198-208, 1983.

G. Keighren, Model checking IBM's common cryptographic architecture API, 2006.

G. Steel, Deduction with XOR Constraints in Security API Modelling, Proceedings of the 20th International Conference on Automated Deduction (CADE'05), pp.322-336, 2005.
DOI : 10.1007/11532231_24

K. N. Verma, H. Seidl, and T. Schwentick, On the Complexity of Equational Horn Clauses, Proceedings of the 20th International Conference on Automated Deduction, pp.337-352, 2005.
DOI : 10.1007/11532231_25

P. Youn, B. Adida, M. Bond, J. Clulow, J. Herzog et al., Robbing the Bank with a Theorem Prover, 2005.
DOI : 10.1007/978-3-642-17773-6_21