M. Abadi, B. Blanchet, and C. Fournet, Verification of selected equivalences for security protocols, Journal of Logic and Algebraic Programming, vol.75, issue.1, pp.3-51, 2008.

M. Abadi and V. Cortier, Deciding knowledge in security protocols under equational theories, Theoretical Computer Science, vol.367, issue.1-2, pp.2-32, 2006.
DOI : 10.1016/j.tcs.2006.08.032

URL : https://hal.archives-ouvertes.fr/inria-00000554

M. Abadi and C. Fournet, Mobile values, new names, and secure communication, Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages(POPL'01), pp.104-115, 2001.
DOI : 10.1145/373243.360213

URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Arnaud, V. Cortier, and S. Delaune, Combining Algorithms for Deciding Knowledge in Security Protocols, Proceedings of the 6th International Symposium on Frontiers of Combining Systems (FroCoS'07), pp.103-117, 2007.
DOI : 10.1007/978-3-540-74621-8_7

URL : https://hal.archives-ouvertes.fr/inria-00129418

M. Baudet, Deciding security of protocols against off-line guessing attacks, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.16-25, 2005.
DOI : 10.1145/1102120.1102125

M. Baudet, V. Cortier, and S. Delaune, YAPA, Proceedings of the 20th International Conference on Rewriting Techniques and Applications (RTA'09), pp.148-163, 2009.
DOI : 10.1145/2422085.2422089

URL : https://hal.archives-ouvertes.fr/inria-00426624

M. Baudet, V. Cortier, and S. Kremer, Computationally sound implementations of equational theories against passive adversaries, Information and Computation, vol.207, issue.4, pp.496-520, 2009.
DOI : 10.1016/j.ic.2008.12.005

URL : https://hal.archives-ouvertes.fr/inria-00426620

D. Boneh and M. K. Franklin, Identity-Based Encryption from the Weil Pairing, Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'01), pp.213-229, 2001.
DOI : 10.1007/3-540-44647-8_13

Y. Chevalier and M. Rusinowitch, Hierarchical combination of intruder theories, Information and Computation, vol.206, issue.2-4, pp.352-377, 2008.
DOI : 10.1016/j.ic.2007.07.004

URL : https://hal.archives-ouvertes.fr/inria-00329715

S. ¸. Ciobâc?-a, S. Delaune, and S. Kremer, Computing knowledge in security protocols under convergent equational theories, Proceedings of the 22nd International Conference on Automated Deduction (CADE'09), Lecture Notes in Computer Science, pp.355-370, 2009.

H. Comon, Inductionless Induction, Handbook of Automated Reasoning, pp.913-962, 2001.
DOI : 10.1016/B978-044450813-3/50016-3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.53.5750

R. Corin, J. Doumen, and S. Etalle, Analysing Password Protocol Security Against Off-line Dictionary Attacks, Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, pp.47-63, 2004.
DOI : 10.1016/j.entcs.2004.10.007

URL : http://doi.org/10.1016/j.entcs.2004.10.007

V. Cortier, S. Delaune, and P. Lafourcade, A survey of algebraic properties used in cryptographic protocols, Journal of Computer Security, vol.14, issue.1, pp.1-43, 2006.
DOI : 10.3233/JCS-2006-14101

URL : https://hal.archives-ouvertes.fr/inria-00000552

D. Dolev and A. C. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983.
DOI : 10.1109/TIT.1983.1056650

A. Joux, A one round protocol for tripartite Diffie-Hellman, Proceedings of the 4th International Symposium on Algorithmic Number Theory(ANTS-IV), volume 1838 of Lecture Notes in Computer Science, pp.385-394, 2000.

S. Kremer and L. Mazaré, Adaptive Soundness of Static Equivalence, Proceedings of the 12th European Symposium on Research in Computer Security (ESORICS'07), pp.610-625, 2007.
DOI : 10.1007/978-3-540-74835-9_40

S. Kremer and L. Mazaré, Computationally sound analysis of protocols using bilinear pairings, Journal of Computer Security, vol.18, issue.6, 2009.
DOI : 10.3233/JCS-2009-0388

S. Kremer, A. Mercier, and R. Treinen, Reducing Equational Theories for the Decision of Static Equivalence, Proceedings of the 13th Asian Computing Science Conference, pp.94-108, 2009.
DOI : 10.1007/978-3-642-10622-4_8

URL : https://hal.archives-ouvertes.fr/hal-00495976