A. Armando, D. A. Basin, M. Bouallagui, Y. Chevalier, L. Compagna et al., The AVISS Security Protocol Analysis Tool, CAV '02: Proceedings of the 14th International Conference on Computer Aided Verification, pp.349-353, 2002.
DOI : 10.1007/3-540-45657-0_27

URL : https://hal.archives-ouvertes.fr/inria-00100915

D. Armando, Y. Basin, Y. Boichut, L. Chevalier, J. Compagna et al., The AVISPA tool for the automated validation of internet security protocols and applications An optimized intruder model for SATbased model-checking of security protocols New multiparty authentication services and key agreement protocols A logic of authentication, Proc. of CAV'2005, pp.281-285, 1990.

M. Boreale and M. G. Buscemi, Experimenting with STA, a tool for automatic analysis of security protocols, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.281-285, 2002.
DOI : 10.1145/508791.508847

M. B. Steven, O. Héam, P. Kouchnarenko, O. Héam, F. Kouchnarenko et al., An earlier version is available as technical report CUCS-009-11 Produit logiciel. TA4SP est un outil de validation de protocoles de sécurité Grâcè a une technique d'approximation appliquée sur leprobì eme d'atteignabilité en réécriture, TA4SP peut prouver qu'une propriété de secret est inviolée pour un nombre de sessions non-borné en sur-approximant la connaissance atteignable de l'intrus. L'outil peutégalement peutégalement montrer qu'une propriété est violée en sous-approximant la connaissance de l'intrus. Une démo de l'outil est disponiblè a l'adresse : t http Improvements on the Genet and Klay technique to automatically verify security protocols A Classical Introduction to Cryptography Exercise Book An efficient cryptographic protocol verifier based on prolog rules, Frank Miller: Inventor of the one-time pad. Cryptologia Proc. AVIS'04 Proc. CSFW'01BLP03] L. Bozga, Y. Lakhnech, and M. Perin. HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols. In Computer Aided Verification, pp.203-222, 2001.

C. Boyd, W. Mao, D. Basin, S. Mödersheim, L. Viganò-david et al., An On-The-Fly Model-Checker for Security Protocol Analysis Ofmc: A symbolic model checker for security protocols The authentication protocol Experimental comparison of automatic tools for the formal analysis of cryptographic protocols, Advances in Cryptology, EUROCRYPT'93 Proc. of ESORICS'03 DepCoS-RELCOMEX 2007CDL06] V. Cortier, S. Delaune, and P. Lafourcade. A survey of algebraic properties used in cryptographic protocols, pp.240-247, 1994.

R. Corin and S. Etalle, An Improved Constraint-Based System for the Verification of Security Protocols, Proc. 9th International Static Analysis Symposium (SAS), volume 2477 of LNCS, pp.326-341, 2002.
DOI : 10.1007/3-540-45789-5_24

M. Clavel, S. Eker, P. Lincoln, J. Meseguercre08, and ]. C. Cremers, Principles of Maude, Proceedings of the Sixteenth Annual Symposium on Logic in Computer Science ? LICS'01 Formal to Practical Security Computer Aided Verification, 20th International Conference, CAV, pp.65-89, 1996.
DOI : 10.1016/S1571-0661(04)00034-9

. Springer, [Cre11] Cas Cremers Key exchange in ipsec revisited: Formal analysis of ikev1 and ikev2, Proceedings of the 16th European Conference on Research in Computer Security, pp.315-334, 2008.

X. Chen, T. Van-deursen, J. Diffie, M. Hellmandsv03-]-luca-durante, R. Sisto et al., New directions in cryptography A comparative analysis of tools for verification of security protocols Automatic testing equivalence verification of spi calculus specifications On the security of public key protocols Catherine Meadows, and José Meseguer. Maudenpa: Cryptographic protocol analysis modulo equational properties, DSHJ10] Nitish Dalal, Jenny Shah, Khushboo Hisaria, and Devesh Jinwala Proceedings of the 22Nd Annual Symposium on Foundations of Computer Science, SFCS '81Gon89] L. Gong. Using one-way functions for authentication. SIGCOMM Computer Communication Seret. A comparative study of security protocols validation tools: HERMES vs. AVISPA. In InProc. ICACT'06, pp.107-126644, 1976.

[. Horng-twu, J. Wen-shenq, L. Chi-kai, and C. Kaufman, An electronic online bidding auction protocol with both security and efficiency Applied mathematics and computation Internet key exchange protocol version 2 (ikev2) IETF RFC 4306, Nir, P. Eronen, and T. Kivinen. Internet key exchange protocol version 2 (ikev2). IETF RFC 7296, pp.1487-1497, 2005.

R. Küsters, T. Truderunglow96, ]. G. Lowelow98, ]. Lowe, A. W. Roscoelr97b-]-g et al., Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation Breaking and fixing the needham-schroeder public-key protocol using fdr Casper: a compiler for the analysis of security protocols Using CSP to detect errors in the TMN protocol Using CSP to detect errors in the TMN protocol Comparison of cryptographic verification tools dealing with algebraic properties Language generation and verification in the NRL protocol analyzer Analyzing the needham-schroeder public-key protocol: A comparison of two approaches Automated analysis of cryptographic protocols using Murphi, ACM Conference on Computer and Communications Security Proceedings of the 22nd Computer Security Foundations Symposium (CSF) TACAs '96: Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems Formal Aspects in Security and Trust Proc. CSFW'96 Computer Security -ES- ORICS 96, 4th European Symposium on Research in Computer SecurityMMS97] J.C. Mitchell, M. Mitchell, and U. Stern IEEE Symposium on Security and Privacy, pp.129-138, 1996.

S. Meier, B. Schmidt, C. Cremers, and D. Basin, The TAMARIN Prover for the Symbolic Analysis of Security Protocols, Computer Aided Verification, pp.696-701
DOI : 10.1007/978-3-642-39799-8_48

N. , R. Needham, and M. Schroeder, Using encryption for authentication in large networks of computers, Communication of the ACM, vol.21, issue.12, pp.993-999, 1978.

R. Patel, B. Borisaniya, A. Patel, D. R. Patel, M. Rajarajan et al., Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification, Recent Trends in Network Security and Applications -Third International Conference ProceedingsPL] M. Puys and P. Lafourcade. Protocol tool comparison test archiveLP15_sources.tar.gz. [Ros94] A. W. Roscoe. Model-checking CSP IEEE Symposium on Foundations of Secure Systems, pp.152-163, 1994.
DOI : 10.1007/978-3-642-14478-3_16

Y. A. Peter, S. A. Ryan, ]. D. Schneidersbp01, S. Song, A. Berezin et al., Athena: A novel approach to efficient automatic security protocol analysis Applied Cryptography Automated analysis of diffie-hellman protocols and advanced security properties Key distribution protocol for digital mobile communication systems, Computer Security Foundations Symposium (CSF), 2012 IEEE 25th Proc. 9th Annual International Cryptology Conference (CRYPTO'89) 17th International Conference on Term Rewriting and Applications -RTA 2006 Lecture Notes in Computer Science, pp.7-1047, 1989.

S. Vaudenay and C. Lonvick, A Classical Introduction to Cryptography: Applications for Communications Security Automated security protocol analysis with the AVISPA tool The secure shell (ssh) transport layer protocol, ENTCS IETF RFC, vol.155, issue.4253, pp.61-86, 2005.