M. Abadi and P. Rogaway, Reconciling Two Views of Cryptography, Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics, pp.3-22, 2000.
DOI : 10.1007/3-540-44929-9_1

M. Bond, Attacks on Cryptoprocessor Transaction Sets, Proceedings of the 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES'01), pp.220-234, 2001.
DOI : 10.1007/3-540-44709-1_19

M. Bortolozzo, M. Centenaro, R. Focardi, and G. Steel, Attacking and fixing PKCS#11 security tokens, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.260-269, 2010.
DOI : 10.1145/1866307.1866337

C. Cachin and N. Chandran, A Secure Cryptographic Token Interface, 2009 22nd IEEE Computer Security Foundations Symposium, pp.141-153, 2009.
DOI : 10.1109/CSF.2009.7

J. Clulow, The design and analysis of cryptographic APIs for security devices, 2003.

J. Clulow, On the Security of PKCS #11, Proceedings of CHES 2003, pp.411-425, 2003.
DOI : 10.1007/978-3-540-45238-6_32

V. Cortier and G. Steel, A Generic Security API for Symmetric Key Management on Cryptographic Devices, Computer Security -ES- ORICS 2009, pp.605-620, 2009.
DOI : 10.1109/CSFW.2001.930145

URL : https://hal.archives-ouvertes.fr/hal-00881072

V. Cortier, G. Steel, and C. Wiedling, Revoke and let live, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12
DOI : 10.1145/2382196.2382293

URL : https://hal.archives-ouvertes.fr/hal-00732902

D. Dolev and A. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-207, 1983.
DOI : 10.1109/TIT.1983.1056650

S. Kremer, G. Steel, and B. Warinschi, Security for Key Management Interfaces, 2011 IEEE 24th Computer Security Foundations Symposium, pp.266-280, 2011.
DOI : 10.1109/CSF.2011.25

URL : https://hal.archives-ouvertes.fr/inria-00636734