M. Arapinis, T. Chothia, E. Ritter, and M. Ryan, Analysing Unlinkability and Anonymity Using the Applied Pi Calculus, 2010 23rd IEEE Computer Security Foundations Symposium, 2010.
DOI : 10.1109/CSF.2010.15

URL : http://www.cs.bham.ac.uk/%7Etpc/Papers/csf10.pdf

M. Arapinis, L. Mancini, E. Ritter, M. Ryan, N. Golde et al., New privacy issues in mobile telephony, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.205-216, 2012.
DOI : 10.1145/2382196.2382221

M. Arapinis, E. Ritter, and M. Ryan, StatVerif: Verification of stateful processes, Proc. 24th IEEE Computer Security Foundations Symposium (CSF'11, pp.33-47, 2011.

A. Armando, D. A. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

A. Armando, R. Carbone, L. Compagna, J. Cuellar, and L. Tobarra, Formal analysis of SAML 2.0 web browser single sign-on, Proceedings of the 6th ACM workshop on Formal methods in security engineering, FMSE '08, pp.1-10, 2008.
DOI : 10.1145/1456396.1456397

D. Baelde, S. Delaune, I. Gazeau, and S. Kremer, Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR, 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp.234-248, 2017.
DOI : 10.1109/CSF.2017.22

URL : https://hal.archives-ouvertes.fr/hal-01533694

G. Barthe, J. M. Crespo, B. Grégoire, C. Kunz, Y. Lakhnech et al., Fully automated analysis of padding-based encryption in the computational model, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1247-1260, 2013.
DOI : 10.1145/2508859.2516663

URL : https://hal.archives-ouvertes.fr/hal-00935737

G. Barthe, F. Dupressoir, B. Grégoire, C. Kunz, B. Schmidt et al., EasyCrypt: A Tutorial, Foundations of Security Analysis and Design VII -FOSAD 2012, 2013.
DOI : 10.1145/1594834.1480894

URL : https://hal.archives-ouvertes.fr/hal-01114366

G. Barthe, B. Grégoire, and B. Schmidt, Automated proofs of pairingbased cryptography, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.1156-1168, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01246713

D. Basin and C. Cremers, Know Your Enemy, ACM Transactions on Information and System Security, vol.17, issue.2, pp.1-731, 2014.
DOI : 10.1145/2658996

D. Basin, J. Dreier, and R. Sasse, Automated Symbolic Proofs of Observational Equivalence, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1144-1155, 2015.
DOI : 10.1007/978-3-540-79966-5_1

URL : https://hal.archives-ouvertes.fr/hal-01337409

D. Basin, S. Mödersheim, and L. Viganò, OFMC: A symbolic model checker for security protocols, International Journal of Information Security, vol.7, issue.3, pp.181-208, 2005.
DOI : 10.1109/CSFW.2001.930145

K. Bhargavan, A. D. Lavaud, C. Fournet, A. Pironti, and P. Y. Strub, Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS, 2014 IEEE Symposium on Security and Privacy, pp.98-113, 2014.
DOI : 10.1109/SP.2014.14

URL : https://hal.archives-ouvertes.fr/hal-01102259

B. Blanchet, M. Abadi, and C. Fournet, Automated verification of selected equivalences for security protocols, Journal of Logic and Algebraic Programming, 2008.

B. Blanchet, A computationally sound mechanized prover for security protocols, IEEE Symposium on Security and Privacy, pp.21-24, 2006.

B. Blanchet, M. Abadi, and C. Fournet, Automated verification of selected equivalences for security protocols, The Journal of Logic and Algebraic Programming, vol.75, issue.1, pp.3-51, 2008.
DOI : 10.1016/j.jlap.2007.06.002

B. Blanchet and B. Smyth, Automated reasoning for equivalences in the applied pi calculus with barriers, Computer Security Foundations Symposium (CSF), 2016 IEEE 29th, pp.310-324, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01423742

M. Brusó, Dissecting unlinkability, 2014.

R. Chadha, V. Cheval, and S. Kremer, Automated Verification of Equivalence Properties of Cryptographic Protocols, ACM Transactions on Computational Logic, vol.17, issue.4, pp.1-2332, 2016.
DOI : 10.1007/3-540-48660-7_29

URL : https://hal.archives-ouvertes.fr/inria-00632564

D. Chaum, Blind signatures for untraceable payments Advances in Cryptology: Proceedings of CRYPTO '82, pp.199-203, 1982.

D. Chaum, A. Fiat, and M. Naor, Untraceable Electronic Cash, Advances in Cryptology: Proceedings of CRYPTO '88, pp.319-327, 1990.
DOI : 10.1007/0-387-34799-2_25

URL : https://link.springer.com/content/pdf/10.1007%2F0-387-34799-2_25.pdf

V. Cheval, H. Comon-lundh, and S. Delaune, Trace equivalence decision, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011.
DOI : 10.1145/2046707.2046744

URL : http://kar.kent.ac.uk/46878/1/CCD-ccs11.pdf

Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani, An NP decision procedure for protocol insecurity with XOR, pp.261-270, 2003.
URL : https://hal.archives-ouvertes.fr/inria-00071889

H. Y. Chien and C. W. Huang, A Lightweight RFID Protocol Using Substring, Embedded and Ubiquitous Computing (EUC), pp.422-431, 2007.
DOI : 10.1007/978-3-540-77092-3_37

H. Comon-lundh and S. Delaune, The Finite Variant Property: How to Get Rid of Some Algebraic Properties, Term Rewriting and Applications, 16th International Conference, RTA. LNCS, pp.294-307, 2005.
DOI : 10.1007/978-3-540-32033-3_22

C. J. Cremers, The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, 20th International Conference on Computer Aided Verification (CAV'08). LNCS, pp.414-418, 2008.
DOI : 10.1007/978-3-540-70545-1_38

S. Delaune, M. D. Ryan, and B. Smyth, Automatic Verification of Privacy Properties in the Applied pi Calculus, Proceedings 2nd Joint iTrust and PST Conferences on Privacy, Trust Management and Security, 2008.
DOI : 10.1007/978-0-387-09428-1_17

T. V. Deursen and S. Radomirovi´cradomirovi´c, Algebraic Attacks on RFID Protocols, Lecture Notes in Computer Science, vol.29, issue.2, pp.38-51, 2009.
DOI : 10.1007/11601494_14

T. V. Deursen and S. Radomirovi´cradomirovi´c, Attacks on RFID protocols (version 1.1) Cryptology ePrint Archive, Report, vol.310, p.310, 2008.

J. Dreier, C. Duménil, S. Kremer, and R. Sasse, Beyond subtermconvergent equational theories in automated verification of stateful protocols, Principles of Security and Trust -6th International Conference, POST 2017, pp.117-140, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01430490

J. Dreier, L. Hirschi, S. Radomirovic, and R. Sasse, Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR (Extended Version) Research report-l` es-Nancy, 2018.

J. Dreier, A. Kassem, and P. Lafourcade, Formal Analysis of E-Cash Protocols, Proceedings of the 12th International Conference on Security and Cryptography, pp.65-75, 2015.
DOI : 10.5220/0005544500650075

URL : https://hal.archives-ouvertes.fr/hal-01337410

S. Escobar, C. Meadows, and J. Meseguer, Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, Foundations of Security Analysis and Design V, pp.1-50, 2009.
DOI : 10.1007/s10990-007-9000-6

URL : http://users.dsic.upv.es/%7Esescobar/papers/fosad07.pdf

S. Escobar, R. Sasse, and J. Meseguer, Folding variant narrowing and optimal variant termination, Journal of Logic and Algebraic Programming, vol.81, pp.7-8, 2012.
DOI : 10.1007/978-3-642-16310-4_5

URL : http://www.dsic.upv.es/%7Esescobar/papers/wrla10.pdf

J. D. Guttman and J. D. Ramsdell, CPSA: a cryptographic protocol shapes analyzer, 2009.

L. Hirschi, D. Baelde, and S. Delaune, A method for verifying privacytype properties: The unbounded case, IEEE Symposium on Security and Privacy, SP 2016, pp.564-581, 2016.

L. Hirschi, D. Baelde, and S. Delaune, A method for unbounded verification of privacy-type properties, p.2049, 1710.

I. J. Kim, E. Y. Choi, and D. H. Lee, Secure Mobile RFID system against privacy and security problems, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007), p.2007, 2007.
DOI : 10.1109/SECPERU.2007.10

S. Kremer and R. Künnemann, Automated analysis of security protocols with global state, Journal of Computer Security, vol.11, issue.1, pp.583-616, 2016.
DOI : 10.1109/SP.2014.19

URL : https://hal.archives-ouvertes.fr/hal-01351388

R. Küsters and T. Truderung, Reducing protocol analysis with XOR to the xor-free case in the horn theory based approach, Proceedings of the 2008 ACM Conference on Computer and Communications Security, pp.129-138, 2008.

S. Lee, T. Asano, and K. Kim, RFID mutual authentication scheme based on synchronized secret information, Symposium on Cryptography and Information Security, 2006.

G. Lowe, Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, pp.147-166, 1996.
DOI : 10.1007/3-540-61042-1_43

G. Lowe, A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, pp.31-44, 1997.
DOI : 10.1109/CSFW.1997.596782

S. Meier, B. Schmidt, C. J. Cremers, and D. Basin, The TAMARIN Prover for the Symbolic Analysis of Security Protocols, CAV. LNCS, pp.696-701, 2013.
DOI : 10.1007/978-3-642-39799-8_48

O. 'hanlon, P. Borgaonkar, R. Hirschi, and L. , Mobile subscriber wifi privacy In: Proceedings of Mobile Security Technologies (MoST'17), held as part of the IEEE Computer Society Security and Privacy Workshops, 2017.

J. D. Ramsdell, D. J. Dougherty, J. D. Guttman, and P. D. Rowe, A Hybrid Analysis for Security Protocols with State, Proc. 11th International Conference on Integrated Formal Methods (IFM'14), pp.272-287, 2014.
DOI : 10.1007/978-3-319-10181-1_17

S. Santiago, S. Escobar, C. Meadows, and J. Meseguer, A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA
DOI : 10.1007/978-3-319-11851-2_11

R. Sasse, S. Escobar, C. Meadows, and J. Meseguer, Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA, In: STM. pp, vol.8, issue.1/2, pp.163-178, 2010.
DOI : 10.1007/11805618_21

B. Schmidt, Formal Analysis of Key Exchange Protocols and Physical Protocols, ETH Zurich, 2012.

B. Schmidt, S. Meier, C. J. Cremers, and D. Basin, Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, pp.78-94, 2012.
DOI : 10.1109/CSF.2012.25

. Tamarin-website, https://tamarin-prover.github, pp.2018-2022, 2018.

M. Turuani, The CL-Atse Protocol Analyser, 17th International Conference, RTA 2006, pp.277-286, 2006.
DOI : 10.1007/11805618_21

URL : https://hal.archives-ouvertes.fr/inria-00103573

D. Unruh, The impossibility of computationally sound xor. IACR Cryptology ePrint Archive, p.389, 2010.