M. Abadi and C. Fournet, Mobile values, new names, and secure communication, Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '01, pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Arapinis, T. Chothia, E. Ritter, and M. Ryan, Analysing Unlinkability and Anonymity Using the Applied Pi Calculus, 2010 23rd IEEE Computer Security Foundations Symposium, pp.107-121, 2010.
DOI : 10.1109/CSF.2010.15

A. Armando and L. Compagna, SAT-based model-checking for security protocols analysis, International Journal of Information Security, vol.9, issue.1, pp.3-32, 2008.
DOI : 10.3233/JCS-2001-91-203

K. Bhargavan, B. Blanchet, and N. Kobeissi, Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate, 2017 IEEE Symposium on Security and Privacy (SP), pp.483-502, 2017.
DOI : 10.1109/SP.2017.26

URL : https://hal.archives-ouvertes.fr/hal-01575920

B. Blanchet, Vérification automatique de protocoles cryptographiques : modèle formel et modèle calculatoire Automatic verification of security protocols: formal model and computational model. Mémoire d'habilitation à diriger des recherches, 2008.

B. Blanchet, Symbolic and computational mechanized verification of the ar- inc823 avionic protocols, 30th IEEE Computer Security Foundations Symposium (CSF'17), pp.68-82, 2017.

B. Blanchet, M. Abadi, and C. Fournet, Automated verification of selected equivalences for security protocols, The Journal of Logic and Algebraic Programming, vol.75, issue.1, pp.3-51, 2008.
DOI : 10.1016/j.jlap.2007.06.002

A. Blum and M. Furst, Fast planning through planning graph analysis, Artificial Intelligence, vol.90, issue.1-2, pp.281-300, 1997.
DOI : 10.1016/S0004-3702(96)00047-1

R. Chadha, ?. Ciobâc?, and S. Kremer, Automated verification of equivalence properties of cryptographic protocols, 21th European Symposium on Programming (ESOP'12), 2012.
URL : https://hal.archives-ouvertes.fr/hal-00732905

V. Cheval, APTE: An Algorithm for Proving Trace Equivalence, Proceedings of the 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'14), pp.587-592, 2014.
DOI : 10.1007/978-3-642-54862-8_50

V. Cheval, V. Cortier, and S. Delaune, Deciding equivalence-based properties using constraint solving, Theoretical Computer Science, vol.492, pp.1-39, 2013.
DOI : 10.1016/j.tcs.2013.04.016

URL : https://hal.archives-ouvertes.fr/hal-00881060

V. Cheval, S. Kremer, and I. Rakotonirina, Deepsec: Deciding equivalence properties in security protocols -theory and practice, 39th IEEE Symposium on Security and Privacy (S&P'18), pp.525-542, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01698177

R. Chrétien, V. Cortier, and S. Delaune, Typing Messages for Free in Security Protocols: The Case of Equivalence Properties, Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), pp.372-386, 2014.
DOI : 10.1007/978-3-662-44584-6_26

R. Chrétien, V. Cortier, and S. Delaune, Checking Trace Equivalence: How to Get Rid of Nonces?, Proceedings of the 20th European Symposium
DOI : 10.1007/BFb0055718