<bibliography>
 <citation type="unpublished" key="Champelovier-Clerc-Garavel-et-al-10-v6.7">
  <author>David <surname>Champelovier</surname></author>
  <author>Xavier <surname>Clerc</surname></author>
  <author>Hubert <surname>Garavel</surname></author>
  <author>Yves <surname>Guerte</surname></author>
  <author>Christine <surname>McKinty</surname></author>
  <author>Vincent <surname>Powazny</surname></author>
  <author>Fr&#233;d&#233;ric <surname>Lang</surname></author>
  <author>Wendelin <surname>Serwe</surname></author>
  <author>Gideon <surname>Smeding</surname></author>
  <year>2017</year>
  <title>Reference Manual of the LNT to LOTOS Translator (Version 6.7)</title>
  <url>http://cadp.inria.fr/publications/Champelovier-Clerc-Garavel-et-al-10.html</url>
  <note>INRIA/VASY and INRIA/CONVECS, 130 pages</note>
 </citation>
 <citation type="inproceedings" key="Davies-85">
  <author>Donald W. <surname>Davies</surname></author>
  <year>1985</year>
  <title>A Message Authenticator Algorithm Suitable for a Mainframe Computer</title>
  <editor>G. R. <surname>Blakley</surname></editor>
  <editor>David <surname>Chaum</surname></editor>
  <booktitle>Advances in Cryptology &#8211; Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (CRYPTO'84), Santa Barbara, CA, USA</booktitle>
  <series>Lecture Notes in Computer Science</series>
  <volume>196</volume>
  <publisher>Springer</publisher>
  <pages>393&#8211;400</pages>
  <doi>10.1007/3-540-39568-7_30</doi>
 </citation>
 <citation type="techreport" key="Davies-Clayden-83">
  <author>Donald W. <surname>Davies</surname></author>
  <author>David O. <surname>Clayden</surname></author>
  <year>1983</year>
  <title>A Message Authenticator Algorithm Suitable for a Mainframe Computer</title>
  <type>NPL Report DITC</type>
  <number>17/83</number>
  <institution>National Physical Laboratory</institution>
  <address>Teddington, Middlesex, UK</address>
 </citation>
 <citation type="techreport" key="Davies-Clayden-88">
  <author>Donald W. <surname>Davies</surname></author>
  <author>David O. <surname>Clayden</surname></author>
  <year>1988</year>
  <title>The Message Authenticator Algorithm (MAA) and its Implementation</title>
  <type>NPL Report DITC</type>
  <number>109/88</number>
  <institution>National Physical Laboratory</institution>
  <address>Teddington, Middlesex, UK</address>
  <url>http://www.cix.co.uk/~klockstone/maa.pdf</url>
 </citation>
 <citation type="inproceedings" key="Duran-Roldan-Bach-10">
  <author>Francisco <surname>Dur&#225;n</surname></author>
  <author>Manuel <surname>Rold&#225;n</surname></author>
  <author>Jean-Christophe <surname>Bach</surname></author>
  <author>Emilie <surname>Balland</surname></author>
  <author>Mark <surname>van den Brand</surname></author>
  <author>James R. <surname>Cordy</surname></author>
  <author>Steven <surname>Eker</surname></author>
  <author>Luc <surname>Engelen</surname></author>
  <author>Maartje <surname>de Jonge</surname></author>
  <author>Karl Trygve <surname>Kalleberg</surname></author>
  <author>Lennart C. L. <surname>Kats</surname></author>
  <author>Pierre-Etienne <surname>Moreau</surname></author>
  <author>Eelco <surname>Visser</surname></author>
  <year>2010</year>
  <title>The Third Rewrite Engines Competition</title>
  <editor>Peter Csaba <surname>&#214;lveczky</surname></editor>
  <booktitle>Proceedings of the 8th International Workshop on Rewriting Logic and Its Applications (WRLA'10), Paphos, Cyprus</booktitle>
  <series>Lecture Notes in Computer Science</series>
  <volume>6381</volume>
  <publisher>Springer</publisher>
  <pages>243&#8211;261</pages>
  <doi>10.1007/978-3-642-16310-4_16</doi>
 </citation>
 <citation type="article" key="Duran-Roldan-Balland-et-al-09">
  <author>Francisco <surname>Dur&#225;n</surname></author>
  <author>Manuel <surname>Rold&#225;n</surname></author>
  <author>Emilie <surname>Balland</surname></author>
  <author>Mark <surname>van den Brand</surname></author>
  <author>Steven <surname>Eker</surname></author>
  <author>Karl Trygve <surname>Kalleberg</surname></author>
  <author>Lennart C. L. <surname>Kats</surname></author>
  <author>Pierre-Etienne <surname>Moreau</surname></author>
  <author>Ruslan <surname>Schevchenko</surname></author>
  <author>Eelco <surname>Visser</surname></author>
  <year>2009</year>
  <title>The Second Rewrite Engines Competition</title>
  <journal>Electronic Notes in Theoretical Computer Science</journal>
  <volume>238</volume>
  <number>3</number>
  <pages>281&#8211;291</pages>
  <doi>10.1016/j.entcs.2009.05.025</doi>
 </citation>
 <citation type="book" key="Ehrig-Mahr-85">
  <author>Hartmut <surname>Ehrig</surname></author>
  <author>Bernd <surname>Mahr</surname></author>
  <year>1985</year>
  <title>Fundamentals of Algebraic Specification 1 &#8211; Equations and Initial Semantics</title>
  <series>EATCS Monographs on Theoretical Computer Science</series>
  <volume>6</volume>
  <publisher>Springer</publisher>
  <doi>10.1007/978-3-642-69962-7</doi>
 </citation>
 <citation type="inproceedings" key="Garavel-89-c">
  <author>Hubert <surname>Garavel</surname></author>
  <year>1989</year>
  <title>Compilation of LOTOS Abstract Data Types</title>
  <editor>Son T. <surname>Vuong</surname></editor>
  <booktitle>Proceedings of the 2nd International Conference on Formal Description Techniques FORTE'89 (Vancouver B.C., Canada)</booktitle>
  <publisher>North-Holland</publisher>
  <pages>147&#8211;162</pages>
  <url>http://cadp.inria.fr/publications/Garavel-89-c.html</url>
 </citation>
 <citation type="article" key="Garavel-15-b">
  <author>Hubert <surname>Garavel</surname></author>
  <year>2015</year>
  <title>Revisiting Sequential Composition in Process Calculi</title>
  <journal>Journal of Logical and Algebraic Methods in Programming</journal>
  <volume>84</volume>
  <number>6</number>
  <pages>742&#8211;762</pages>
  <doi>10.1016/j.jlamp.2015.08.001</doi>
 </citation>
 <citation type="article" key="Garavel-Lang-Mateescu-Serwe-13">
  <author>Hubert <surname>Garavel</surname></author>
  <author>Fr&#233;d&#233;ric <surname>Lang</surname></author>
  <author>Radu <surname>Mateescu</surname></author>
  <author>Wendelin <surname>Serwe</surname></author>
  <year>2013</year>
  <title>CADP 2011: A Toolbox for the Construction and Analysis of Distributed Processes</title>
  <journal>Springer International Journal on Software Tools for Technology Transfer (STTT)</journal>
  <volume>15</volume>
  <number>2</number>
  <pages>89&#8211;107</pages>
  <doi>10.1007/s10009-012-0244-z</doi>
  <url>http://cadp.inria.fr/publications/Garavel-Lang-Mateescu-Serwe-13.html</url>
 </citation>
 <citation type="inproceedings" key="Garavel-Lang-Serwe-17">
  <author>Hubert <surname>Garavel</surname></author>
  <author>Fr&#233;d&#233;ric <surname>Lang</surname></author>
  <author>Wendelin <surname>Serwe</surname></author>
  <year>2017</year>
  <title>From LOTOS to LNT</title>
  <editor>Joost-Pieter <surname>Katoen</surname></editor>
  <editor>Rom <surname>Langerak</surname></editor>
  <editor>Arend <surname>Rensink</surname></editor>
  <booktitle>ModelEd, TestEd, TrustEd &#8211; Essays Dedicated to Ed Brinksma on the Occasion of His 60th Birthday</booktitle>
  <series>Lecture Notes in Computer Science</series>
  <volume>10500</volume>
  <publisher>Springer</publisher>
  <pages>3&#8211;26</pages>
  <doi>10.1007/978-3-319-68270-9_1</doi>
 </citation>
 <citation type="inproceedings" key="Garavel-Marsso-17">
  <author>Hubert <surname>Garavel</surname></author>
  <author>Lina <surname>Marsso</surname></author>
  <year>2017</year>
  <title>A Large Term Rewrite System Modelling a Pioneering Cryptographic Algorithm</title>
  <editor>Holger <surname>Hermanns</surname></editor>
  <editor>Peter <surname>H&#246;fner</surname></editor>
  <booktitle>Proceedings of the 2nd Workshop on Models for Formal Analysis of Real Systems (MARS'17), Uppsala, Sweden</booktitle>
  <series>Electronic Proceedings in Theoretical Computer Science</series>
  <volume>244</volume>
  <pages>129&#8211;183</pages>
  <doi>10.4204/EPTCS.244.6</doi>
 </citation>
 <citation type="inproceedings" key="Garavel-Turlier-93">
  <author>Hubert <surname>Garavel</surname></author>
  <author>Philippe <surname>Turlier</surname></author>
  <year>1993</year>
  <title>C&#198;SAR.ADT : un compilateur pour les types abstraits alg&#233;briques du langage LOTOS</title>
  <editor>Rachida <surname>Dssouli</surname></editor>
  <editor>Gregor <surname>v. Bochmann</surname></editor>
  <booktitle>Actes du Colloque Francophone pour l'Ing&#233;nierie des Protocoles (CFIP'93), Montr&#233;al, Canada</booktitle>
  <publisher>Herm&#232;s</publisher>
  <address>Paris</address>
  <pages>325&#8211;339</pages>
  <url>http://cadp.inria.fr/publications/Garavel-Turlier-93.html</url>
 </citation>
 <citation type="techreport" key="ISO-8730:1986">
  <author><surname>ISO</surname></author>
  <year>1986</year>
  <title>Requirements for Message Authentication (Wholesale)</title>
  <type>International Standard</type>
  <number>8730</number>
  <institution>International Organization for Standardization &#8211; Banking</institution>
  <address>Geneva</address>
 </citation>
 <citation type="techreport" key="ISO-8731-2:1987">
  <author><surname>ISO</surname></author>
  <year>1987</year>
  <title>Approved Algorithms for Message Authentication &#8211; Part 2: Message Authenticator Algorithm (MAA)</title>
  <type>International Standard</type>
  <number>8731-2</number>
  <institution>International Organization for Standardization &#8211; Banking</institution>
  <address>Geneva</address>
 </citation>
 <citation type="techreport" key="ISO-8730:1990">
  <author><surname>ISO</surname></author>
  <year>1990</year>
  <title>Requirements for Message Authentication (Wholesale)</title>
  <type>International Standard</type>
  <number>8730</number>
  <institution>International Organization for Standardization &#8211; Banking</institution>
  <address>Geneva</address>
 </citation>
 <citation type="techreport" key="ISO-8731-2:1992">
  <author><surname>ISO</surname></author>
  <year>1992</year>
  <title>Approved Algorithms for Message Authentication &#8211; Part 2: Message Authenticator Algorithm</title>
  <type>International Standard</type>
  <number>8731-2</number>
  <institution>International Organization for Standardization &#8211; Banking</institution>
  <address>Geneva</address>
 </citation>
 <citation type="techreport" key="ISO-8730:1999">
  <author><surname>ISO</surname></author>
  <year>1999</year>
  <title>Requirements for Message Authentication (Wholesale)</title>
  <type>Technical Corrigendum 1</type>
  <number>8730</number>
  <institution>International Organization for Standardization &#8211; Banking</institution>
  <address>Geneva</address>
 </citation>
 <citation type="techreport" key="ISO-8807">
  <author><surname>ISO/IEC</surname></author>
  <year>1989</year>
  <title>LOTOS &#8211; A Formal Description Technique Based on the Temporal Ordering of Observational Behaviour</title>
  <type>International Standard</type>
  <number>8807</number>
  <institution>International Organization for Standardization &#8211; Information Processing Systems &#8211; Open Systems Interconnection</institution>
  <address>Geneva</address>
 </citation>
 <citation type="techreport" key="Lai-91">
  <author>M. K. F. <surname>Lai</surname></author>
  <year>1991</year>
  <title>A Formal Interpretation of the MAA Standard in Z</title>
  <type>NPL Report DITC</type>
  <number>184/91</number>
  <institution>National Physical Laboratory</institution>
  <address>Teddington, Middlesex, UK</address>
 </citation>
 <citation type="techreport" key="Lampard-91">
  <author>R. P. <surname>Lampard</surname></author>
  <year>1991</year>
  <title>An Implementation of MAA from a VDM Specification</title>
  <type>NPL Technical Memorandum DITC</type>
  <number>50/91</number>
  <institution>National Physical Laboratory</institution>
  <address>Teddington, Middlesex, UK</address>
 </citation>
 <citation type="article" key="DeMeer-Roth-Vuong-92">
  <author>Jan <surname>de Meer</surname></author>
  <author>Rudolf <surname>Roth</surname></author>
  <author>Son <surname>Vuong</surname></author>
  <year>1992</year>
  <title>Introduction to Algebraic Specifications Based on the Language ACT ONE</title>
  <journal>Computer Networks and ISDN Systems</journal>
  <volume>23</volume>
  <number>5</number>
  <pages>363&#8211;392</pages>
  <doi>10.1016/0169-7552(92)90013-G</doi>
 </citation>
 <citation type="book" key="Menezes-vanOorschot-Vanstone-96">
  <author>Alfred <surname>Menezes</surname></author>
  <author>Paul C. <surname>van Oorschot</surname></author>
  <author>Scott A. <surname>Vanstone</surname></author>
  <year>1996</year>
  <title>Handbook of Applied Cryptography</title>
  <publisher>CRC Press</publisher>
  <doi>10.1201/9781439821916</doi>
  <url>http://cacr.uwaterloo.ca/hac</url>
 </citation>
 <citation type="techreport" key="Munster-91-a">
  <author>Harold B. <surname>Munster</surname></author>
  <year>1991</year>
  <title>LOTOS Specification of the MAA Standard, with an Evaluation of LOTOS</title>
  <type>NPL Report DITC</type>
  <number>191/91</number>
  <institution>National Physical Laboratory</institution>
  <address>Teddington, Middlesex, UK</address>
  <url>ftp://ftp.inrialpes.fr/pub/vasy/publications/others/Munster-91-a.pdf</url>
 </citation>
 <citation type="techreport" key="Parkin-ONeill-90">
  <author>Graeme I. <surname>Parkin</surname></author>
  <author>G. <surname>O'Neill</surname></author>
  <year>1990</year>
  <title>Specification of the MAA Standard in VDM</title>
  <type>NPL Report DITC</type>
  <number>160/90</number>
  <institution>National Physical Laboratory</institution>
  <address>Teddington, Middlesex, UK</address>
 </citation>
 <citation type="inproceedings" key="Parkin-ONeill-91">
  <author>Graeme I. <surname>Parkin</surname></author>
  <author>G. <surname>O'Neill</surname></author>
  <year>1991</year>
  <title>Specification of the MAA Standard in VDM</title>
  <editor>S&#248;ren <surname>Prehn</surname></editor>
  <editor>W. J. <surname>Toetenel</surname></editor>
  <booktitle>Formal Software Development &#8211; Proceedings (Volume 1) of the 4th International Symposium of VDM Europe (VDM'91), Noordwijkerhout, The Netherlands</booktitle>
  <series>Lecture Notes in Computer Science</series>
  <volume>551</volume>
  <publisher>Springer</publisher>
  <pages>526&#8211;544</pages>
  <doi>10.1007/3-540-54834-3_31</doi>
 </citation>
 <citation type="inproceedings" key="Preneel-97">
  <author>Bart <surname>Preneel</surname></author>
  <year>1997</year>
  <title>Cryptanalysis of Message Authentication Codes</title>
  <editor>Eiji <surname>Okamoto</surname></editor>
  <editor>George I. <surname>Davida</surname></editor>
  <editor>Masahiro <surname>Mambo</surname></editor>
  <booktitle>Proceedings of the 1st International Workshop on Information Security (ISW'97), Tatsunokuchi, Japan</booktitle>
  <series>Lecture Notes in Computer Science</series>
  <volume>1396</volume>
  <publisher>Springer</publisher>
  <pages>55&#8211;65</pages>
  <doi>10.1007/BFb0030408</doi>
  <url>http://www.cosic.esat.kuleuven.be/publications/article-61.pdf</url>
 </citation>
 <citation type="incollection" key="Preneel-11">
  <author>Bart <surname>Preneel</surname></author>
  <year>2011</year>
  <title>MAA</title>
  <editor>Henk C. A. <surname>van Tilborg</surname></editor>
  <editor>Sushil <surname>Jajodia</surname></editor>
  <booktitle>Encyclopedia of Cryptography and Security (2nd Edition)</booktitle>
  <publisher>Springer</publisher>
  <pages>741&#8211;742</pages>
  <doi>10.1007/978-1-4419-5906-5_591</doi>
 </citation>
 <citation type="inproceedings" key="Preneel-vanOorschot-95">
  <author>Bart <surname>Preneel</surname></author>
  <author>Paul C. <surname>van Oorschot</surname></author>
  <year>1995</year>
  <title>MDx-MAC and Building Fast MACs from Hash Functions</title>
  <editor>Don <surname>Coppersmith</surname></editor>
  <booktitle>Advances in Cryptology &#8211; Proceedings of 15th Annual International Cryptology Conference (CRYPTO'95), Santa Barbara, CA, USA</booktitle>
  <series>Lecture Notes in Computer Science</series>
  <volume>963</volume>
  <publisher>Springer</publisher>
  <pages>1&#8211;14</pages>
  <doi>10.1007/3-540-44750-4_1</doi>
  <url>http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.490.8595&rep=rep1&type=pdf</url>
 </citation>
 <citation type="inproceedings" key="Preneel-vanOorschot-96">
  <author>Bart <surname>Preneel</surname></author>
  <author>Paul C. <surname>van Oorschot</surname></author>
  <year>1996</year>
  <title>On the Security of Two MAC Algorithms</title>
  <editor>Ueli M. <surname>Maurer</surname></editor>
  <booktitle>Advances in Cryptology &#8211; Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT'96), Saragossa, Spain</booktitle>
  <series>Lecture Notes in Computer Science</series>
  <volume>1070</volume>
  <publisher>Springer</publisher>
  <pages>19&#8211;32</pages>
  <doi>10.1007/3-540-68339-9_3</doi>
 </citation>
 <citation type="article" key="Preneel-vanOorschot-99">
  <author>Bart <surname>Preneel</surname></author>
  <author>Paul C. <surname>van Oorschot</surname></author>
  <year>1999</year>
  <title>On the Security of Iterated Message Authentication Codes</title>
  <journal>IEEE Transactions on Information Theory</journal>
  <volume>45</volume>
  <number>1</number>
  <pages>188&#8211;199</pages>
  <doi>10.1109/18.746787</doi>
 </citation>
 <citation type="article" key="Preneel-Rumen-vanOorschot-97">
  <author>Bart <surname>Preneel</surname></author>
  <author>Vincent <surname>Rumen</surname></author>
  <author>Paul C. <surname>van Oorschot</surname></author>
  <year>1997</year>
  <title>Security Analysis of the Message Authenticator Algorithm (MAA)</title>
  <journal>European Transactions on Telecommunications</journal>
  <volume>8</volume>
  <number>5</number>
  <pages>455&#8211;470</pages>
  <doi>10.1002/ett.4460080504</doi>
 </citation>
 <citation type="inproceedings" key="Rijmen-Preneel-DeWin-96">
  <author>Vincent <surname>Rijmen</surname></author>
  <author>Bart <surname>Preneel</surname></author>
  <author>Erik <surname>De Win</surname></author>
  <year>1996</year>
  <title>Key Recovery and Collision Clusters for MAA</title>
  <booktitle>Proceedings of the 1st International Conference on Security in Communication Networks (SCN'96)</booktitle>
  <url>https://www.cosic.esat.kuleuven.be/publications/article-437.pdf</url>
 </citation>
</bibliography>
