P. Barreto and M. Naehrig, Pairing-Friendly Elliptic Curves of Prime Order, Selected Areas in Cryptography -SAC 2005, pp.319-331, 2006.
DOI : 10.1007/11693383_22

I. Blake, G. Seroussi, and N. P. Smart, Advances in Elliptic Curve Cryptography. No. 317 in LMS, 2005.

D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology -CRYPTO 2001, pp.213-229, 2001.

D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairing, Journal of Cryptology, vol.17, issue.4, pp.297-319, 2004.

S. Brands, Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, MIT, 2000.

E. F. Brickell, J. Camenisch, and L. Chen, Direct anonymous attestation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.132-145, 2004.
DOI : 10.1145/1030083.1030103

J. Camenisch and E. Van-herreweghen, anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.21-30, 2002.
DOI : 10.1145/586110.586114

J. Camenisch and A. Lysyanskaya, Signature Schemes and Anonymous Credentials from Bilinear Maps, Advances in Cryptology -CRYPTO 2004, pp.56-72, 2004.
DOI : 10.1007/978-3-540-28628-8_4

D. Chaum, D. Chaum, R. L. Rivest, and A. Sherman, Blind signatures for untraceable payments Advances in Cryptology -CRYPTO 1982, pp.199-203, 1983.

Z. Chen, Java Card Technology for Smart Cards: Architecture and Programmer's Guide, Java Series, 2000.

L. Danes, Smart card integration in the pseudonym system idemix, 2007.

B. Jacobs, Architecture Is Politics: Security and Privacy Issues in Transport and Beyond, Data Protection in a Profiled World -CPDP 2008, 2010.
DOI : 10.1007/978-90-481-8865-9_18

D. Johnson and A. Menezes, The Elliptic Curve Digital Signature Algorithm (ECDSA), International Journal of Information Security, vol.1, issue.1, 2000.
DOI : 10.1007/s102070100002

A. Joux, A one round protocol for tripartite Diffie-Hellman, Journal of Cryptology, vol.17, issue.4, pp.263-276, 2004.

S. Kiyomoto and T. Tanaka, Anonymous attribute authentication scheme using selfblindable certificates, Intelligence and Security Informatics -ISI 2008, pp.215-217, 2008.

P. Paradinas, J. Cordry, and S. Bouzefrane, Performance Evaluation of Java Card Bytecodes, Information Security Theory and Practices -WISTP 2007, pp.127-137, 2007.
DOI : 10.1007/978-3-540-72354-7_11

URL : https://hal.archives-ouvertes.fr/hal-01125301

N. Smart, Elliptic curve based protocols Advances in Elliptic Curve Cryptography, 2005.

M. Sterckx, B. Gierlichs, B. Preneel, and I. Verbauwhede, Efficient implementation of anonymous credentials on Java Card smart cards, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), pp.106-110, 2009.
DOI : 10.1109/WIFS.2009.5386474

S. Microsystems and . Inc, Java Card 2.2.2 Application Programming Interface Specification, 2006.

H. Tews, B. Jacobs, O. Markowitch, A. Bilas, J. H. Hoepman et al., Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card, Information Security Theory and Practice -WISTP 2009, pp.95-111, 2009.
DOI : 10.1007/978-3-642-03944-7_8

F. Vercauteren, Pairings on elliptic curves, Identity- Based Cryptography. CIS, pp.13-30, 2009.

E. Verheul, Self-Blindable Credential Certificates from the Weil Pairing, ) Advances in Cryptology -ASIACRYPT 2001, pp.533-550, 2001.
DOI : 10.1007/3-540-45682-1_31