R. J. Anderson and S. J. Bezuidenhoudt, On the reliability of electronic payment systems, IEEE Transactions on Software Engineering, vol.22, issue.5, pp.294-301, 1996.
DOI : 10.1109/32.502222

G. Avoine, Privacy ussues in RFID banknotes protection schemes, 6th CARDIS, pp.43-48, 2004.

G. Avoine, E. Dysli, and P. Oechslin, Reducing Time Complexity in RFID Systems, In Selected Areas in Cryptography Lecture Notes in Computer Science, vol.3897, pp.291-306, 2005.
DOI : 10.1007/11693383_20

G. Avoine, C. Lauradoux, M. , and T. , When Compromised Readers Meet RFID, Workshop on RFID Security (RFIDsec), pp.32-48, 2009.
DOI : 10.1007/978-3-642-10838-9_4

M. Bellare and C. Namprempre, Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, ASIACRYPT, pp.531-545, 1976.

J. Black, R. , and P. , CBC MACs for arbitrary-length messages: The three-key constructions, In CRYPTO LNCS 1880, pp.197-215, 2000.

. Bsi, Advanced security mechanisms for machine readable travel documents ? extended access control (eac), 2006.

T. Dimitriou, A Lightweight RFID Protocol to protect against Traceability and Cloning attacks, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), 2005.
DOI : 10.1109/SECURECOMM.2005.4

S. J. Engberg, M. B. Harning, and C. Jensen, Zero-knowledge device authentication: Privacy & security enhanced rfid preserving business value and consumer convenience, 2nd Ann. Conf. on Privacy, Security and Trust, pp.89-101, 2004.

T. E. Gamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. on Inf. Theory, vol.31, issue.4, pp.469-472, 1985.

S. L. Garfinkel, A. Juels, and R. Pappu, RFID Privacy: An Overview of Problems and Proposed Solutions, IEEE Security and Privacy Magazine, vol.3, issue.3, pp.34-43, 2005.
DOI : 10.1109/MSP.2005.78

P. Golle, M. Jakobsson, A. Juels, and P. Syverson, Universal reencryption for mixnets, RSA Conf. LNCS 2964, pp.23-27, 2004.

J. Hoepman, E. Hubbers, B. Jacobs, M. Oostdijk, W. Schreur et al., Crossing Borders: Security and Privacy Issues of the European e-Passport, 1st IWSEC, pp.152-167, 2006.
DOI : 10.1007/11908739_11

J. Hoepman and R. Joosten, Practical Schemes for Privacy and Security Enhanced RFID, p.1257, 2009.
DOI : 10.1007/978-3-540-39881-3_18

URL : https://hal.archives-ouvertes.fr/hal-01059139

A. Juels, RFID security and privacy: a research survey, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.381-394, 2006.
DOI : 10.1109/JSAC.2005.861395

A. Juels, R. R. Pappu, and . Wright, Squealing Euros: Privacy Protection in RFID-Enabled Banknotes, 7th Int, pp.103-121, 2003.
DOI : 10.1007/978-3-540-45126-6_8

A. Juels and S. Weis, Defining strong privacy for RFID, 5th Ann. IEEE Int. Cont. on Pervasive Computing and Communications Workshops ? Pervasive RFID/NFC Technology and Applications (PerTec), pp.342-347, 2007.

D. Molnar and D. Wagner, Privacy and security in library RFID, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.210-219, 2004.
DOI : 10.1145/1030083.1030112

E. Oswald, Suggested algorithms for light-weight cryptography, Tech. rep., ECRYPT, 2006.

M. R. Rieback, G. Gaydadjiev, B. Crispo, R. F. Hofman, and A. S. Tanenbaum, A platform for rfid security and privacy administration, USENIX, pp.89-102, 2006.

S. E. Sarma, S. A. Weis, and D. W. Engels, Rfid systems, security & privacy implications (white paper), 2002.
DOI : 10.1007/3-540-36400-5_33

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.4948

S. Spiekermann and S. Evdokimov, Critical RFID Privacy-Enhancing Technologies, IEEE Security & Privacy Magazine, vol.7, issue.2, pp.56-62, 2009.
DOI : 10.1109/MSP.2009.31

F. Stajano, The resurrecting duckling -what next?, 8th Security Protocols Workshop, pp.204-214, 2000.

F. Stajano, A. , and R. , The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks, Security Procotols, 7th Int. Workshop, pp.172-194, 1999.
DOI : 10.1007/10720107_24

Y. Tsiounis, Y. , and M. , On the security of ElGamal based encryption, LNCS 1431, pp.117-134, 1998.
DOI : 10.1007/BFb0054019

S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, 1st SPC, pp.201-212, 2003.
DOI : 10.1007/978-3-540-39881-3_18