. Smart-card-alliance, EMV and NFC: Complementary Technologies that Deliver Secure Payments and Value Added Functionality, 2012.

S. Association, Activating New Mobile Services and Business Models with smartSD Memory cards. Whitepaper, SD Association, 2014.

B. Blanchet, An Automatic Security Protocol Verifier based on Resolution Theorem Proving (invited tutorial), 20th International Conference on Automated Deduction (CADE-20), 2005.

M. Bond, O. Choudary, S. J. Murdoch, S. Skorobogatov, and R. Anderson, Chip and Skim: Cloning EMV Cards with the Pre-play Attack, 2014 IEEE Symposium on Security and Privacy, 2014.
DOI : 10.1109/SP.2014.11

W. Joppe, C. Bos, W. Hubain, P. Michiels, and . Teuwen, Differential computation analysis: Hiding your white-box designs is not enough, Cryptology ePrint Archive, vol.753753, 2015.

V. Cortier and G. Steel, A Generic Security API for Symmetric Key Management on Cryptographic Devices, Information and Computation, vol.15, issue.1, pp.208-232, 2014.
DOI : 10.1109/CSFW.2001.930145

URL : https://hal.archives-ouvertes.fr/hal-00881072

J. De, R. , and E. Poll, Formal Analysis of the EMV Protocol Suite, Theory of Security and Applications, pp.113-129, 2012.

. Emvco, Book 1 -Application Independent ICC to Terminal Interface Requirements, 2011.

. Emvco, Book 2 -Security and Key Management, 2011.

. Emvco, Book 3 -Application Specification, 2011.

. Emvco, Book 4 -Cardholder, Attendant, and Acquirer Interface Requirements, 2011.

. Emvco, EMV Payment Tokenisation Specification ? Technical Framework, 2014.

. Globalplatform, Trusted User Interface API. Specification, GlobalPlatform, 2013.

. Kount, Mobile Payments and Fraud: 2016 report, 2016.

S. Kremer and R. Künnemann, Automated analysis of security protocols with global state, Proceedings of the 35th IEEE Symposium on Security and Privacy, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01351388

S. Meier, D. Basin, and B. Schmidt, Jannik Dreier, Ralf Sasse, and Cas Cremers. Tamarin prover for security protocol verification -Project Page

S. Meier, C. Cremers, and D. Basin, Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs, 2010 23rd IEEE Computer Security Foundations Symposium, pp.231-245, 2010.
DOI : 10.1109/CSF.2010.23

S. J. Murdoch, S. Drimer, R. Anderson, and M. Bond, Chip and PIN is Broken, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.33

N. Popp, Token provisioning, US Patent, vol.7548, p.620, 2009.

B. Schmidt, R. Sasse, C. Cremers, and D. Basin, Automated Verification of Group Key Agreement Protocols, 2014 IEEE Symposium on Security and Privacy, pp.179-194, 2014.
DOI : 10.1109/SP.2014.19

E. Van-herreweghen and U. Wille, Risks and Potentials of Using EMV for Internet Payments, Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology , WOST'99, pp.18-18, 1999.