EMV and NFC: Complementary Technologies that Deliver Secure Payments and Value Added Functionality, 2012. ,
Activating New Mobile Services and Business Models with smartSD Memory cards. Whitepaper, SD Association, 2014. ,
An Automatic Security Protocol Verifier based on Resolution Theorem Proving (invited tutorial), 20th International Conference on Automated Deduction (CADE-20), 2005. ,
Chip and Skim: Cloning EMV Cards with the Pre-play Attack, 2014 IEEE Symposium on Security and Privacy, 2014. ,
DOI : 10.1109/SP.2014.11
Differential computation analysis: Hiding your white-box designs is not enough, Cryptology ePrint Archive, vol.753753, 2015. ,
A Generic Security API for Symmetric Key Management on Cryptographic Devices, Information and Computation, vol.15, issue.1, pp.208-232, 2014. ,
DOI : 10.1109/CSFW.2001.930145
URL : https://hal.archives-ouvertes.fr/hal-00881072
Formal Analysis of the EMV Protocol Suite, Theory of Security and Applications, pp.113-129, 2012. ,
Book 1 -Application Independent ICC to Terminal Interface Requirements, 2011. ,
Book 2 -Security and Key Management, 2011. ,
Book 3 -Application Specification, 2011. ,
Book 4 -Cardholder, Attendant, and Acquirer Interface Requirements, 2011. ,
EMV Payment Tokenisation Specification ? Technical Framework, 2014. ,
Trusted User Interface API. Specification, GlobalPlatform, 2013. ,
Mobile Payments and Fraud: 2016 report, 2016. ,
Automated analysis of security protocols with global state, Proceedings of the 35th IEEE Symposium on Security and Privacy, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01351388
Jannik Dreier, Ralf Sasse, and Cas Cremers. Tamarin prover for security protocol verification -Project Page ,
Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs, 2010 23rd IEEE Computer Security Foundations Symposium, pp.231-245, 2010. ,
DOI : 10.1109/CSF.2010.23
Chip and PIN is Broken, 2010 IEEE Symposium on Security and Privacy, 2010. ,
DOI : 10.1109/SP.2010.33
Token provisioning, US Patent, vol.7548, p.620, 2009. ,
Automated Verification of Group Key Agreement Protocols, 2014 IEEE Symposium on Security and Privacy, pp.179-194, 2014. ,
DOI : 10.1109/SP.2014.19
Risks and Potentials of Using EMV for Internet Payments, Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology , WOST'99, pp.18-18, 1999. ,