[1] Adoption of smart cards in the medical sector:: the canadian experience. Social Science & Medicine, 53(7):879–894, 2001.
[2] Brij B Gupta and Shaifali Narayan. A survey on contactless smart cards and payment system: technologies, policies, attacks and countermeasures. Journal of Global Information Management (JGIM), 28(4):135–159, 2020.
[3] Shi Chen. Trust management for a smart card based private eid manager. Master’s thesis, NTNU, 2016.
[4] Bruce Schneier, Adam Shostack, et al. Breaking up is hard to do: modeling security threats for smart cards. In USENIX Symposium on Smart Cards, 1999.
[5] Flavio D Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur, and Bart Jacobs. Dismantling mifare classic. In European symposium on research in computer security, pages 97–114. Springer, 2008.
[6] NXP SemiConductors. Mifare desfire ev1 contactless multi-application ic. Product short data sheet.[online] Available at:, 2010.
[7] David F. Oswald and Christof Paar. Breaking mifare desfire mf3icd40: Power analysis and templates in the real world. In Workshop on Cryptographic Hardware and Embedded Systems, 2011.
[8] Petr Socha, Vojtˇech Miˇskovsk`y, and Martin Novotn`y. A comprehensive survey on the noninvasive passive side-channel analysis. Sensors, 22(21):8096, 2022.
[9] Oleksiy Lisovets, David Knichel, Thorben Moos, and Amir Moradi. Let’s take it offline: Boosting brute-force attacks on iphone’s user authentication through sca. IACR Transactions on Cryptographic Hardware and Embedded Systems, pages
496–519, 2021.
[10] Jung-Sik Cho, Sang-Soo Yeo, and Sung Kwon Kim. Securing against brute-force attack: A hash-based rfid mutual authentication protocol using a secret value. Computer communications, 34(3):391–397, 2011.
[11] Dario Carluccio. Electromagnetic side channel analysis for embedded crypto devices. Master’s thesis, Ruhr Universit¨at Bochum, 2005.
[12] Timo Kasper, Ingo von Maurich, David Oswald, and Christof Paar. Chameleon: A versatile emulator for contactless smartcards. In International Conference on Information Security and Cryptology, pages 189–206. Springer, 2010.