This PhD thesis analyzes the security of EMV contactless payments. It presents a structured methodology for analyzing EMV protocols, which identifies vulnerabilities. The methodology includes UML diagrams, reference tables, a protocol emulator, and a Z abstract model. The analysis identified two previously unknown vulnerabilities in the contactless protocol. One allows collecting fraudulent transactions, demonstrated through a rogue Android app. The other involves risks with the "contactless verify PIN" function. The thesis contributes practical experiments confirming real-world exploitation of vulnerabilities.