Affiliation:
1. FUJITSU LABORATORIES Ltd.
2. Okayama University
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference8 articles.
1. [1] J. Coron, D. Naccache, and J. Stern, “On the Security of RSA Padding,” Proc. CRYPTO 1999, LNCS 1666, pp.1-18, Springer-Verlag, 1999.
2. [2] J. Coron, D. Naccache, M. Tibouchi, and R.-P. Weinmann, “Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures,” Proc. CRYPTO 2009, LNCS 5677, pp.428-444, Springer-Verlag, 2009.
3. [3] Y. Desmedt and A. Odlyzko, “A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes,” Proc. CRYPTO 1985, LNCS 218, pp.516-522, Springer-Verlag, 1986.
4. [4] Emv, Integrated circuit card specifications for payment systems, Book 2. Security and Key Management. Version 4.2. June 2008. www.emvco.com.
5. [5] International Organization for Standardization (ISO), “Information technology-Security techniques-Digital signature schemes giving message recovery-Part 2: Integer factorization based mechanisms,” 2002.