Detailed Cost Estimation of CNTW Attack against EMV Signature Scheme
暂无分享,去创建一个
Yasuyuki Nogami | Yoshitaka Morikawa | Yumi Sakemi | Masahiko Takenaka | Tetsuya Izu | Y. Morikawa | T. Izu | Y. Nogami | M. Takenaka | Y. Sakemi
[1] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[2] Jean-Sébastien Coron,et al. Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures , 2009, CRYPTO.
[3] Yvo Desmedt,et al. A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes , 1986, CRYPTO.
[4] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[5] Jean-Sébastien Coron,et al. On the Security of RSA Padding , 1999, CRYPTO.
[6] László Lovász,et al. Factoring polynomials with rational coefficients , 1982 .
[7] Shai Halevi. Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings , 2009, CRYPTO.