EMV standards in the case where a single key-pair is used for both signature and
encryption. We give a theoretical attack for EMV's current RSA-based algorithms, showing
how access to a partial decryption oracle can be used to forge a signature on a freely
chosen message. We show how the attack might be integrated into EMV's CDA protocol
flow, enabling an attacker with a wedge device to complete an offline transaction without …