A generalized Wiener attack on RSA, Public Key Cryptography -PKC, vol.2947, pp.1-13, 2004. ,

Cryptanalysis of RSA with private key d less than N 0, Advances in Cryptology-Eurocrypt'99, vol.292, pp.1-11, 1999. ,

Factoring N = p r q for Large r, Proceedings of Crypto'99, vol.1666, pp.326-337, 1999. ,

, Cryptography using Compaq multiprime technology in a parallel processing environment, 2002.

Small solutions to polynomial equations, and low exponent RSA vulnerabilities, Journal of Cryptology, vol.10, issue.4, pp.233-260, 1997. ,

An Introduction to the Theory of Numbers, 1975. ,

Solving linear equations modulo divisors: On factoring given any bits, Advances in Cryptology-ASIACRYPT, pp.406-424, 2008. ,

Cryptanalysis of RSA and its variants. Chapman & Hall/CRC Cryptography and Network Security, 2010. ,

Factoring integers with elliptic curves, Annals of Mathematics, vol.126, pp.649-673, 1987. ,

, The Development of the Number Field Sieve, vol.1554, 1993.

, Factoring polynomials with rational coefficients, vol.261, pp.513-534, 1982.

New Results on Solving Linear Equations Modulo Unknown Divisors and its Applications, Cryptology ePrint Archive, vol.343, 2014. ,

, Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q. Public Key Cryptography-PKC 2004, vol.2947, pp.218-230, 2004.

Using LLL-reduction for solving RSA and factorization problems: a survey, LLL+25 Conference in Honour of the 25th Birthday of the LLL Algorithm, 2007. ,

A Method for Obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,

Small secret exponent attack on RSA variant with modulus N = p r q, Designs, Codes and Cryptography, vol.73, pp.383-392, 2015. ,

Fast RSA-type cryptosystem modulo p k q, Advances in Cryptology-Crypto'98, pp.318-326, 1998. ,

Cryptanalysis of short RSA secret exponents, IEEE Transactions on Information Theory, vol.36, pp.553-558, 1990. ,