X. Ansi-standard, Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry, pp.31-1998

J. Blömer and A. May, A generalized Wiener attack on RSA, Public Key Cryptography -PKC, vol.2947, pp.1-13, 2004.

D. Boneh and G. Durfee, Cryptanalysis of RSA with private key d less than N 0, Advances in Cryptology -Eurocrypt'99, vol.292, pp.1-11, 1999.

D. Coppersmith, Small solutions to polynomial equations, and low exponent RSA vulnerabilities, Journal of Cryptology, vol.10, issue.4, pp.233-260, 1997.

J. Hastad, On using RSA with low exponent in a public key network, Proceedings of CRYPTO'85, pp.403-408, 1986.

J. Hinek, On the Security of Some Variants of RSA, 2007.

N. Howgrave-graham, Finding small roots of univariate modular equations revisited, Cryptography and Coding, vol.1355, pp.131-142, 1997.

N. Howgrave-graham and J. Seifert, Extending Wieners attack in the presence of many decrypting exponents, Secure Networking-CQRE (Secure)'99, vol.1740, pp.153-166, 1999.

E. Jochemsz and A. May, A strategy for finding roots of multivariate polynomials with new applications in attacking RSA variants, ASIACRYPT 2006, vol.4284, pp.267-282, 2006.

A. K. Lenstra, H. W. Lenstra, L. Lovász, and L. , Factoring polynomials with rational coefficients, vol.261, pp.513-534, 1982.

S. Sarkar and S. Maitra, Cryptanalysis of RSA with two decryption exponents, Information Processing Letters, vol.110, pp.178-181, 2010.

A. May, New RSA Vulnerabilities Using Lattice Reduction Methods, 2003.

A. Nitaj, Another generalization of Wiener's attack on RSA, Africacrypt 2008, vol.5023, pp.174-190, 2008.

R. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.

R. Steinfeld and Y. Zheng, On the Security of RSA with Primes Sharing Least-Significant Bits, Appl. Algebra Eng. Commun. Comput, vol.15, issue.3-4, p.179200, 2004.

R. Steinfeld and Y. Zheng, An advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits, CT-RSA 2001, vol.2020, pp.52-62, 2001.

R. Steinfeld and Y. Zheng, On the Security of RSA with Primes Sharing Least-Significant Bits, Appl. Algebra Eng. Commun. Comput, vol.15, issue.3-4, pp.179-200, 2004.

H. M. Sun, . Mu-enwu, R. Steinfeld, J. Guo, and H. Wang, Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits, CANS 2008, vol.5339, pp.49-63, 2008.

M. Wiener, Cryptanalysis of short RSA secret exponents, IEEE Transactions on Information Theory, vol.36, pp.553-558, 1990.

Y. Zhao and W. Qi, Small private-exponent attack on RSA with primes sharing bits, ISC 2007, vol.4779, pp.221-229, 2007.