1. Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices Amer. Math. Soc. 46(2), 203–213 (1999)
2. Coppersmith, D.: Small solutions to polynomial equations, and low exponent RSA vulnerabilities. J. Cryptol. 10(4), 233–260 (1997)
3. Coron, J.S., Zeitoun, R.: Improved factorization of $$N=p^rq^s$$, Cryptology ePrint Archive, Report 2016/551 (2016). https://ia.cr/2016/551
4. The EPOC and the ESIGN Algorithms. IEEE P1363: Protocols from Other Families of Public-Key Algorithms (1998)
5. Cryptography and Network Security Series;M Hinek,2009