1. Lecture Notes in Computer Science;D. Boneh,1999
2. Lecture Notes in Computer Science;D. Coppersmith,1996
3. Coppersmith, D.: Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Journal of Cryptology 10, 233–260 (1997)
4. Lecture Notes in Computer Science;D. Coppersmith,1996
5. Cavallar, S., Lioen, W., te Riele, H., Dodson, B., Lenstra, A., Leyland, P., Montgomery, P.L., Murphy, B., Zimmermann, P.: Factorization of RSA-140 using the Number Field Sieve. In: Proc. of ASIACRYPT 1999. Springer, Heidelberg (1999)