1. IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity
2. Advantech. 2023 . Security Advisory SA-2023-01: v2 Products May Generate Insufficiently Random Keys . Retrieved October 24, 2023 from https://icr.advantech.cz/support/router-models/download/511/sa-2023-01-insufficient-randomness.pdf Advantech. 2023. Security Advisory SA-2023-01: v2 Products May Generate Insufficiently Random Keys. Retrieved October 24, 2023 from https://icr.advantech.cz/support/router-models/download/511/sa-2023-01-insufficient-randomness.pdf
3. Daniel J. Bernstein. 2004. How to find smooth parts of integers. http://cr.yp.to/papers.html#smoothparts (2004). Daniel J. Bernstein. 2004. How to find smooth parts of integers. http://cr.yp.to/papers.html#smoothparts (2004).
4. Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild
5. Joppe W. Bos , J. Alex Halderman , Nadia Heninger , Jonathan Moore , Michael Naehrig , and Eric Wustrow . 2014. Elliptic Curve Cryptography in Practice . In Financial Cryptography and Data Security . Springer Berlin Heidelberg , Berlin, Heidelberg , 157–175. Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, and Eric Wustrow. 2014. Elliptic Curve Cryptography in Practice. In Financial Cryptography and Data Security. Springer Berlin Heidelberg, Berlin, Heidelberg, 157–175.