Y. Aono, A New Lattice Construction for Partial Key Exposure Attack for RSA, Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09, pp.34-53, 2009.
DOI : 10.1007/978-3-642-00468-1_3

D. Boneh, G. Durfee, and Y. Frankel, An Attack on RSA Given a Small Fraction of the Private Key Bits, Advances in Cryptology ASIACRYPT'98, pp.25-34, 1998.
DOI : 10.1007/3-540-49649-1_3

J. Blömer and A. May, New Partial Key Exposure Attacks on RSA, Advances in Cryptology -CRYPTO 2003, pp.27-43
DOI : 10.1007/978-3-540-45146-4_2

M. Ernst, E. Jochemsz, A. May, and B. Weger, Partial Key Exposure Attacks on RSA up to Full Size Exponents, Advances in Cryptology EUROCRYPT 2005, pp.371-386, 2005.
DOI : 10.1007/11426639_22

M. Herrmann and A. May, Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits, HS09] Nadia Heninger and Hovav Shacham Advances in Cryptology -CRYPTO 2009, pp.406-424, 2008.
DOI : 10.1007/3-540-39805-8_3

]. J. Hsh-+-09, S. D. Halderman, N. Schoen, W. Heninger, W. Clarkson et al., Lest we remember: cold-boot attacks on encryption keys, pp.91-98, 2009.

J. Katz and Y. Lindell, Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series), 2007.

S. Maitra, S. Sarkar, S. Kenneth, G. Paterson, A. Polychroniadou et al., Factoring RSA modulus using prime reconstruction from random known bits A coding-theoretic approach to recovering noisy RSA keys, Proceedings of the Third international conference on Cryptology in Africa, AFRICACRYPT'10 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security, ASIACRYPT'12, pp.82-99, 2010.

[. Quisquater and C. Couvreur, Fast decipherment algorithm for RSA public-key cryptosystem, Electronics Letters, vol.18, issue.21, pp.905-907, 1982.
DOI : 10.1049/el:19820617

R. L. Rivest and A. Shamir, Efficient Factoring Based on Partial Information, Proceedings of a workshop on the theory and application of cryptographic techniques on Advances in cryptology?EUROCRYPT '85, pp.31-34, 1986.
DOI : 10.1007/3-540-39805-8_3

S. Sarkar, . Sourav-sen, S. Gupta, and . Maitra, Reconstruction and error correction of RSA secret parameters from the msb side, WCC 2011 -Workshop on coding and cryptography, pp.7-16, 2011.

S. Sarkar, . Sourav-sen, S. Gupta, and . Maitra, Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents, Cryptographic Hardware and Embedded Systems CHES 2012, pp.476-493, 2012.
DOI : 10.1007/978-3-642-33027-8_28