D. Bleichenbacher and A. May, New attacks on RSA with small secret CRTexponents, Proceedings of PKC 2006, number 3958 in Lecture Notes in Computer Science, pp.1-13, 2006.

D. Boneh, G. Durfee, and Y. Frankel, Exposing an RSA Private Key given a Small Fraction of its Bits, number 1514 in Lecture Notes in Computer Science, pp.25-34, 1998.

S. D. Galbraith, C. Heneghan, and J. F. Mckee, Tunable Balancing of RSA, Proceedings of ACISP 2005, number 3574 in Lecture Notes in Computer Science, pp.280-292, 2005.
DOI : 10.1007/11506157_24

M. J. Hinek, On the Security of Some Variants of RSA, 2007.

E. Jochemsz, Cryptanalysis of RSA Variants Using Small Roots of Polynomials, 2007.

E. Jochemsz and A. May, A polynomial time attack on RSA with private CRTexponents smaller than N 0.073, Advances in Cryptology -Crypto 2007, number 4622 in Lecture Notes in Computer Science, pp.395-411, 2007.

A. K. Lenstra, H. W. Lenstra, and L. Lovász, Factoring polynomials with rational coefficients, Mathematische Annalen, vol.32, issue.4, pp.513-534, 1982.
DOI : 10.1007/BF01457454

A. May, Cryptanalysis of Unbalanced RSA with Small CRT-Exponent, number 2442 in Lecture Notes in Computer Science, pp.242-256, 2002.
DOI : 10.1007/3-540-45708-9_16

J. Quisquater and C. Couvreur, Fast decipherment algorithm for RSA publickey cryptosystem. Electronic Letters, pp.905-907, 1982.

R. L. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public Key Cryptosystems, Communications of ACM, vol.21, issue.2, pp.158-164, 1978.

H. Sun, M. Wu, W. Ting, and M. J. Hinek, Dual RSA and its applications, IEEE Transactions on Information Theory, issue.8, pp.532922-2933, 2007.