1Sarkar S, Maitra S. Cryptanalysis of RSA with two decryption exponents I-J] . Information Processing Letters, 2009 (5): 1235- 1238.
2Brier E, Chevallier-Mames B, Ciet M, et al. Why One Should Also Secure RSA Public Key Elements. Lecture Notes in Computer Science, 2006.
3Fouque P A, Guillermin N, Leresteux D, et al. Attacking RSA-CRT signatures with faults on montgomery multiplication I-J7 Journal of Cryptographic Engineering, 2013 (1) - 1021-1024.