Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus | Publicación