Security Attacks on RSA
Boy under the bed ppt for adaptation
Secret agents leave big footprints: how to plant a trapdoor in a cryptographic function and why you might not get away with it. GECCO 2003 John A Clark,
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.