. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92/92 RSA RSA Digital Signature Signature Forgery M. Kamel Ariffin, S. Abubakar, F. Yunos, and M. Asbullah, “New cryptanalytic attack on rsa modulus n= pq using small prime difference method,” Cryptography, vol. 3, no. 1, p. 2, 2019. N. Heninger, Z. Durumeric, E. Wustrow, and J. A. Halderman, “Mining your ps and qs: Detection of widespread weak keys in network devices,” in Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security 12), pp. 205–220, 2012. N. Aviram, S. Schinzel, J. Somorovsky, N. Heninger, M. Dankel, J. Steube, L. Valenta, D. Adrian, J. A. Halderman, V. Dukhovni, et al., “{DROWN}: Breaking {TLS} using sslv2,” in 25th {USENIX} Security Symposium ({USENIX} Security 16), pp. 689–706, 2016. H. Böck, J. Somorovsky, and C. Young, “Return of bleichenbacher’s oracle threat ({ROBOT}),” in 27th