Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus | IEEE Conference Publication | IEEE Xplore