P. Béguin and J. Quisquater, Fast server-aided RSA signatures secure against active attacks, Advances in Cryptology -CRYPTO'95, vol.963, pp.57-69, 1995.

C. Castelluccia, E. Mykletun, and G. Tsudik, Improving secure server performance by re-balancing SSL/TLS handshakes, ASIACCS 06: 1st ACM Symposium on Information, pp.26-34, 2006.

X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, New algorithms for secure outsourcing of modular exponentiations, ESORICS 2012: 17th European Symposium on Research in Computer Security, vol.7459, pp.541-556, 2012.

C. Chevalier, F. Laguillaumie, and D. Vergnaud, Privately outsourcing exponentiation to a single server: Cryptanalysis and optimal constructions, ESORICS 2016: 21st European Symposium on Research in Computer Security, Part I, vol.9878, pp.261-278, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01375817

S. Hohenberger and A. Lysyanskaya, How to securely outsource cryptographic computations, TCC 2005: 2nd Theory of Cryptography Conference, vol.3378, pp.264-282, 2005.

A. Kerckhoffs, Journal des sciences militaires, p.1883

C. Laih, S. Yen, and L. Harn, Two efficient serveraided secret computation protocols based on the addition sequence, Advances in Cryptology -ASIACRYPT'91, vol.739, pp.450-459, 1993.

K. Arjen, J. P. Lenstra, M. Hughes, J. W. Augier, T. Bos et al., Public keys, Advances in Cryptology -CRYPTO 2012, vol.7417, pp.626-642, 2012.

C. H. Lim and P. Lee, Security and performance of server-aided RSA computation protocols, Advances in Cryptology -CRYPTO'95, vol.963, pp.70-83, 1995.

T. Matsumoto, K. Kato, and H. Imai, Speeding up secret computations with insecure auxiliary devices, Advances in Cryptology -CRYPTO'88, vol.403, pp.497-506, 1990.

T. Mefenza and D. Vergnaud, Cryptanalysis of server-aided RSA protocols with private-key splitting, Comput. J, vol.62, issue.8, pp.1194-1213, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02082342

J. Quisquater and C. Couvreur, Fast decipherment algorithm for RSA public key cryptosystem. Electronic Letters, vol.18, pp.905-907, 1982.

M. O. Rabin, Digitalized signatures and public-key functions as intractable as factorization, 1979.

M. O. Rabin, Probabilistic algorithm for testing primality, J. Number Theory, vol.12, pp.128-138, 1980.

R. L. Rivest, A. Shamir, and L. M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the Association for Computing Machinery, vol.21, pp.120-126, 1978.

D. Vergnaud, Secure outsourcing in discrete-logarithm-based and pairing-based cryptography (Invited talk), Information Security Theory and Practice -12th IFIP WG 11.2 International Conference, pp.7-11, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02294605

Y. Wang, Q. Wu, D. S. Wong, B. Qin, S. M. Sherman et al., Securely outsourcing exponentiations with single untrusted program for cloud storage, ESORICS 2014: 19th European Symposium on Research in Computer Security, Part I, vol.8712, pp.326-343, 2014.

H. Zhang, J. Yu, C. Tian, L. Tong, J. Lin et al., Efficient and secure outsourcing scheme for RSA decryption in Internet of Things, IEEE Internet of Things Journal, 2020.