# Public Exponent Attacks

These attacks exploit a poorly-chosen public exponent $$e$$.
