Our guess of an attack given many public keys is that some private components are reused in the computation of a public key, i.e. `p`, `q` or `d`. E.g. we have two moduli `na=p_1*q_1` and `nb=p_1*q_2`, we can find the greatest common divisor of both numbers, which...