Introduction to R-sequence public key cryptography attack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