paper on the cryptanalysis of an outsourced modular inversion protocol accepted in Mathematical Cryptology