Integer factorization algorithms

Results: 208



#Item
11FACTORIZATION TECHNIQUES ELVIS NUNEZ AND CHRIS SHAW Abstract. The security of the RSA public key cryptosystem relies upon the computational difficulty of deriving the factors of a particular semiprime modulus. In this pa

FACTORIZATION TECHNIQUES ELVIS NUNEZ AND CHRIS SHAW Abstract. The security of the RSA public key cryptosystem relies upon the computational difficulty of deriving the factors of a particular semiprime modulus. In this pa

Add to Reading List

Source URL: davidlowryduda.com

Language: English - Date: 2016-05-25 03:59:31
12Introduction to Number Theory Supplement on Gaussian Integers Spring 2016 Last Updated: April 10, 2016  This is a brief supplemental note on the Gaussian integers, written for my

Introduction to Number Theory Supplement on Gaussian Integers Spring 2016 Last Updated: April 10, 2016 This is a brief supplemental note on the Gaussian integers, written for my

Add to Reading List

Source URL: davidlowryduda.com

Language: English - Date: 2016-04-10 04:24:41
13POST-SIEVING ON GPUs Andrea Miele1, Joppe W. Bos2, Thorsten Kleinjung1, Arjen K. Lenstra1 1LACAL,

POST-SIEVING ON GPUs Andrea Miele1, Joppe W. Bos2, Thorsten Kleinjung1, Arjen K. Lenstra1 1LACAL,

Add to Reading List

Source URL: caramba.loria.fr

Language: English - Date: 2016-06-13 15:37:34
14Edwards Curves and the ECM Factorisation Method Peter Birkner Eindhoven University of Technology  The 12th Workshop on Elliptic Curve Cryptography

Edwards Curves and the ECM Factorisation Method Peter Birkner Eindhoven University of Technology The 12th Workshop on Elliptic Curve Cryptography

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-09-27 14:59:29
15Integer Factorization and Computing Discrete Logarithms in Maple Aaron Bradford∗, Michael Monagan∗, Colin Percival∗ , ,   Department of Mathematics, Simon Fr

Integer Factorization and Computing Discrete Logarithms in Maple Aaron Bradford∗, Michael Monagan∗, Colin Percival∗ , , Department of Mathematics, Simon Fr

Add to Reading List

Source URL: www.daemonology.net

Language: English - Date: 2006-05-14 06:12:35
16Quantum Computing and Cryptography Spring Semester 2011 Steve Vickers The University of Birmingham School of Computer Science

Quantum Computing and Cryptography Spring Semester 2011 Steve Vickers The University of Birmingham School of Computer Science

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2011-03-23 04:16:10
17CS 70 Fall 2003 Discrete Mathematics for CS Wagner

CS 70 Fall 2003 Discrete Mathematics for CS Wagner

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
18CS 70 Spring 2008 Discrete Mathematics for CS David Wagner

CS 70 Spring 2008 Discrete Mathematics for CS David Wagner

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
19Square Root Algorithms for the Number Field Sieve Emmanuel Thomé INRIA Nancy, Villers-lès-Nancy, France  Abstract. We review several methods for the square root step of the

Square Root Algorithms for the Number Field Sieve Emmanuel Thomé INRIA Nancy, Villers-lès-Nancy, France Abstract. We review several methods for the square root step of the

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2012-11-29 10:44:38
20Discrete logarithm in GFwith FFS Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé, Marion Videau, and Paul Zimmermann CARAMEL project-team, LORIA, INRIA / CNRS /

Discrete logarithm in GFwith FFS Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé, Marion Videau, and Paul Zimmermann CARAMEL project-team, LORIA, INRIA / CNRS /

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2014-01-09 15:35:58