Factoring integers with elliptic curves

From MaRDI portal
Publication:1093665

DOI10.2307/1971363zbMath0629.10006OpenAlexW2005317356WikidataQ55899111 ScholiaQ55899111MaRDI QIDQ1093665

Hendrik W. jun. Lenstra

Publication date: 1987

Published in: Annals of Mathematics. Second Series (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/307ab08c3d4f551019297d2480597c614af8069c




Related Items

On Group Structures Realized by Elliptic Curves over a Fixed Finite FieldSieve algorithms for perfect power testingFactoring multi-power RSA moduli with primes sharing least or most significant bitsTrapdoor DDH groups from pairings and isogeniesOptimal strong primesPractical cryptanalysis of ISO 9796-2 and EMV signaturesCrypto Galore!Fast generation of prime numbers and secure public-key cryptographic parameters.Distribution of elliptic twin primes in isogeny and isomorphism classesFactoring RSA moduli with primes sharing bits in the middleZeta functions, one-way functions, and pseudorandom number generators.Elliptic curves in isogeny classesCorrigendum: Elliptic curves with a given number of points over finite fieldsElliptic curves with large torsion and positive rank over number fields of small degree and ECM factorizationSums of Euler products and statistics of elliptic curvesVariations in the distribution of principally polarized abelian varieties among isogeny classesSato-Tate, cyclicity, and divisibility statistics on average for elliptic curves of small heightOn efficient sparse integer matrix Smith normal form computationsOn the oracle complexity of factoring integersAn integrated parallel GNFS algorithm for integer factorization based on linbox montgomery block Lanczos method over \(GF(2)\)A verifiable secret shuffle of homomorphic encryptionsRSA: a number of formulas to improve the search for \(p+q\)Small secret exponent attack on RSA variant with modulus \(N=p^rq\)Computing the endomorphism ring of an ordinary abelian surface over a finite fieldOn the distribution of Atkin and Elkies primesAnalysis of the fault attack ECDLP over prime fieldThe distribution of the number of points modulo an integer on elliptic curves over finite fieldsSpreading alerts quietly and the subgroup escape problemElliptic curve cryptography: the serpentine course of a paradigm shiftComputing the endomorphism ring of an ordinary elliptic curve over a finite fieldExplicit methods in number theory. Abstracts from the workshop held July 18--24, 2021 (hybrid meeting)Factoring multi power RSA moduli with a class of secret exponentsOn oracle factoring of integersPrime factorization using square root approximation\(o\)-minimality and the André-Oort conjecture for \(\mathbb{C}^{n}\)Some optimal codes from algebraic geometry and their covering radiiPoints on curves in small boxes and applicationsElliptic curves, modular forms, and sums of Hurwitz class numbersAn elliptic curve analogue to the Fermat numbersElliptic curve implementation of zero-knowledge blobsComputational complexity of sentences over fieldsUse of SIMD-based data parallelism to speed up sieving in integer-factoring algorithmsRigorous analysis of a randomised number field sieveGeneric hardness of inversion on ring and its relation to self-bilinear mapOn powersmooth numbersCRT-based fully homomorphic encryption over the integersMetrics on the sets of nonsupersingular elliptic curves in simplified Weierstrass form over finite fields of characteristic twoEfficient randomized generation of optimal algorithms for multiplication in certain finite fieldsDrinfeld modules with complex multiplication, Hasse invariants and factoring polynomials over finite fieldsPolynomial time bounded distance decoding near Minkowski's bound in discrete logarithm latticesSpecial prime numbers and discrete logs in finite prime fieldsCryptanalysis of ISO/IEC 9796-1Constructing elliptic curves over finite fields using double eta-quotientsAverage Frobenius distributions for elliptic curves with 3-torsionNumbers in a given set with (or without) a large prime factorA new public key cryptosystem based on Edwards curvesToric forms of elliptic curves and their arithmeticOn the ultimate complexity of factorialsIndex calculation attacks on RSA signature and encryptionOn RSA moduli with prescribed bit patternsOn the representation of the number of integral points of an elliptic curve modulo a prime numberOn computing ord\(_{N}(2)\) and its applicationNew number-theoretic cryptographic primitivesRealistic analysis of some randomized algorithmsOne-way permutations on elliptic curvesA Simple and Improved Algorithm for Integer Factorization with Implicit HintsA new generalization of the KMOV cryptosystemFactoring with hintsQuadratic sievingRecovering Fourier coefficients of some functions and factorization of integer numbersStrongly nonzero points and elliptic pseudoprimesSome remarks on primality proving and elliptic curvesSmoothness testing of polynomials over finite fieldsArithmetic of the level four theta model of elliptic curvesPolynomial factorization over finite fields by computing Euler-Poincaré characteristics of Drinfeld modulesAn improved parallel block Lanczos algorithm over GF(2) for integer factorizationStatistics about elliptic curves over finite prime fieldsApproximating rings of integers in number fieldsFast group operations on elliptic curves in MapleLarge-Order Multiple Recursive Generators with Modulus 231 − 1A New Attack on Three Variants of the RSA CryptosystemRefined analysis to the extended tower number field sieveFaster cofactorization with ECM using mixed representationsPrime-number algorithm for public-key systemsAdversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup ModuliFactoring with the quadratic sieve on large vector computersExtended Tower Number Field Sieve: A New Complexity for the Medium Prime CaseOn the Sato–Tate conjecture on average for some families of elliptic curvesOn counting and generating curves over small finite fieldsCyclicity statistics for elliptic curves over finite fieldsArithmetic statistics and noncommutative Iwasawa theoryAverage Frobenius distribution for the degree two primes of a number fieldThe distribution of class groups of function fieldsStrong pseudoprimes to base 2Some computational problems of cryptographic significance concerning elliptic curves over ringsAn efficient deterministic test for Kloosterman sum zerosModular curves over number fields and ECMModifications to the number field sieveIntegers without large prime factorsRevisiting prime power RSAFactoring integers and oracles for elliptic and hyperelliptic curvesFactorization, malleability and equivalent problemsOn elliptic curve $L$-functions integrated encryption schemeSmooth factors of integers and elliptic curve based factoring with an oracleNew amicable pairs of type $(2,2)$ and type $(3,2)$The Non-existence of Universal Carmichael NumbersUnlikely Intersections with ExCM curves in A2New weak keys in RSAAttacking RSA Using an Arbitrary ParameterDiffie-Hellman OraclesAlgorithms for Black-Box Fields and their Application to CryptographyCompositeness test with nodal curvesAttacking (EC)DSA Given Only an Implicit HintFinding elliptic curves with a subgroup of prescribed sizeEvaluating Igusa functionsA classification of ECM-friendly families of elliptic curves using modular curvesUnnamed ItemSOME ARITHMETICAL PROPERTIES ON HYPERBOLANew applications of the polynomial method: The cap set conjecture and beyondComputational Number Theory and CryptographyElliptic Twin Prime ConjectureGeneralised Mersenne numbers revisitedA survey on the group of points arising from elliptic curves with a Weierstrass model over a ringUNLIKELY INTERSECTIONS IN FINITE CHARACTERISTICAmicable pairs and aliquot cycles on averageLang–Trotter and Sato–Tate distributions in single and double parametric families of elliptic curvesSubgroup Security in Pairing-Based CryptographyNew Attacks on RSA with Moduli N = p r qFactoring RSA Moduli with Weak Prime FactorsSmall discriminants of complex multiplication fields of elliptic curves over finite fieldsArithmetic statistics and Diophantine stability for elliptic curvesComputational Number Theory, Past, Present, and FutureArithmetic statistics for the fine Selmer group in Iwasawa theoryAnother Generalization of Wiener’s Attack on RSATables of Fibonacci and Lucas factorizationsLattice enumeration for tower NFS: a 521-bit discrete logarithm computationCryptanalysis of the multi-power RSA cryptosystem variantA Titchmarsh divisor problem for elliptic curvesLattice enumeration and automorphisms for tower NFS: a 521-bit discrete logarithm computationRevisiting cycles of pairing-friendly elliptic curvesGroup structure of elliptic curves over \(\mathbb{Z}/N\mathbb{Z}\)High-rank elliptic curves with given torsion group and some applicationsJKL-ECM: an implementation of ECM using Hessian curvesAn elliptic curve analogue of McCurley's key agreement schemeComputing isomorphisms and embeddings of finite fieldsAn asymptotic for the average number of amicable pairs for elliptic curvesAurifeuillian factorizations and the period of the Bell numbers modulo a primeA Kilobit Special Number Field Sieve FactorizationA Subexponential Algorithm for Discrete Logarithms Over all Finite FieldsA Practical Analysis of the Elliptic Curve Factoring AlgorithmAverage Frobenius distribution for elliptic curves defined over finite Galois extensions of the rationalsThe Factorization of the Ninth Fermat NumberElliptic Curves and Primality ProvingApplication of ECM to a class of RSA keysFinding the group structure of elliptic curves over finite fieldsCompression on the Twisted Jacobi IntersectionAn exploration of affine group laws for elliptic curvesECM using Edwards curvesFinding Suitable Curves for the Elliptic Curve Method of FactorizationA deterministic version of Pollard’s $p-1$ algorithmFactorization with genus 2 curvesComputing the order of points on an elliptic curve modulo \(N\) is as difficult as factoring \(N\)Huff’s Model for Elliptic CurvesFast construction of irreducible polynomials over finite fieldsUsing LLL-Reduction for Solving RSA and Factorization ProblemsA $p$-adic algorithm to compute the Hilbert class polynomialA generic approach to searching for JacobiansA Rigorous Time Bound for Factoring IntegersOn the asymptotic effectiveness of Weil descent attacksSpeeding up the computations on an elliptic curve using addition-subtraction chainsAnother look at non-standard discrete log and Diffie-Hellman problemsUsing number fields to compute logarithms in finite fieldsThree new factors of Fermat numbersBinary Huff CurvesComputing isogenies between elliptic curves over $F_{p^n}$ using Couveignes's algorithmInformation and computation: Classical and quantum aspectsSufficient conditions for factoring a class of large integersComplexity of inverting the Euler functionComputing Hilbert class polynomials with the Chinese remainder theoremOn the Security of Cryptosystems with Quadratic Decryption: The Nicest CryptanalysisECM on Graphics CardsComputing Prime Factorization And Discrete Logarithms: From Index Calculus To Xedni CalculusTHE ERROR TERM IN THE SATO–TATE THEOREM OF BIRCHCryptanalysis of RSA Using the Ratio of the PrimesAlgorithm for factoring some RSA and Rabin moduliExtension of elliptic curves on Krasner hyperfieldsConstruction of metrics on the set of elliptic curves over a finite fieldSelf-correctors for Cryptographic ModulesComputing prime divisors in an intervalReliabilities of Double-Loop NetworksFactoring with Cyclotomic PolynomialsUnnamed ItemOn the Number of Elliptic PseudoprimesA New Class of Weak Encryption Exponents in RSAFactorization of the tenth Fermat numberComputing canonical heights with little (or no) factorizationTraces of Hecke operators and refined weight enumerators of Reed-Solomon codesSMOOTH NUMBERS IN SHORT INTERVALSSupersingular j-invariants and the class number of ℚ(−p)Prime Factorization without Using Any ApproximationsRanks of elliptic curvesA new attack on RSA and Demytko’s elliptic curve cryptosystemForty years of attacks on the RSA cryptosystem: A brief survey




This page was built for publication: Factoring integers with elliptic curves