Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 475432 - MaRDI portal

scientific article; zbMATH DE number 475432

From MaRDI portal
Publication:4273679

zbMath0806.11065MaRDI QIDQ4273679

Arjen K. Lenstra, Hendrik W. jun. Lenstra, J. M. Pollard, M. S. Manasse

Publication date: 13 January 1994


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (29)

New weak keys in RSAA SAT-Based Approach for Index Calculus on Binary Elliptic CurvesAlgorithms for Black-Box Fields and their Application to CryptographyOn reduced Arakelov divisors of real quadratic fieldsBatch RSAA classification of ECM-friendly families of elliptic curves using modular curvesMathematical problems in cryptologyOn the oracle complexity of factoring integersThe point decomposition problem over hyperelliptic curves, Toward efficient computation of discrete logarithms in even characteristicAnother Generalization of Wiener’s Attack on RSAHow to fake an RSA signature by encoding modular root finding as a SAT problemWhen e-th Roots Become Easier Than FactoringComputation of discrete logarithms in prime fieldsA Subexponential Algorithm for Discrete Logarithms Over all Finite FieldsComputational hardness of IFP and ECDLPThe number field sieve for integers of low weightAn Implementation of the Number Field SieveOn computing ord\(_{N}(2)\) and its applicationFactoring with Two Large PrimesConstructing digitized chaotic time series with a guaranteed enhanced periodRecovering Fourier coefficients of some functions and factorization of integer numbersSubexponential time relations in the class group of large degree number fieldsPost-Quantum Cryptography: State of the ArtWhat is the Future of Cryptography?Approximating rings of integers in number fieldsCryptanalysis of RSA Using the Ratio of the PrimesSome mathematical remarks on the polynomial selection in NFSCryptanalyses of Candidate Branching Program ObfuscatorsForty years of attacks on the RSA cryptosystem: A brief survey




This page was built for publication: