scientific article; zbMATH DE number 475432
From MaRDI portal
Publication:4273679
zbMath0806.11065MaRDI QIDQ4273679
Arjen K. Lenstra, Hendrik W. jun. Lenstra, J. M. Pollard, M. S. Manasse
Publication date: 13 January 1994
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Number-theoretic algorithms; complexity (11Y16) Algebraic number theory computations (11Y40) Factorization (11Y05)
Related Items (29)
New weak keys in RSA ⋮ A SAT-Based Approach for Index Calculus on Binary Elliptic Curves ⋮ Algorithms for Black-Box Fields and their Application to Cryptography ⋮ On reduced Arakelov divisors of real quadratic fields ⋮ Batch RSA ⋮ A classification of ECM-friendly families of elliptic curves using modular curves ⋮ Mathematical problems in cryptology ⋮ On the oracle complexity of factoring integers ⋮ The point decomposition problem over hyperelliptic curves, Toward efficient computation of discrete logarithms in even characteristic ⋮ Another Generalization of Wiener’s Attack on RSA ⋮ How to fake an RSA signature by encoding modular root finding as a SAT problem ⋮ When e-th Roots Become Easier Than Factoring ⋮ Computation of discrete logarithms in prime fields ⋮ A Subexponential Algorithm for Discrete Logarithms Over all Finite Fields ⋮ Computational hardness of IFP and ECDLP ⋮ The number field sieve for integers of low weight ⋮ An Implementation of the Number Field Sieve ⋮ On computing ord\(_{N}(2)\) and its application ⋮ Factoring with Two Large Primes ⋮ Constructing digitized chaotic time series with a guaranteed enhanced period ⋮ Recovering Fourier coefficients of some functions and factorization of integer numbers ⋮ Subexponential time relations in the class group of large degree number fields ⋮ Post-Quantum Cryptography: State of the Art ⋮ What is the Future of Cryptography? ⋮ Approximating rings of integers in number fields ⋮ Cryptanalysis of RSA Using the Ratio of the Primes ⋮ Some mathematical remarks on the polynomial selection in NFS ⋮ Cryptanalyses of Candidate Branching Program Obfuscators ⋮ Forty years of attacks on the RSA cryptosystem: A brief survey
This page was built for publication: