<--- Back to Details
First PageDocument Content
Cryptography / Integer factorization algorithms / Computational hardness assumptions / E-commerce / RSA / Quadratic sieve / Lattice / Integer factorization
Date: 2015-08-28 10:30:32
Cryptography
Integer factorization algorithms
Computational hardness assumptions
E-commerce
RSA
Quadratic sieve
Lattice
Integer factorization

Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint ∗ Alexander May, Maike Ritzenhofen Horst Görtz Institute for IT-security Faculty of Mathematics Ruhr-University of Bochum, 44780 Bochum, Ger

Add to Reading List

Source URL: www.cits.rub.de

Download Document from Source Website

File Size: 335,81 KB

Share Document on Facebook

Similar Documents

Methods and Implementations for Integer Factorization Dana Jacobsen CS567, 16 December 2009 Dana Jacobsen CS567 Cryptology I

Methods and Implementations for Integer Factorization Dana Jacobsen CS567, 16 December 2009 Dana Jacobsen CS567 Cryptology I

DocID: 1sGAN - View Document

Integer factorization Daniel J. Bernstein

Integer factorization Daniel J. Bernstein

DocID: 1snpF - View Document

Mathematics Grade 6 Student Edition  G6 Playlist: Finding Greatest Common Factors and Least

Mathematics Grade 6 Student Edition G6 Playlist: Finding Greatest Common Factors and Least

DocID: 1rgZE - View Document

SMOOTH NUMBERS AND THE QUADRATIC SIEVE Carl Pomerance When faced with a large number n to factor, what do you do first? You might say “Look at the last digit,” with the idea of cheaply pulling out possible factors of

SMOOTH NUMBERS AND THE QUADRATIC SIEVE Carl Pomerance When faced with a large number n to factor, what do you do first? You might say “Look at the last digit,” with the idea of cheaply pulling out possible factors of

DocID: 1rfno - View Document

Algorithms and Data Structures (WS15/16) Example Solutions for Unit 4 Problem 1 skipped

Algorithms and Data Structures (WS15/16) Example Solutions for Unit 4 Problem 1 skipped

DocID: 1rcMI - View Document