<--- Back to Details
First PageDocument Content
Algebra / Mathematics / Linear algebra / Numerical linear algebra / Integer factorization algorithms / Polynomials / Gaussian elimination / Quadratic sieve / Index calculus algorithm / Factorization / Factorial / Kernel
Date: 2014-09-02 16:16:17
Algebra
Mathematics
Linear algebra
Numerical linear algebra
Integer factorization algorithms
Polynomials
Gaussian elimination
Quadratic sieve
Index calculus algorithm
Factorization
Factorial
Kernel

Advances in Mathematics of Communications Volume X, No. 0X, 200X, X–XX Web site: http://www.aimSciences.org IMPROVEMENTS IN THE COMPUTATION OF IDEAL CLASS

Add to Reading List

Source URL: www.lix.polytechnique.fr

Download Document from Source Website

File Size: 229,97 KB

Share Document on Facebook

Similar Documents

A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups Alexander May? and Ilya Ozerov?? Horst G¨ ortz Institute for IT-Security Ruhr-University Bochum, Germany

A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups Alexander May? and Ilya Ozerov?? Horst G¨ ortz Institute for IT-Security Ruhr-University Bochum, Germany

DocID: 1qKpq - View Document

On the Function Field Sieve and the Impact of Higher Splitting Probabilities Robert Granger  Joint work with Faruk Gölo§lu, Gary McGuire and Jens Zumbrägel

On the Function Field Sieve and the Impact of Higher Splitting Probabilities Robert Granger Joint work with Faruk Gölo§lu, Gary McGuire and Jens Zumbrägel

DocID: 1qJsF - View Document

Revisiting discrete logarithms in medium/small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6

Revisiting discrete logarithms in medium/small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6

DocID: 1qjra - View Document

Master’s thesis in Mathematics  The use of elliptic curves in cryptography by  Gijsbert van Vliet

Master’s thesis in Mathematics The use of elliptic curves in cryptography by Gijsbert van Vliet

DocID: 1pH9i - View Document

Public Key Cryptography Using Discrete Logarithms in Finite Fields: Algorithms, Efficient Implementation and Attacks  L. Maurits)

Public Key Cryptography Using Discrete Logarithms in Finite Fields: Algorithms, Efficient Implementation and Attacks L. Maurits)

DocID: 1obzi - View Document