Lenstra

Results: 153



#Item
31Mathematics / OSI protocols / Computational number theory / Lattice points / Algebra / Orthogonal frequency-division multiplexing / MIMO / Cyclic prefix / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Radio resource management / Information theory / IEEE 802

Lattice-Reduction-Aided Receivers for MIMO-OFDM in Spatial Multiplexing Systems Inaki Berenguer1 , Jaime Adeane1 , Ian J. Wassell1 , and Xiaodong Wang2 1 Laboratory for Communication Engineering Department of Engineering

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-06-29 06:52:44
32Combinatorics / Cryptography / Search algorithms / Applied mathematics / SHA-2 / Theoretical computer science / Permutation / Hash function / Independence / Mathematics / Cryptographic hash functions / Hashing

i A random zoo: sloth, un∨corn, and trx Arjen K. Lenstra and Benjamin Wesolowski EPFL IC LACAL, Station 14, CH-1015 Lausanne, Switzerland Abstract. Many applications require trustworthy generation of public random num

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 06:51:37
33Special number field sieve / Integer factorization / General number field sieve / Factorization / RSA / Lenstra elliptic curve factorization / Factor base / Quadratic sieve / Integer factorization records / Integer factorization algorithms / Cryptography / Mathematics

A kilobit special number field sieve factorization Kazumaro Aoki1 , Jens Franke2 , Thorsten Kleinjung2 , Arjen K. Lenstra3 , and Dag Arne Osvik3 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-05-31 05:26:07
34Applied mathematics / Integer factorization / General number field sieve / Quadratic sieve / Time complexity / Lenstra elliptic curve factorization / Factorization / Prime number / Algorithm / Theoretical computer science / Integer factorization algorithms / Mathematics

Faster deterministic integer factorisation David Harvey (joint work with Edgar Costa, NYU) University of New South Wales 25th October 2011

Add to Reading List

Source URL: web.maths.unsw.edu.au

Language: English - Date: 2011-10-24 19:42:20
35Mathematics / General number field sieve / Time complexity / Integer factorization / Primality test / Algorithm / NP / Prime number / Lenstra elliptic curve factorization / Theoretical computer science / Integer factorization algorithms / Applied mathematics

Faster deterministic integer factorisation David Harvey (joint work with Edgar Costa, NYU) University of New South Wales 6th January 2012, Joint Mathematics Meetings, Boston

Add to Reading List

Source URL: web.maths.unsw.edu.au

Language: English - Date: 2012-01-11 02:12:51
36General number field sieve / Special number field sieve / Integer factorization / Arjen Lenstra / Herman te Riele / Factor base / RSA / Factorization / Jens Franke / Integer factorization algorithms / Cryptography / Mathematics

Factorization of a 1061-bit number by the Special Number Field Sieve Greg Childers California State University Fullerton Fullerton, CAAugust 4, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-06 19:06:43
37X.509 / RSA / Public key certificate / Padding / Digital signature / Cryptographic hash function / Arjen Lenstra / PKCS / Collision attack / Cryptography / Public-key cryptography / MD5

Colliding X.509 Certificates version 1.0, 1st March 2005 Arjen Lenstra1,2 , Xiaoyun Wang3 , and Benne de Weger2 1

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2005-03-01 03:48:44
38Finite fields / Algebraic curves / Analytic number theory / Elliptic curves / Algebraic number theory / Lenstra elliptic curve factorization / Elliptic curve / Division polynomials / Algebraic number field / Abstract algebra / Algebra / Mathematics

PDF Document

Add to Reading List

Source URL: msp.org

Language: English - Date: 2013-11-23 01:41:04
39Search algorithms / Hashing / Preimage attack / Merkle–Damgård construction / Hash function / Alexander Sotirov / Cryptographic hash functions / Cryptography / MD5

MD5 considered harmful today Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger Presentation by: Hamidhasan G. Ahmed

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-09-26 13:48:46
40Cryptanalysis / Symmetric-key algorithm / Cipher / Data Encryption Standard / Stream cipher / Public-key cryptography / Cryptosystem / Key / Advanced Encryption Standard / Cryptography / Key size / Block cipher

Key Lengths Contribution to The Handbook of Information Security Arjen K. Lenstra Citibank, N.A., and Technische Universiteit Eindhoven 1 North Gate Road, Mendham, NJ, U.S.A.

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:17
UPDATE