咨询与建议

限定检索结果

文献类型

  • 86 篇 期刊文献
  • 43 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 132 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 93 篇 工学
    • 82 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 13 篇 软件工程
    • 10 篇 信息与通信工程
    • 9 篇 电子科学与技术(可...
    • 4 篇 材料科学与工程(可...
    • 3 篇 网络空间安全
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
  • 61 篇 理学
    • 47 篇 数学
    • 10 篇 物理学
    • 4 篇 化学
    • 2 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 5 篇 管理学
    • 5 篇 管理科学与工程(可...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 132 篇 integer factoriz...
  • 15 篇 rsa
  • 9 篇 discrete logarit...
  • 8 篇 cryptography
  • 6 篇 elliptic curve m...
  • 6 篇 number field sie...
  • 5 篇 shor's algorithm
  • 5 篇 proxy signature
  • 4 篇 polynomial selec...
  • 4 篇 public key crypt...
  • 4 篇 probabilistic co...
  • 4 篇 public-key crypt...
  • 4 篇 cryptanalysis
  • 4 篇 security
  • 3 篇 elliptic curve
  • 3 篇 computational co...
  • 3 篇 fermat number
  • 3 篇 quadratic sieve
  • 3 篇 public-key crypt...
  • 3 篇 single instructi...

机构

  • 3 篇 univ bonn dept m...
  • 2 篇 chinese acad sci...
  • 2 篇 shanghai maritim...
  • 2 篇 microsoft res re...
  • 2 篇 tunghai univ dep...
  • 2 篇 shanghai ocean u...
  • 2 篇 univ oxford comp...
  • 2 篇 brno university ...
  • 2 篇 xidian univ natl...
  • 2 篇 indian inst tech...
  • 2 篇 east china norma...
  • 2 篇 shanghai univ el...
  • 2 篇 mit comp sci lab...
  • 2 篇 indian inst tech...
  • 1 篇 cnrs inria loria...
  • 1 篇 ohio state univ ...
  • 1 篇 fujitsu ltd 4-1-...
  • 1 篇 univ british col...
  • 1 篇 swiss inst bioin...
  • 1 篇 kennesaw state u...

作者

  • 3 篇 kleinjung thorst...
  • 3 篇 chaturvedi utkar...
  • 3 篇 shukla k. k.
  • 3 篇 pomykala jacek
  • 3 篇 montgomery peter...
  • 3 篇 brent rp
  • 3 篇 mishra mohit
  • 2 篇 zhang lei
  • 2 篇 huang dongmei
  • 2 篇 chen ts
  • 2 篇 wang ym
  • 2 篇 wang baocang
  • 2 篇 micali s
  • 2 篇 bahig hazem m.
  • 2 篇 sengupta binanda
  • 2 篇 das abhijit
  • 2 篇 bos joppe w.
  • 2 篇 padhye sahadeo
  • 2 篇 kunihiro noboru
  • 2 篇 hu yupu

语言

  • 125 篇 英文
  • 7 篇 其他
检索条件"主题词=integer factorization"
132 条 记 录,以下是31-40 订阅
排序:
Fast square-free decomposition of integers using class groups
收藏 引用
RESEARCH IN NUMBER THEORY 2025年 第1期11卷 1-21页
作者: Mulder, Erik RAU Tech Univ Eindhoven Nijmegen Netherlands
Let n = a(2)b, where b is square-free. In this paper we present an algorithm based on class groups of binary quadratic forms that finds the square-free decomposition of n,i.e. a and b, in heuristic expected time: (O) ... 详细信息
来源: 评论
Chained time lock puzzle with small puzzle size
收藏 引用
INFORMATION AND COMPUTATION 2025年 304卷
作者: Kumar, Ramakant Padhye, Sahadeo Motilal Nehru Natl Inst Technol Allahabad Dept Math Prayagraj 211004 India
A time lock puzzle (TLP) is an interesting cryptographic primitive used to lock messages for a limited time period. After the desired time interval, the puzzle solver can know the message. Chained time lock puzzle (C-... 详细信息
来源: 评论
On the coefficients of the polynomial in the number field sieve
收藏 引用
Science China(Information Sciences) 2015年 第11期58卷 182-190页
作者: YANG Min MENG QingShu WANG ZhangYi LI Li ZHANG HuanGuo International School of Software Wuhan University Computer School Wuhan University
Polynomial selection is very important in the number field sieve. If the number of relations a pair of polynomials can generate is closely correlated with the coefficients of the polynomials, we can select polynomials... 详细信息
来源: 评论
factorization using binary decision diagrams
收藏 引用
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES 2019年 第3期11卷 443-460页
作者: Raddum, Havard Varadharajan, Srimathi Simula UiB Thormohlensgate 55 N-5006 Bergen Norway
We address the factorization problem in this paper: Given an integer N=pq, find two factors p and q of N such that p and q are of same bit-size. When we say integer multiplication of N, we mean expressing N as a produ... 详细信息
来源: 评论
A Novel Combinatorial Public Key Cryptosystem
收藏 引用
INFORMATICA 2010年 第4期21卷 611-626页
作者: Wang, Baocang Hu, Yupu Xidian Univ Key Lab Comp Networks & Informat Secur Xian 710071 Peoples R China Chinese Acad Sci Inst Software State Key Lab Informat Secur Beijing 100049 Peoples R China
Combinatorial problems serve as an important resource for developing practical public key cryptosystems and several combinatorial cryptosystems have been proposed in the cryptographic community. In this paper, a combi... 详细信息
来源: 评论
Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences
收藏 引用
APPLIED MATHEMATICS AND COMPUTATION 2005年 第2期171卷 900-911页
作者: Jiang, ZT Zhan, Y Chen, D Wang, YM Xidian Univ Natl Key Lab Integrated Serv Networks Xian 710071 Peoples R China
Linear Feedback Shift Registers are a commonly used method of producing pseudo-random sequences with large period. This paper investigated another applications of the third-order linear feedback shift register sequenc... 详细信息
来源: 评论
Provably secure proxy signature scheme from factorization
收藏 引用
MATHEMATICAL AND COMPUTER MODELLING 2012年 第3-4期55卷 1160-1168页
作者: Yu, Yong Mu, Yi Susilo, Willy Sun, Ying Ji, Yafu Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu 610054 Peoples R China Univ Wollongong Sch Comp Sci & Software Engn Ctr Comp & Informat Secur Res Wollongong NSW 2522 Australia
Proxy signature is a cryptographic primitive used for delegating the signing rights. The security of most existing proxy signature schemes is based on the complexity assumptions of discrete logarithms and the intracta... 详细信息
来源: 评论
Progress in the prime factorization of large numbers
收藏 引用
JOURNAL OF SUPERCOMPUTING 2024年 第8期80卷 11382-11400页
作者: Zhang, Dan Wang, Hui Li, Shuang Wang, Baonan Shanghai Maritime Univ Inst Logist Sci & Engn Shanghai 201306 Peoples R China Shanghai Univ Elect Power Coll Comp Sci & Technol Shanghai 201306 Peoples R China Shanghai Normal Univ Coll Informat Mech & Elect Engn Shanghai 200234 Peoples R China
Large number factorization is not only the most critical entry point for Rivest-Shamir-Adleman (RSA) security analysis, but also the most direct means of attacking the asymmetric encryption algorithm RSA. In this pape... 详细信息
来源: 评论
Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment
收藏 引用
MOBILE NETWORKS & APPLICATIONS 2021年 第4期26卷 1609-1615页
作者: Jing, Zhengjun Gu, Chunsheng Ge, Chunpeng Shi, Peizhong Jiangsu Univ Technol Sch Comp Engn 1801 Zhong Wu Rd Changzhou Jiangsu Peoples R China
Shor presented a quantum algorithm to factor large integers and compute discrete logarithms in polynomial time. As a result, public key cryptosystems, such as RSA, ElGamal and ECC, which are based on these computation... 详细信息
来源: 评论
Pitfalls of the Sublinear QAOA-Based factorization Algorithm
收藏 引用
IEEE ACCESS 2023年 11卷 134760-134768页
作者: Grebnev, Sergey V. Gavreev, Maxim A. Kiktenko, Evgeniy O. Guglya, Anton P. Efimov, Albert R. Fedorov, Aleksey K. Skolkovo Russian Quantum Ctr Moscow 121205 Russia Natl Univ Sci & Technol MISIS Moscow 119049 Russia Sberbank Russia Sber Innovat & Res Moscow 121357 Russia
Quantum computing devices are believed to be powerful in solving the prime factorization problem, which is at the heart of widely deployed public-key cryptographic tools. However, the implementation of Shor's quan... 详细信息
来源: 评论