咨询与建议

限定检索结果

文献类型

  • 87 篇 期刊文献
  • 44 篇 会议

馆藏范围

  • 131 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 82 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 14 篇 软件工程
    • 10 篇 信息与通信工程
    • 9 篇 电子科学与技术(可...
    • 4 篇 材料科学与工程(可...
    • 3 篇 网络空间安全
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
  • 62 篇 理学
    • 48 篇 数学
    • 10 篇 物理学
    • 4 篇 化学
    • 2 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 5 篇 管理学
    • 5 篇 管理科学与工程(可...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 131 篇 integer factoriz...
  • 15 篇 rsa
  • 9 篇 discrete logarit...
  • 8 篇 cryptography
  • 6 篇 elliptic curve m...
  • 6 篇 number field sie...
  • 5 篇 shor's algorithm
  • 5 篇 proxy signature
  • 4 篇 polynomial selec...
  • 4 篇 public key crypt...
  • 4 篇 probabilistic co...
  • 4 篇 public-key crypt...
  • 4 篇 cryptanalysis
  • 4 篇 security
  • 3 篇 elliptic curve
  • 3 篇 fermat number
  • 3 篇 quadratic sieve
  • 3 篇 public-key crypt...
  • 3 篇 single instructi...
  • 3 篇 optimization

机构

  • 3 篇 univ bonn dept m...
  • 2 篇 chinese acad sci...
  • 2 篇 shanghai maritim...
  • 2 篇 microsoft res re...
  • 2 篇 tunghai univ dep...
  • 2 篇 shanghai ocean u...
  • 2 篇 univ oxford comp...
  • 2 篇 xidian univ natl...
  • 2 篇 indian inst tech...
  • 2 篇 east china norma...
  • 2 篇 shanghai univ el...
  • 2 篇 mit comp sci lab...
  • 2 篇 indian inst tech...
  • 1 篇 cnrs inria loria...
  • 1 篇 ohio state univ ...
  • 1 篇 fujitsu ltd 4-1-...
  • 1 篇 univ british col...
  • 1 篇 swiss inst bioin...
  • 1 篇 kennesaw state u...
  • 1 篇 intel technol de...

作者

  • 3 篇 kleinjung thorst...
  • 3 篇 chaturvedi utkar...
  • 3 篇 shukla k. k.
  • 3 篇 pomykala jacek
  • 3 篇 montgomery peter...
  • 3 篇 brent rp
  • 3 篇 mishra mohit
  • 2 篇 zhang lei
  • 2 篇 huang dongmei
  • 2 篇 chen ts
  • 2 篇 wang ym
  • 2 篇 wang baocang
  • 2 篇 micali s
  • 2 篇 bahig hazem m.
  • 2 篇 sengupta binanda
  • 2 篇 das abhijit
  • 2 篇 bos joppe w.
  • 2 篇 padhye sahadeo
  • 2 篇 kunihiro noboru
  • 2 篇 hu yupu

语言

  • 124 篇 英文
  • 7 篇 其他
检索条件"主题词=integer factorization"
131 条 记 录,以下是61-70 订阅
排序:
Factoring n and the Number of Points of Kummer Hypersurfaces mod n  1st
Factoring <i>n</i> and the Number of Points of Kummer Hypers...
收藏 引用
1st International Conference on Number-Theoretic Methods in Cryptology (NuTMiC)
作者: Drylo, Robert Pomykala, Jacek Warsaw Sch Econ Al Niepodleglosci 162 PL-02554 Warsaw Poland Fac Math Informat & Mech Ul Banacha 2 PL-02097 Warsaw Poland
In this paper we describe the reduction of factorization of a square-free integer n to the problem of determining the number of points in Z(n)(d + 1) on twists of Kummer hypersurfaces y(k) = f (x(1), . . . ,x(d)) mod ... 详细信息
来源: 评论
A Deterministic Algorithm for Computing Divisors in an Interval  23rd
A Deterministic Algorithm for Computing Divisors in an Inter...
收藏 引用
23rd Australasian Conference on Information Security and Privacy (ACISP)
作者: Peng, Liqiang Lu, Yao Kunihiro, Noboru Zhang, Rui Hu, Lei Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China Chinese Acad Sci Data Assurance & Commun Secur Res Ctr Beijing 100093 Peoples R China Univ Tokyo Tokyo Japan
We revisit the problem of finding a nontrivial divisor of a composite integer when it has a divisor in an interval [alpha, beta]. We use Strassen's algorithm to solve this problem. Compared with Kim-Cheon's al... 详细信息
来源: 评论
Use of SIMD-based data parallelism to speed up sieving in integer-factoring algorithms
收藏 引用
APPLIED MATHEMATICS AND COMPUTATION 2017年 第0期293卷 204-217页
作者: Sengupta, Binanda Das, Abhijit Indian Inst Technol Dept Comp Sci & Engn Kharagpur 721302 W Bengal India Indian Stat Inst Appl Stat Unit Kolkata 700108 W Bengal India
Many cryptographic protocols derive their security from the apparent computational intractability of the integer factorization problem. Currently, the best known integer-factoring algorithms run in subexponential time... 详细信息
来源: 评论
Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2017年 第12期66卷 2019-2030页
作者: Ishii, Masahiro Detrey, Jeremie Gaudry, Pierrick Inomata, Atsuo Fujikawa, Kazutoshi Tokyo Inst Technol Tokyo 1528550 Japan CNRS INRIA LORIA F-54000 Nancy France Univ Lorraine F-54000 Nancy France Nara Inst Sci & Technol Informat Initiat Ctr Nara 6300101 Japan
The Kalray MPPA-256 processor is based on a recent low-energy manycore architecture. In this article, we investigate its performance in multiprecision arithmetic for number-theoretic applications. We have developed a ... 详细信息
来源: 评论
Finding special factors of values of polynomials at integer points
收藏 引用
INTERNATIONAL JOURNAL OF NUMBER THEORY 2017年 第1期13卷 209-228页
作者: Badziahin, Dmitry Univ Durham Dept Math Sci Stockton Rd Durham DH1 3LE England
We investigate the divisors d of the numbers P(n) for various polynomials P is an element of Z[x] such that d equivalent to 1 (mod n). We obtain the complete classification of such divisors for a class of polynomials,... 详细信息
来源: 评论
Efficient and Provably Secure Identity-Based Multi-Signature Schemes for Data Aggregation in Marine Wireless Sensor Networks  14
Efficient and Provably Secure Identity-Based Multi-Signature...
收藏 引用
14th IEEE International Conference on Networking, Sensing and Control (ICNSC)
作者: Wei, Lifei Zhang, Lei Huang, Dongmei Zhang, Kai Shanghai Ocean Univ Coll Informat Technol Shanghai 201306 Peoples R China East China Normal Univ Dept Comp Sci & Technol Shanghai 200241 Peoples R China
Data aggregation is a significant issue for marine wireless sensor networks. However, marine sensors are always deployed far away from the security monitoring. Thus, the secure data aggregation for marine sensor netwo... 详细信息
来源: 评论
PSDAAP: Provably Secure Data Authenticated Aggregation Protocols Using Identity-Based Multi-Signature in Marine WSNs
收藏 引用
SENSORS 2017年 第9期17卷 2117-2117页
作者: Wei, Lifei Zhang, Lei Huang, Dongmei Zhang, Kai Dai, Liang Wu, Guojian Shanghai Ocean Univ Coll Informat Technol Shanghai 201306 Peoples R China East China Normal Univ Dept Comp Sci & Technol Shanghai 200241 Peoples R China
Data authenticated aggregation is always a significant issue for wireless sensor networks (WSNs). The marine sensors are deployed far away from the security monitoring. Secure data aggregation for marine WSNs has emer... 详细信息
来源: 评论
A Modification of the Rabin Cryptosystem Based on Cubic Residues
A Modification of the Rabin Cryptosystem Based on Cubic Resi...
收藏 引用
2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS2017)
作者: Xue-dong DONG Shuo HAN Yun-feng BAI College of Information Engineering Dalian University
In the Rabin cryptosystem there are four different decryption results for each ciphertext. Thus, extra complexity is required on decryption to identify which of the four possible decryption results is the true plainte... 详细信息
来源: 评论
Erasing Logic-Memory Boundaries in Superconductor Electronics
Erasing Logic-Memory Boundaries in Superconductor Electronic...
收藏 引用
IEEE International Conference on Rebooting Computing (ICRC)
作者: Semenov, Vasili K. SUNY Stony Brook Dept Phys & Astron Stony Brook NY 11794 USA
Superconductor electronics holds records for clock frequency and energy efficiency at the chip level, and is also projected to large systems that can absorb the cooling overhead. These advantages have nevertheless onl... 详细信息
来源: 评论
An UF-IBSS-CMA Protected Online/Offline Identity-based Short Signature Technique using PDL
An UF-IBSS-CMA Protected Online/Offline Identity-based Short...
收藏 引用
6th International Conference on Advances in Computing and Communications (ICACC)
作者: Meshram, Chandrashekhar Y. Powar, P. L. Obaidat, Mohammad S. Rani Durgavati Univ Dept Math & Comp Sci Jabalpur MP India Fordham Univ Dept Comp & Informat Sci Bronx NY 10458 USA
In this article, we present an online/offline identity-based short signature scheme using partial discrete logarithm (PDL). It is secure under unforgeability of identity-based short signature (IBSS) under chosen messa... 详细信息
来源: 评论