Integer factoring

AK Lenstra - Towards a Quarter-Century of Public Key Cryptography …, 2000 - Springer
i& Page 1 i& Designs, Codes and Cryptography, 19, 101-128 (2000) •"'Il © 2000 Kluwer
Academic Publishers, Boston. Integer Factoring ARJEN K. LENSTRA arjen.lenstra@citicorp.com …

[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[图书][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

A secure and optimally efficient multi‐authority election scheme

R Cramer, R Gennaro… - European transactions on …, 1997 - Wiley Online Library
In this paper we present a new multi‐authority secret‐ballot election scheme that guarantees
privacy, universal veriability, and robustness. It is the first scheme for which the performance …

Twenty years of attacks on the RSA cryptosystem

D Boneh - Notices of the AMS, 1999 - ams.org
The RSA cryptosystem, invented by Ron Rivest, Adi Shamir, and Len Adleman [18], was first
publicized in the August 1977 issue of Scientific American. The cryptosystem is most …

Factorization of a 768-bit RSA modulus

T Kleinjung, K Aoki, J Franke, AK Lenstra… - Advances in Cryptology …, 2010 - Springer
Factorization of a 768-Bit RSA Modulus Page 1 Factorization of a 768-Bit RSA Modulus
Thorsten Kleinjung 1 , Kazumaro Aoki 2 , Jens Franke 3 , Arjen K. Lenstra 1 , Emmanuel …

[图书][B] Introduction to cryptography

J Buchmann - 2004 - Springer
Cryptography is a key technology in electronic key systems. It is used to keep data secret,
digitally sign documents, access control, and so forth. Users therefore should not only know …

[图书][B] Elliptic curve public key cryptosystems

AJ Menezes - 1993 - books.google.com
Elliptic curves have been intensively studied in algebraic geometry and number theory. In
recent years they have been used in devising efficient algorithms for factoring integers and …

[图书][B] An introduction to cryptography

RA Mollin - 2006 - taylorfrancis.com
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides
a solid foundation in cryptographic concepts that features all of the requisite background …

[图书][B] Algorithmics for hard problems: introduction to combinatorial optimization, randomization, approximation, and heuristics

J Hromkovič - 2013 - books.google.com
Algorithmic design, especially for hard problems, is more essential for success in solving
them than any standard improvement of current computer tech nologies. Because of this, the …