Integer factorization algorithms

Results: 208



#Item
51CS255: Cryptography and Computer Security  Winter 2003 Basic number theory fact sheet Part II: Arithmetic modulo composites

CS255: Cryptography and Computer Security Winter 2003 Basic number theory fact sheet Part II: Arithmetic modulo composites

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-10 15:18:01
52Solutions to Homework Three  CSE[removed]a) Each time you roll a die, the chance of getting a six is p = 1/6. So the expected number of rolls until you see a six is 1/p = 6.

Solutions to Homework Three CSE[removed]a) Each time you roll a die, the chance of getting a six is p = 1/6. So the expected number of rolls until you see a six is 1/p = 6.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-10-17 13:59:47
53THE ELLIPTIC CURVE METHOD PAUL ZIMMERMANN The Elliptic Curve Method (ECM for short) was invented in 1985 by H. W. Lenstra, Jr[removed]It is suited to find small — say 9 to 30 digits — prime factors of large numbers. Am

THE ELLIPTIC CURVE METHOD PAUL ZIMMERMANN The Elliptic Curve Method (ECM for short) was invented in 1985 by H. W. Lenstra, Jr[removed]It is suited to find small — say 9 to 30 digits — prime factors of large numbers. Am

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2004-09-06 05:03:02
54Factorization of a 768-bit RSA modulus version 1.4, February 18, 2010 Thorsten Kleinjung1 , Kazumaro Jens Franke3 , Arjen K. Lenstra1 , Emmanuel Thomé4 ,

Factorization of a 768-bit RSA modulus version 1.4, February 18, 2010 Thorsten Kleinjung1 , Kazumaro Jens Franke3 , Arjen K. Lenstra1 , Emmanuel Thomé4 ,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-02-18 11:19:25
55Homework Two, for Fri[removed]CSE 101 When specifying an algorithm, please use pseudocode that is simple and unambiguous. Always justify the correctness and running time of the algorithm, unless these are obvious.

Homework Two, for Fri[removed]CSE 101 When specifying an algorithm, please use pseudocode that is simple and unambiguous. Always justify the correctness and running time of the algorithm, unless these are obvious.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-10-12 01:34:34
56.  Accurate and efficient expression evaluation and linear algebra  James Demmel

. Accurate and efficient expression evaluation and linear algebra James Demmel

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2010-09-24 20:40:19
57Solutions to Homework Two  CSE[removed]A 1000-bit number lies between 2999 and 21000 − 1; thus its length in decimal is roughly log10 21000 = 1000 log10 2 ≈ 300.

Solutions to Homework Two CSE[removed]A 1000-bit number lies between 2999 and 21000 − 1; thus its length in decimal is roughly log10 21000 = 1000 log10 2 ≈ 300.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-10-12 01:34:36
58Cryptography and Computer Security  CS255 Basic number theory fact sheet Part II: Arithmetic modulo composites

Cryptography and Computer Security CS255 Basic number theory fact sheet Part II: Arithmetic modulo composites

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-01-03 18:17:27
59T3.TG.17.Numberelationships

T3.TG.17.Numberelationships

Add to Reading List

Source URL: www.smpmaths.org.uk

Language: English - Date: 2009-01-20 04:04:02
60Fast arithmetic and pairing evaluation on genus 2 curves David Freeman University of California, Berkeley [removed] November 6, 2005

Fast arithmetic and pairing evaluation on genus 2 curves David Freeman University of California, Berkeley [removed] November 6, 2005

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2008-06-06 19:27:47