搜索结果: 1-15 共查到“军事学 factoring”相关记录34条 . 查询时间(0.078 秒)
Improved Results on Factoring General RSA Moduli with Known Bits
Factorization General RSA moduli Known bits Integer method
font style='font-size:12px;'>
2018/6/25
We revisit the factoring with known bits problem on general RSA moduli in the forms of N=prqsN=prqs for r,s≥1r,s≥1, where two primes pp and qq are of the same bit-size. The relevant moduli are inclusi...
A Certain Family of Subgroups of Zn⋆ Is Weakly Pseudo-Free under the General Integer Factoring Intractability Assumption
families of computational groups weak pseudo-freeness abelian groups
font style='font-size:12px;'>
2017/11/28
A Certain Family of Subgroups of Zn⋆ Is Weakly Pseudo-Free under the General Integer Factoring Intractability Assumption.
General purpose integer factoring
public-key cryptography number theory
font style='font-size:12px;'>
2017/11/13
This article appeared as Chapter 5 of the book "Topics in Computational Number Theory inspired by Peter L. Montgomery", edited by Joppe W. Bos and Arjen K. Lenstra and published by Cambridge Universit...
A low-resource quantum factoring algorithm
post-quantum cryptography factorization
font style='font-size:12px;'>
2017/4/27
In this paper, we present a factoring algorithm that, assuming standard heuristics, uses just (logN)2/3+o(1)(logN)2/3+o(1) qubits to factor an integer NN in time Lq+o(1)Lq+o(1) where L=exp((logN)1/3(l...
Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders
Shor's algorithm factoring
font style='font-size:12px;'>
2017/2/20
Shor's algorithm factors an integer NN in two steps. The quantum step computes the order of amodNamodN where aa is relatively prime to NN. The classical step uses this order to factor NN. Descriptions...
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli
factoring assumption semi-smooth RSA subgroup modulus lossy trapdoor function
font style='font-size:12px;'>
2016/6/6
Lossy trapdoor functions (LTDFs), proposed by Peikert and Waters (STOC'08), are known to have a number of applications in cryptography. They have been constructed based on various assumptions, which i...
On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers
Shor’s factoring algorithm quantum register entanglement
font style='font-size:12px;'>
2016/1/7
Shor’s factoring algorithm uses two quantum registers. By introducing
more registers we show that the measured numbers in these registers which are of the
same pre-measurement state, should be equal...
Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms
Integer Factorization Sieving Multiple-Polynomial Quadratic Sieve Method
font style='font-size:12px;'>
2016/1/4
Many cryptographic protocols derive their security from the apparent
computational intractability of the integer factorization problem. Currently,
the best known integer-factoring algorithms run in ...
Factoring N=p^r q^s for Large r and s
Coppersmith's Algorithm LLL RSA
font style='font-size:12px;'>
2016/1/4
Boneh et al. showed at Crypto 99 that moduli of the form N=p^r q can be factored in polynomial time when r=log p. Their algorithm is based on Coppersmith's technique for finding small roots of polynom...
Factoring RSA moduli with weak prime factors
RSA Cryptanalysis Factorization
font style='font-size:12px;'>
2015/12/31
In this paper, we study the problem of factoring an RSA
modulus N = pq in polynomial time, when p is a weak prime, that is, p
can be expressed as ap = u0 + M1u1 + . . . + Mkuk for some k integers
M...
Factoring as a Service
RSA factoring cloud computing
font style='font-size:12px;'>
2015/12/22
The difficulty of integer factorization is fundamental to modern
cryptographic security using RSA encryption and signatures. Although a
512-bit RSA modulus was first factored in 1999, 512-bit RSA re...
A New Factoring Attack on Multi-Prime RSA with Small Prime Difference
Factoring attack multi-prime RSA small prime difference
font style='font-size:12px;'>
2015/12/21
In this paper, we study the security of multi-prime RSA whose modulus is N = p1p2 · · · pr
for r ≥ 3 with small prime difference of size N
γ
. In ACISP 2013, Zhang and Takagi showed a
Fermat-like ...
Factoring RSA keys from certified smart cards: Coppersmith in the wild
factorization Coppersmith
font style='font-size:12px;'>
2014/3/7
An attacker can efficiently factor at least 184 distinct 1024-bit RSA keys from Taiwan's national "Citizen Digital Certificate" database. The big story here is that these keys were generated by govern...
New Subexponential Algorithms for Factoring in $SL(2,\fq)$
public-key cryptography
font style='font-size:12px;'>
2012/3/22
Cayley hash functions are a particular kind of cryptographic hash functions with very appealing properties. Unfortunately, their security is related to a mathematical problem whose hardness is not ver...
New Subexponential Algorithms for Factoring in $SL(2,\fq)$
public-key cryptography
font style='font-size:12px;'>
2012/3/21
Cayley hash functions are a particular kind of cryptographic hash functions with very appealing properties. Unfortunately, their security is related to a mathematical problem whose hardness is not ver...