A Study on Parallel RSA Factorization
暂无分享,去创建一个
Yu-Hao Chang | Han-Yu Lin | Yi-Shiung Yeh | Ting-Yu Huang | Y. Yeh | Han-Yu Lin | Ting-Yu Huang | Yu-Hao Chang
[1] Jim Hefferon,et al. Linear Algebra , 2012 .
[2] Jeffrey C. Lagarias,et al. Cryptology and Computational Number Theory , 1997 .
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] J. M. Pollard,et al. Theorems on factorization and primality testing , 1974, Mathematical Proceedings of the Cambridge Philosophical Society.
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Ramanujachary Kumanduri,et al. Number theory with computer applications , 1997 .
[7] Stephen H. Friedberg,et al. Linear Algebra , 2018, Computational Mathematics with SageMath.
[8] Robert D. Silverman. The multiple polynomial quadratic sieve , 1987 .
[9] Carl Pomerance,et al. The Development of the Number Field Sieve , 1994 .
[10] J. Dixon. Asymptotically fast factorization of integers , 1981 .
[11] H. Riesel. Prime numbers and computer methods for factorization , 1985 .
[12] Carl Pomerance,et al. The Quadratic Sieve Factoring Algorithm , 1985, EUROCRYPT.
[13] O. Bretscher. Linear Algebra with Applications , 1996 .
[14] A. K. Lenstra,et al. The Development of the Number Field Sieve , 1993 .
[15] William M. Springer. Review of Cryptography: theory and practice, second edition by Douglas R. Stinson. CRC Press. , 2003, SIGA.
[16] Peter L. Montgomery,et al. A Block Lanczos Algorithm for Finding Dependencies Over GF(2) , 1995, EUROCRYPT.
[17] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[18] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[19] H. Riesel. Prime numbers and computer methods for factorization (2nd ed.) , 1994 .