A monte carlo method for factorization

From MaRDI portal
Revision as of 05:05, 6 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4071300

DOI10.1007/BF01933667zbMath0312.10006WikidataQ55953264 ScholiaQ55953264MaRDI QIDQ4071300

J. M. Pollard

Publication date: 1975

Published in: BIT (Search for Journal in Brave)




Related Items (80)

Combinatorial cycles of a polynomial map over a commutative fieldModern factorization methodsFactoring multi-power RSA moduli with primes sharing least or most significant bitsProvable time-memory trade-offs: symmetric cryptography against memory-bounded adversariesImproving Implementable Meet-in-the-Middle Attacks by Orders of MagnitudeDiscrete logarithms in \(\mathrm{GF}(p)\)A Search for Large Twin Prime PairsFactoring RSA moduli with primes sharing bits in the middleOn multidimensional Diophantine approximation of algebraic numbersFiat-Shamir and correlation intractability from strong KDM-secure encryptionCycle detection using a stackOn methods of shortening ElGamal-type signaturesIs the data encryption standard a group? (Results of cycling experiments on DES)Cycle structure of iterating Rédei functionsA probabilistic heuristic for counting components of functional graphs of polynomials over finite fieldsImproved algorithm for the isogeny problem for ordinary elliptic curvesPeriodic points of polynomials over finite fieldsDynamically distinguishing polynomialsTime-Memory Trade-Offs for Near-CollisionsAccelerating Iterative SpMV for the Discrete Logarithm Problem Using GPUsOn the functional graph of the power map over finite groupsUnnamed ItemIdentity-based encryption in DDH hard groupsPeriods of rational maps modulo primesAn efficient collision detection method for computing discrete logarithms with Pollard's rhoA quantum version of Pollard's Rho of which Shor's algorithm is a particular caseThe number of rational points of hyperelliptic curves over subsets of finite fieldsFine-grained non-interactive key-exchange: constructions and lower bounds\textsc{Rings}: an efficient Java/Scala library for polynomial ringsGeometrically nilpotent subvarietiesFactorization of the Eighth Fermat NumberSpeeding up elliptic curve discrete logarithm computations with point halvingITERATION OF QUADRATIC POLYNOMIALS OVER FINITE FIELDSFactoring multi power RSA moduli with a class of secret exponentsDiscrete logarithm based additively homomorphic encryption and secure data aggregationPrime factorization using square root approximationNew Techniques for Cryptanalysis of Hash Functions and Improved Attacks on SnefruOn random walks for Pollard's rho methodThe influence of computers in the development of number theoryOn the iteration of certain quadratic maps over GF(\(p\)).Modifikationen des Pollard-AlgorithmusThe graph structure of Chebyshev polynomials over finite fields and applicationsThe functional graph of linear maps over finite fields and applicationsA low-memory algorithm for finding short product representations in finite groups.Cycle detection algorithms and their applicationsA birthday paradox for Markov chains with an optimal bound for collision in the Pollard rho algorithm for discrete logarithmA natural lattice basis problem with applicationsFactoring: algorithms, computations, and computersOn not storing the path of a random walkSome remarks concerning the M.I.T. public-key cryptosystemOn computing ord\(_{N}(2)\) and its applicationFinding strong pseudoprimes to several bases. IIA limit theorem for the six-length of random functional graphs with a fixed degree sequenceAnalysis of a simple factorization algorithmAn improved Monte Carlo factorization algorithmImprovement of FPPR method to solve ECDLPSufficient conditions for factoring a class of large integersLarge-Order Multiple Recursive Generators with Modulus 231 − 1Low weight discrete logarithm and subset sum in \(2^{0.65n}\) with polynomial memoryNon-interactive zero-knowledge in pairing-free groups from weaker assumptionsToward a theory of Pollard's rho methodOn cullen numbersCryptanalysis of RSA Using the Ratio of the PrimesAlgorithm for factoring some RSA and Rabin moduliSequences of numbers generated by addition in formal groups and new primality and factorization testsOn the heuristic of approximating polynomials over finite fields by random mappingsAdversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup ModuliComputing prime divisors in an intervalLower bounds for the cycle detection problemEuler’s constant: Euler’s work and modern developmentsOn the Equivalence of Generic Group ModelsFactorization of the tenth Fermat numberThe memory-tightness of authenticated encryptionFactoring on a computerOn the security of some variants of the RSA signature schemeAn Overview of FactoringPrime Factorization without Using Any ApproximationsPeriods of iterated rational functionsQuantum key search for ternary LWEOn the streaming indistinguishability of a random permutation and a random function




Cites Work




This page was built for publication: A monte carlo method for factorization