Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   3  
      Computational ComplexityInteger FactorizationGraph Isomorphism
Brizolis asked the question: does every prime p have a pair (g,h) such that h is a fixed point for the discrete logarithm with base g? The first author previously extended this question to ask about not only fixed points but also... more
    • by 
    •   20  
      MathematicsApplied MathematicsCoding TheoryQuantum Mechanics
    • by  and +1
    •   7  
      Quantum PhysicsQuantum error correctionQuantum ComputerQuantum Dot
Fattorizzazione wg
    • by 
    •   5  
      MathematicsCryptographyNumbertheoryRSA ALGORITHM
Integer Factorization
    • by 
    •   6  
      MathematicsNumber TheoryCryptographyRSA ALGORITHM
    • by 
    •   3  
      Computational ComplexityInteger FactorizationGraph Isomorphism
Lepore factorization nr 105 Bruteforce
    • by 
    •   5  
      MathematicsNumber TheoryCryptographyRSA ALGORITHM
8888 Bruteforce RSA (draft)
integer factorization
    • by 
    •   3  
      CryptographyRSA ALGORITHMInteger Factorization
A more extended version of the original document. Hopefully can guide, inform and inspire others to pursue solutions to the Integer Factorisation Problem to greater heights than just the foothills which this document represents. No mean... more
    • by 
    •   2  
      Integer FactorizationInteger Factorisation
17° Test di primalità e fattorizzazione di Lepore - Algoritmo di Natale
    • by 
    •   10  
      MathematicsNumber TheoryCryptographyMatematica
Although, Integer Factorization is one of the hard problems to break RSA, many factoring techniques are still developed. Fermat's Factorization Algorithm (FFA) which has very high performance when prime factors are close to each other is... more
    • by  and +1
    •   6  
      CryptographyInteger FactorizationComputation loops Euler’s theorem
We study the complexity of the isomorphism and automorphism problems for finite rings. We show that both integer factorization and graph isomorphism reduce to the problem of counting automorphisms of a ring. This counting problem is shown... more
    • by 
    •   6  
      Cognitive ScienceComputational ComplexityRingIsomorphism
    • by 
    •   5  
      Applied MathematicsNumerical Analysis and Computational MathematicsElliptic Curve CryptographyInteger Factorization
13° Primality test and factorization of Lepore
    • by 
    •   6  
      MathematicsNumber TheoryCriptographyRSA ALGORITHM
integer factorization
    • by 
    •   5  
      MathematicsCryptographyComputational MathematicsRSA ALGORITHM
Based off of Fermat's Last Theorem, a man named Andrew Beal developed a modified version of this theorem. We had to prove or disprove that for natural numbers a, b and c that have a common prime factor, the natural number exponents must... more
    • by 
    •   53  
      MathematicsNumber TheoryAnalytic Number TheoryAlgebraic Number Theory
    • by 
    •   7  
      Computational ComplexityQuantum MechanicsQuantum CryptographyQuantum Computer
    • by 
    •   5  
      Public key cryptographyInteger FactorizationKey ExchangeDiscrete Logarithm
    • by 
    •   3  
      AlgorithmicsElliptic Curve CryptographyInteger Factorization
    • by 
    •   7  
      Computer ScienceIEEEPublic key cryptographyInteger Factorization
5° Fattorizzazione di Lepore
    • by 
    •   6  
      MathematicsNumber TheoryCyber SecurityRSA ALGORITHM
    • by 
    •   9  
      Air QualityRemote SensingData AssimilationOPERATING SYSTEM
Integer Factorization
    • by 
    •   3  
      MathematicsNumber TheoryInteger Factorization
Abstract: The paper proposes artificial intelligence technique called hill climbing to find numerical solutions of Diophantine Equations. Such equations are important as they have many applications in fields like public key cryptography,... more
    • by 
    •   4  
      Public key cryptographyInteger FactorizationHill ClimbingDiophantine Equation
    • by 
    •   4  
      Network SecurityProxy SignatureInteger FactorizationDiscrete Logarithm
    • by 
    •   7  
      Quantum PhysicsQuantum error correctionQuantum ComputerQuantum Dot
    • by  and +1
    • Integer Factorization
We present an excerpt of the document “Quantum Information Processing and Communication: Strategic report on current status, visions and goals for research in Europe”, which has been recently published in electronic form at the website of... more
    • by 
    •   20  
      Quantum PhysicsOntologyInformation TheoryInformation Society
The paper uses Prime Generators to create progressively faster integer primality tests in Ruby. The Ruby standard library file prime.rb contains the class Integer methods prime? and prime_division (for factorization). I present here... more
    • by 
    •   5  
      Number TheoryComputational Number TheoryDistribution of Prime NumbersInteger Factorization
In this paper, a secure and efficient protocol for vehicular ad hoc networks has been proposed that ensures both message authentication and privacy preservation. As safety related message may contain life critical information, it is a... more
    • by 
    •   21  
      Road safetySecurity and PrivacyData PrivacyBandwidth Allocation
This paper presents a technique for clock multiplication without local oscillators. This technique uses a DLL, thus presenting lower jitter than traditional PLL-based oscillator systems. Furthermore, it provides directly 50% duty-cycle... more
    • by 
    •   7  
      TelecommunicationsOscillationsJitterInteger Factorization
    • by 
    • Integer Factorization
    • by 
    •   7  
      Computer ScienceIEEEPublic key cryptographyInteger Factorization
    • by 
    •   3  
      Integer FactorizationIscaDiscrete Logarithm Problem
Though prime number distribution exhibits randomness across the infinite natural number series, this paper demonstrates the same is not true of prime factor distribution. It shows there are defined rules guiding prime factor behavior by... more
    • by 
    •   3  
      Number TheoryPrime NumbersInteger Factorization
Fattorizzazione RSA in 4*O(log n)
    • by 
    •   6  
      MathematicsCybersecurityNumbertheoryRSA ALGORITHM
    • by 
    •   4  
      Information SecurityParallel AlgorithmInteger FactorizationPublic Key Cryptosystem
    • by 
    •   7  
      Quantum ComputerPublic key cryptographyDecodingRandom Oracle Model
Security in digital transmission is an increasingly interesting topic in a number of fields. In many cases however, the need for security is forfeited due to the high complexity of commonly used cryptosystems. The use of the... more
    • by 
    •   10  
      Number TheoryIndependent Component AnalysisSpeech CommunicationBlind Source Separation
Last factorization of Lepore
    • by 
    •   5  
      MathematicsNumber TheoryCryptographyPrimes
Fattorizzazione di Lepore
    • by 
    •   4  
      MathematicsNumber TheoryRSA ALGORITHMInteger Factorization
Recently, global biomass-burning research has grown from what was primarily a climate field to include a vibrant air quality observation and forecasting community. While new fire monitoring systems are based on fundamental Earth Systems... more
    • by 
    •   9  
      Air QualityRemote SensingData AssimilationOPERATING SYSTEM
    • by 
    •   9  
      EngineeringTechnologySignal ProcessingComputational Complexity
Integer factorization problem, which is used as the basis in many public key cryptosystem, is generally thought to be hard problem even on a modern computers. In this work we implement 4 integer factorization algorithms using GMP library... more
    • by 
    •   3  
      AlgorithmFactorizationInteger Factorization
    • by 
    •   2  
      Integer FactorizationRSA Cryptosystem
    • by 
    •   13  
      Number TheoryHigh Performance ComputingIntelligent ManufacturingMathematical Sciences
    • by 
    •   4  
      Information SecurityParallel AlgorithmInteger FactorizationPublic Key Cryptosystem
    • by 
    • Integer Factorization
    • by 
    •   14  
      MathematicsComputer ScienceCodingPublic key cryptography
The security on many public key encryption schemes relied on the intractability of finding the integer factoring problem such as RSA scheme. However, there are great deals of researches related to the RSA factoring modulus compared with... more
    • by 
    •   4  
      Public key cryptographyInteger FactorizationPublic Key EncryptionPublic Key