Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Algorithms for quantum computation: discrete logarithms and factoring
PW Shor - … 35th annual symposium on foundations of computer …, 1994 - ieeexplore.ieee.org
A computer is generally considered to be a universal computational device; ie, it is believed
able to simulate any physical computational device with a cost in computation time of at most …
able to simulate any physical computational device with a cost in computation time of at most …
[BOOK][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
[BOOK][B] Prime numbers: a computational perspective
RE Crandall, C Pomerance - 2005 - Springer
In this volume we have endeavored to provide a middle ground-hopefully even a bridge-
between" theory" and" experiment" in the matter of prime numbers. Of course, we speak of …
between" theory" and" experiment" in the matter of prime numbers. Of course, we speak of …
[BOOK][B] A computational introduction to number theory and algebra
V Shoup - 2009 - books.google.com
This introductory book emphasizes algorithms and applications, such as cryptography and
error correcting codes, and is accessible to a broad audience. The presentation alternates …
error correcting codes, and is accessible to a broad audience. The presentation alternates …
[BOOK][B] Elliptic curve public key cryptosystems
AJ Menezes - 1993 - books.google.com
Elliptic curves have been intensively studied in algebraic geometry and number theory. In
recent years they have been used in devising efficient algorithms for factoring integers and …
recent years they have been used in devising efficient algorithms for factoring integers and …
[BOOK][B] The development of the number field sieve
AK Lenstra, HW Lenstra - 1993 - books.google.com
The number field sieve is an algorithm for finding the prime factors of large integers. It
depends on algebraic number theory. Proposed by John Pollard in 1988, the method was …
depends on algebraic number theory. Proposed by John Pollard in 1988, the method was …
[BOOK][B] Mathematics of public key cryptography
SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …
applications, such as digital signatures. A strong background in the mathematics underlying …
[BOOK][B] Introduction to cryptography
J Buchmann, J Buchamann - 2004 - Springer
Cryptography is a key technology in electronic key systems. It is used to keep data secret,
digitally sign documents, access control, and so forth. Users therefore should not only know …
digitally sign documents, access control, and so forth. Users therefore should not only know …
Integer factoring
AK Lenstra - Towards a Quarter-Century of Public Key Cryptography …, 2000 - Springer
i& Page 1 i& Designs, Codes and Cryptography, 19, 101-128 (2000) •"'Il © 2000 Kluwer
Academic Publishers, Boston. Integer Factoring ARJEN K. LENSTRA arjen.lenstra@citicorp.com …
Academic Publishers, Boston. Integer Factoring ARJEN K. LENSTRA arjen.lenstra@citicorp.com …
[PDF][PDF] The number field sieve
The number field sieve is an algorithm to factor integers of the form r, 4-s for small positive r
and s. This note is intended as a'report on work in progress' on this algorithm. We informally …
and s. This note is intended as a'report on work in progress' on this algorithm. We informally …