Algorithms for quantum computation: discrete logarithms and factoring

PW Shor - … 35th annual symposium on foundations of computer …, 1994 - ieeexplore.ieee.org
A computer is generally considered to be a universal computational device; ie, it is believed
able to simulate any physical computational device with a cost in computation time of at most …

[BOOK][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[BOOK][B] Prime numbers: a computational perspective

RE Crandall, C Pomerance - 2005 - Springer
In this volume we have endeavored to provide a middle ground-hopefully even a bridge-
between" theory" and" experiment" in the matter of prime numbers. Of course, we speak of …

[BOOK][B] A computational introduction to number theory and algebra

V Shoup - 2009 - books.google.com
This introductory book emphasizes algorithms and applications, such as cryptography and
error correcting codes, and is accessible to a broad audience. The presentation alternates …

[BOOK][B] Elliptic curve public key cryptosystems

AJ Menezes - 1993 - books.google.com
Elliptic curves have been intensively studied in algebraic geometry and number theory. In
recent years they have been used in devising efficient algorithms for factoring integers and …

[BOOK][B] The development of the number field sieve

AK Lenstra, HW Lenstra - 1993 - books.google.com
The number field sieve is an algorithm for finding the prime factors of large integers. It
depends on algebraic number theory. Proposed by John Pollard in 1988, the method was …

[BOOK][B] Mathematics of public key cryptography

SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …

[BOOK][B] Introduction to cryptography

J Buchmann, J Buchamann - 2004 - Springer
Cryptography is a key technology in electronic key systems. It is used to keep data secret,
digitally sign documents, access control, and so forth. Users therefore should not only know …

Integer factoring

AK Lenstra - Towards a Quarter-Century of Public Key Cryptography …, 2000 - Springer
i& Page 1 i& Designs, Codes and Cryptography, 19, 101-128 (2000) •"'Il © 2000 Kluwer
Academic Publishers, Boston. Integer Factoring ARJEN K. LENSTRA arjen.lenstra@citicorp.com …

[PDF][PDF] The number field sieve

AK Lenstra, HW Lenstra Jr, MS Manasse… - Proceedings of the …, 1990 - dl.acm.org
The number field sieve is an algorithm to factor integers of the form r, 4-s for small positive r
and s. This note is intended as a'report on work in progress' on this algorithm. We informally …