Notes in Computer Science 1807

نویسندگان

  • J. van Leeuwen
  • Bart Preneel
  • Jan van Leeuwen
چکیده

This paper reports on the factorization of the 512–bit number RSA–155 by the Number Field Sieve factoring method (NFS) and discusses the implications for RSA.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unified band-theoretic description of structural, electronic, and magnetic properties of vanadium dioxide phases

Sheng Xu,1,2 Xiao Shen,2,3 Kent A. Hallman,2 Richard F. Haglund Jr.,2 and Sokrates T. Pantelides2,4,* 1School of Metallurgy and Materials Engineering, Jiangsu University of Science and Technology, Zhangjiagang, Jiangsu 215600, China 2Department of Physics and Astronomy, Vanderbilt University, Nashville, Tennessee 37235-1807, USA 3Department of Physics and Materials Science, University of Memphi...

متن کامل

Tv and or Fm Transmitting Antennas Desien Using Computer Graphic System (RESEARCH NOTES)

The purpose of this paper is three fold. First, the major theoretical pattern relationships of TV and/or FM transmitting antennas are dealt with. Secend, the computer calculation method and designing of such patterns using the given relationships. And third, a method in which a computer graphic system can be used to design such antennas for a specific pattern is introduced and its results are p...

متن کامل

Some notes concerning the convergence control parameter in homotopy analysis method

omotopy analysis method (HAM) is a promising method for handling func-tional equations. Recent publications proved the eectiveness of HAM in solvingwide variety of problems in dierent elds. HAM has a unique property whichmakes it superior to other analytic methods, this property is its ability to con-trol the convergence region of the solution series. In this work, we claried theadvantages and ...

متن کامل

One-way Trapdoor Permutations Are Su cient for Non-Trivial Single-Server Private Information Retrieval

We show that general one-way trapdoor permutations are su cient to privately retrieve an entry from a database of size n with total communication complexity strictly less than n. More speci cally, we present a protocol in which the user sends O(K) bits and the server sends n cn K bits (for any constant c), where K is the security parameter of the trapdoor permutations. Thus, for su ciently larg...

متن کامل

Evidence of the Potential Shift Mechanism in Crevice Corrosion (RESEARCH NOTES)

Previous research has indicated a qualitative resemblance between the current distribution along actively corroding crevice walls and currents measured in corresponding anodic polarization plots. Using detailed measurements of the potential gradient along the crevice, a semi-quantitative current distribution was calculated for the crevice wall using a double numerical differentiation method. Th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009