Notes in Computer Science 1807
نویسندگان
چکیده
This paper reports on the factorization of the 512–bit number RSA–155 by the Number Field Sieve factoring method (NFS) and discusses the implications for RSA.
منابع مشابه
Unified band-theoretic description of structural, electronic, and magnetic properties of vanadium dioxide phases
Sheng Xu,1,2 Xiao Shen,2,3 Kent A. Hallman,2 Richard F. Haglund Jr.,2 and Sokrates T. Pantelides2,4,* 1School of Metallurgy and Materials Engineering, Jiangsu University of Science and Technology, Zhangjiagang, Jiangsu 215600, China 2Department of Physics and Astronomy, Vanderbilt University, Nashville, Tennessee 37235-1807, USA 3Department of Physics and Materials Science, University of Memphi...
متن کاملTv and or Fm Transmitting Antennas Desien Using Computer Graphic System (RESEARCH NOTES)
The purpose of this paper is three fold. First, the major theoretical pattern relationships of TV and/or FM transmitting antennas are dealt with. Secend, the computer calculation method and designing of such patterns using the given relationships. And third, a method in which a computer graphic system can be used to design such antennas for a specific pattern is introduced and its results are p...
متن کاملSome notes concerning the convergence control parameter in homotopy analysis method
omotopy analysis method (HAM) is a promising method for handling func-tional equations. Recent publications proved the eectiveness of HAM in solvingwide variety of problems in dierent elds. HAM has a unique property whichmakes it superior to other analytic methods, this property is its ability to con-trol the convergence region of the solution series. In this work, we claried theadvantages and ...
متن کاملOne-way Trapdoor Permutations Are Su cient for Non-Trivial Single-Server Private Information Retrieval
We show that general one-way trapdoor permutations are su cient to privately retrieve an entry from a database of size n with total communication complexity strictly less than n. More speci cally, we present a protocol in which the user sends O(K) bits and the server sends n cn K bits (for any constant c), where K is the security parameter of the trapdoor permutations. Thus, for su ciently larg...
متن کاملEvidence of the Potential Shift Mechanism in Crevice Corrosion (RESEARCH NOTES)
Previous research has indicated a qualitative resemblance between the current distribution along actively corroding crevice walls and currents measured in corresponding anodic polarization plots. Using detailed measurements of the potential gradient along the crevice, a semi-quantitative current distribution was calculated for the crevice wall using a double numerical differentiation method. Th...
متن کامل