The quadratic sieve factoring algorithm
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Factoring numbers using singular integers
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
Handbook of theoretical computer science (vol. A)
Solving homogeneous linear equations over GF(2) via block Wiedemann algorithm
Mathematics of Computation
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Journal of Symbolic Computation - Computer algebra: Selected papers from ISSAC 2001
A World Wide Number Field Sieve Factoring Record: On to 512 Bits
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Lattice sieving and trial division
ANTS-I Proceedings of the First International Symposium on Algorithmic Number Theory
Modelling the Yield of Number Field Sieve Polynominals
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
A Montgomery-Like Square Root for the Number Field Sieve
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
Strategies in Filtering in the Number Field Sieve
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Factorization of a 512-bit RSA modulus
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
A kilobit special number field sieve factorization
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Cryptography for network security: failures, successes and challenges
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Cryptanalysis of the RSA subgroup assumption from TCC 2005
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
On the Effect of Quantum Interaction Distance on Quantum Addition Circuits
ACM Journal on Emerging Technologies in Computing Systems (JETC)
GeoEnc: geometric area based keys and policies in functional encryption systems
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Smaller decoding exponents: ball-collision decoding
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Iterative sparse Matrix-Vector multiplication for integer factorization on GPUs
Euro-Par'11 Proceedings of the 17th international conference on Parallel processing - Volume Part II
Investigating the openPGP web of trust
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Improving MPI applications performance on multicore clusters with rank reordering
EuroMPI'11 Proceedings of the 18th European MPI Users' Group conference on Recent advances in the message passing interface
Long-term confidentiality of PKI
Communications of the ACM
The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
The set of solutions of random XORSAT formulae
Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete Algorithms
Non-linear polynomial selection for the number field sieve
Journal of Symbolic Computation
A heterogeneous computing environment to solve the 768-bit RSA challenge
Cluster Computing
International Journal of Applied Cryptography
International Journal of Applied Cryptography
Key length estimation of pairing-based cryptosystems using ηT pairing
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
A tutorial on high performance computing applied to cryptanalysis
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Square root algorithms for the number field sieve
WAIFI'12 Proceedings of the 4th international conference on Arithmetic of Finite Fields
Mining your Ps and Qs: detection of widespread weak keys in network devices
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Solving quadratic equations with XL on parallel architectures
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
On the strength comparison of the ECDLP and the IFP
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Breaking pairing-based cryptosystems using ηT pairing over GF(397)
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Approximately counting semismooth integers
Proceedings of the 38th international symposium on International symposium on symbolic and algebraic computation
Analysis of the HTTPS certificate ecosystem
Proceedings of the 2013 conference on Internet measurement conference
Fully automated analysis of padding-based encryption in the computational model
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.02 |
This paper reports on the factorization of the 768-bit number RSA-768 by the number field sieve factoring method and discusses some implications for RSA.