FIS 发表于 2025-3-26 23:15:10

https://doi.org/10.1007/978-3-476-04170-8licability of the Dickman function as an approximation for the number of smooth polynomials, which provides precise estimates for the discrete logarithm problem. In addition, we characterize the distribution of the two largest degrees of irreducible factors, a problem relevant to polynomial factoriz

Leisureliness 发表于 2025-3-27 01:18:02

https://doi.org/10.1007/978-3-476-04170-8. is publicly known, but neither party knows the factorization of .. Our protocols require the design of a new type of distributed primality test for testing that a given number is a product of three primes. We explain the cryptographic motivation and origin of this problem.

思乡病 发表于 2025-3-27 07:08:53

http://reply.papertrans.cn/16/1531/153003/153003_33.png

OVERT 发表于 2025-3-27 09:25:50

http://reply.papertrans.cn/16/1531/153003/153003_34.png

和谐 发表于 2025-3-27 14:10:12

Die Finanzierung der Unternehmung,The Decision Diffie-Hellman assumption (.) is a gold mine. It enables one to construct efficient cryptographic systems with strong security properties. In this paper we survey the recent applications of DDH as well as known results regarding its security. We describe some open problems in this area.

谈判 发表于 2025-3-27 17:53:36

http://reply.papertrans.cn/16/1531/153003/153003_36.png

无法治愈 发表于 2025-3-27 23:58:22

Ursula M. Costa M. A. (OT), PhD.This paper describes a sieving algorithm which in a cached memory environment may be superior to familiar “cross out bits” versions of the sieve of Eratosthenes. The algorithm also seems to show some advantages over “classical” versions of the sieve of Eratosthenes when adapted to the problem of factoring numbers in an interval.

放气 发表于 2025-3-28 04:43:06

The Decision Diffie-Hellman problem,The Decision Diffie-Hellman assumption (.) is a gold mine. It enables one to construct efficient cryptographic systems with strong security properties. In this paper we survey the recent applications of DDH as well as known results regarding its security. We describe some open problems in this area.

catagen 发表于 2025-3-28 06:58:52

http://reply.papertrans.cn/16/1531/153003/153003_39.png

最小 发表于 2025-3-28 13:17:04

http://reply.papertrans.cn/16/1531/153003/153003_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Algorithmic Number Theory; Third International Joe P. Buhler Conference proceedings 1998 Springer-Verlag Berlin Heidelberg 1998 Analysis.P