Skip to search formSkip to main contentSkip to account menu

Integer factorization

Known as: Factoring integers, Prime factorization algorithm, Prime decomposition 
In number theory, integer factorization is the decomposition of a composite number into a product of smaller integers. If these integers are further… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
In recent years there have been many successes of using deep representations in reinforcement learning. Still, many of these… 
Review
2007
Review
2007
Preface I. Introduction and Classical Cryptography Introduction Cryptography and Modern Cryptography The Setting of Private-Key… 
Highly Cited
2002
Highly Cited
2002
Abstract A computationally efficient relocatable system for generalized inverse (GI) modeling of barotropic ocean tides is… 
Highly Cited
1999
Highly Cited
1999
  • P. Shor
  • SIAM Review
  • 1999
  • Corpus ID: 2337707
A digital computer is generally believed to be an efficient universal computing device; that is, it is believed to be able to… 
Highly Cited
1994
Highly Cited
1994
  • P. Shor
  • Proceedings 35th Annual Symposium on Foundations…
  • 1994
  • Corpus ID: 15291489
A computer is generally considered to be a universal computational device; i.e., it is believed able to simulate any physical… 
Review
1993
Review
1993
  • H. Cohen
  • Graduate texts in mathematics
  • 1993
  • Corpus ID: 118037646
A description of 148 algorithms fundamental to number-theoretic computations, in particular for computations related to algebraic… 
Highly Cited
1986
Highly Cited
1986
  • A. FiatA. Shamir
  • Annual International Cryptology Conference
  • 1986
  • Corpus ID: 4838652
In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the… 
Highly Cited
1984
Highly Cited
1984
  • Taher El Gamal
  • IEEE Transactions on Information Theory
  • 1984
  • Corpus ID: 2973271
-A new signature scheme is proposed, together with an imple- mentation of the Diffie-Hellman key distribution scheme that… 
Highly Cited
1983
Highly Cited
1983
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… 
Highly Cited
1978
Highly Cited
1978
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the…