Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Integer factorization

Known as: Factoring integers, Prime factorization algorithm, Prime decomposition 
In number theory, integer factorization is the decomposition of a composite number into a product of smaller integers. If these integers are further… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2007
Review
2007
Preface I. Introduction and Classical Cryptography Introduction Cryptography and Modern Cryptography The Setting of Private-Key… Expand
Highly Cited
2002
Highly Cited
2002
Abstract A computationally efficient relocatable system for generalized inverse (GI) modeling of barotropic ocean tides is… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Highly Cited
1999
Highly Cited
1999
  • P. Shor
  • SIAM Rev.
  • 1999
  • Corpus ID: 2337707
A digital computer is generally believed to be an efficient universal computing device; that is, it is believed able to simulate… Expand
  • table 3.1
  • table 3.2
  • figure 5.1
Highly Cited
1999
Highly Cited
1999
A digital computer is generally believed to be an efficient universal computing device; that is, it is believed to be able to… Expand
Highly Cited
1994
Highly Cited
1994
  • P. Shor
  • Proceedings 35th Annual Symposium on Foundations…
  • 1994
  • Corpus ID: 15291489
A computer is generally considered to be a universal computational device; i.e., it is believed able to simulate any physical… Expand
  • figure 1
Review
1993
Review
1993
  • H. Cohen
  • Graduate texts in mathematics
  • 1993
  • Corpus ID: 118037646
A description of 148 algorithms fundamental to number-theoretic computations, in particular for computations related to algebraic… Expand
Highly Cited
1986
Highly Cited
1986
In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the… Expand
  • table 1
Highly Cited
1985
Highly Cited
1985
A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a… Expand
Highly Cited
1983
Highly Cited
1983
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… Expand
Highly Cited
1978
Highly Cited
1978
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… Expand
  • table I