Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,254,055 papers from all fields of science
Search
Sign In
Create Free Account
Pollard's p − 1 algorithm
Known as:
P1
, Pollard's p-1 algorithm
, Pollard p-1 Factorization Method
Expand
Pollard's p − 1 algorithm is a number theoretic integer factorization algorithm, invented by John Pollard in 1974. It is a special-purpose algorithm…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Algorithm
Great Internet Mersenne Prime Search
Integer factorization
Lenstra elliptic curve factorization
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
ON DEGENERATE q-BERNOULLI POLYNOMIALS
Taekyun Kim
2016
Corpus ID: 59405224
In this paper, we introduce the degenerate Carlitz q-Bernoulli numbers and polynomials and give some interesting identities and…
Expand
2010
2010
Antimutagenicity and Anti-HSV-2 Activity of Mulberry Tea (Morus rotunbiloba Koidz)
Thipamon Patharakorn
,
S. Talawat
,
A. Promboon
,
N. Wetprasit
,
S. Ratanapo
2010
Corpus ID: 54806239
Hot water extract from mulberry leaves, Morus rotunbiloba Koidz was extracted with diethyl ether, and its components were…
Expand
2007
2007
List circular coloring of trees and cycles
A. Raspaud
,
Xuding Zhu
Journal of Graph Theory
2007
Corpus ID: 16923611
Suppose G=(V, E) is a graph and p ≥ 2q are positive integers. A (p, q)‐coloring of G is a mapping ϕ: V → {0, 1, …, p‐1} such that…
Expand
2007
2007
Improving Social Filtering Techniques Through WordNet-Based User Profiles
P. Lops
,
M. Degemmis
,
G. Semeraro
User Modeling
2007
Corpus ID: 17504789
Collaborative filtering algorithms predict the preferences of a user for an item by weighting the contributions of similarusers…
Expand
2005
2005
Reliability in Single, Double and N2R Ring Network Structures
T. Jørgensen
,
L. Pedersen
,
Jens Myrup Pedersen
2005
Corpus ID: 35412726
— This paper studies the properties of single, double and N2R ring network structures during link errors. The structure of the…
Expand
2004
2004
Stream cipher based on quasigroup string transformations in Zp*
D. Gligoroski
arXiv.org
2004
Corpus ID: 846070
In this paper we design a stream cipher that uses the algebraic structure of the multiplicative group $\bbbz_p^*$ (where p is a…
Expand
2001
2001
Cauchy Problem and Initial Trace for a Doubly Degenerate Parabolic Equation with Strongly Nonlinear Sources
Jing Li
2001
Corpus ID: 121325559
where p > 1 m > 0, m p − 1 > 1, q > 1 N ≥ 1, and u0 ∈ Lloc R . Equation (1.1) has been suggested as a mathematical model for a…
Expand
2001
2001
On the connectivity of generalized p-cycles
I. Pelayo
,
C. Balbuena
,
J. Gómez
Ars Comb.
2001
Corpus ID: 14758165
A generalized p-cycle is a digraph whose set of vertices is partitioned in p parts that are cyclically ordered in such a way that…
Expand
1999
1999
The maximum number of edges in a graph of bounded dimension, with applications to ring theory
G. Agnarsson
,
S. Felsner
,
W. T. Trotter
Discrete Mathematics
1999
Corpus ID: 7699767
1994
1994
Couponing Scheme Reduces Computational Power Requirements for DSS Signatures
David M'Rahi
,
D. Naccache
1994
Corpus ID: 119342486
This paper introduces the new concept of ’use & throw’ DSS authentication coupons. An authentication coupon is a couple of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE