Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,317,613 papers from all fields of science
Search
Sign In
Create Free Account
RSA Factoring Challenge
Known as:
RSA
, RSA challenge
, RSA competition
The RSA Factoring Challenge was a challenge put forward by RSA Laboratories on March 18, 1991 to encourage research into computational number theory…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Brute-force attack
Computational number theory
Cryptography
DES Challenges
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Computing cube root of a positive number
Y. Singh
2016
Corpus ID: 54835762
Proposed here is a new algorithm to compute the cube root of large positive integer. The algorithm is based on the implementation…
Expand
2015
2015
Using Modular Extension to Provably Protect ECC Against Fault Attacks
Pablo Rauzy
,
Martin Moreau
,
S. Guilley
,
Zakaria Najm
2015
Corpus ID: 13924409
Fault injection attacks are a real-world threat to cryptosystems, in particular asymmetric cryptography. In this paper, we focus…
Expand
2008
2008
Cryptanalysis of a Type of CRT-Based RSA Algorithms
Baodong Qin
,
Ming Li
,
Fanyu Kong
Journal of Computational Science and Technology
2008
Corpus ID: 15664155
It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both…
Expand
2007
2007
CS 270 Lecture 20 : Data Encryption Standard ( DES ) Professor Christos Papadimitriou
Joseph D. Darcy
2007
Corpus ID: 236166475
In the early 1970’s, the National Bureau of Standards (NBS), since renamed the National Institute of Standards and Technology…
Expand
2005
2005
Tapping the Matrix : Revisited
Carlos Justiniano
2005
Corpus ID: 17154792
The software infrastructure used on Volunteered Distributed Computing is evolving to meet the diverse needs of researchers. These…
Expand
2004
2004
Factoring pozwala żyć
M. Matusiak
2004
Corpus ID: 166505401
2002
2002
Implementing the Hypercube Quadriatic Sieve with Two Large Primes
Brian Carrier
2002
Corpus ID: 15481567
This paper deals with variations of the Quadratic Sieve integer factoring algorithm. We describe what we believe is the rst…
Expand
Review
2002
Review
2002
Private and Public Security in the RSA: Competition or Co-Operation?
M. Hough
2002
Corpus ID: 159068447
ABSTRACT This article focuses on the increasing role of the private security industry in combating crime, with specific reference…
Expand
1999
1999
On the Security of CS-Cipher
Serge Vaudenay
Fast Software Encryption Workshop
1999
Corpus ID: 268109196
CS-Cipher is a block cipher which has been proposed at FSE 1998. It is a Markov cipher in which diffusion is performed by…
Expand
1995
1995
1995 East Coast Computer Algebra Day Abstracts
R. Grossman
SIGS
1995
Corpus ID: 13038301
I will give an introduction to the Galois theory of linear difference equations and discuss aspects related to the the algebraic…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE