Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,495,914 papers from all fields of science
Search
Sign In
Create Free Account
RSA numbers
Known as:
RSA-470
, RSA-360
, RSA-250
Expand
In mathematics, the RSA numbers are a set of large semiprimes (numbers with exactly two prime factors) that are part of the RSA Factoring Challenge…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Arjen Lenstra
Burt Kaliski
Central processing unit
Computational number theory
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Mobile Identity Construction by Male and Female Students in Pakistan: On, In, and Through the Phone
Bushra Hassan
,
T. Unwin
2017
Corpus ID: 56466765
This article reports on focus group research in Pakistan about the symbolic value and use of mobile phones by students in…
Expand
2016
2016
A Hybrid Multilevel Security Scheme using DNA Computing based Color Code and Elliptic Curve Cryptography
P. Vijayakumar
,
S. Indupriya
,
R. Rajashree
2016
Corpus ID: 61636683
Background/Objectives: The terrorism threat caused by terrorist who posses forged passport and identities due to insecure…
Expand
2013
2013
Taş Kemer Köprülerin Deprem Davranışlarının Değerlendirilmesi: Timisvat Köprüsü Örneği
K. A. Korkmaz
,
Pınar Zabin
,
A. I. Çarhoğlu
,
Ayhan Nuhoğlu
2013
Corpus ID: 59441114
Turkiye'de yaygin olarak gorulen Osmanli donemi tas kemer kopruleri, kulturel tarihimizde onemli bir yere sahiptir. Bu tarihi…
Expand
2011
2011
The rs 8099917 Polymorphism , When Determined by a Suitable Genotyping Method , Is a Better Predictor for Response to Pegylated Alpha Interferon / Ribavirin Therapy in Japanese Patients than Other…
Kiyoaki Ito
,
Katsuya Higami
,
+16 authors
M. Mizokami
2011
Corpus ID: 39911988
The rs8099917 Polymorphism, When Determined by a Suitable Genotyping Method, Is a Better Predictor for Response to Pegylated…
Expand
2009
2009
Research on NTRU Algorithm for Mobile Java Security
Xiaoyu Shen
,
Zhenjun Du
,
Rong Chen
International Conference on Scalable Computing…
2009
Corpus ID: 17249990
Traditionally, it has been difficult to deploy mobile Java security in mass market mobile devices primarily due to size and speed…
Expand
2006
2006
How to fit cryptographic e-voting into smart cards
Sébastien Canard
2006
Corpus ID: 12138973
The complexity of voting procedures make it challenging to design a secure electronic voting system. In many proposals, the…
Expand
2003
2003
Aoki Bunkyou (1886—1956):a Student Studying in China dispatched by Japanese Nishi Honganji
Li Li
2003
Corpus ID: 163368245
Aoki bunkyou (1886—1956) was a Japanese famous researcher of Tibetanology.He went to Kyōto Municipal Middle School in his early…
Expand
2001
2001
Two-Way Interconnection with Partial Consumer Participation
A. Schiff
2001
Corpus ID: 55587173
This paper incorporates partial consumer participation in a model of competition between telecommunications networks with two-way…
Expand
1996
1996
Duelling aphids: intraspecific fighting in Astegopteryx minuta (Homoptera: Hormaphididae)
W. Foster
Animal Behaviour
1996
Corpus ID: 53179522
Abstract The function and consequences of fighting behaviour in the horned aphid Astegopteryx minuta were investigated…
Expand
Review
1996
Review
1996
A review of the genus Hexachaetoniella Paschoal in Australia (Acarina: Cryptostigmata: Pedrocortesellidae)
G. Hunt
1996
Corpus ID: 87483144
The paper reviews the genus Hexachaetoniella Paschoal in Australia and a rediagnosis is given for the genus. One new combination…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE