Results 31 to 40 of about 2,661 (306)
A note on solitary numbers [PDF]
Does 14 have a friend? Until now, this has been an open question. In this note, we prove that a potential friend F of 14 is an odd, non-square positive integer.
Sagar Mandal
doaj +1 more source
Factorization of big integer and the security of RSA
Three kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely ...
Yan-bing REN
doaj +3 more sources
This article proposes a new method to inject backdoors in RSA (the public-key cryptosystem invented by Rivest, Shamir, and Adleman) and other cryptographic primitives based on the integer factorization problem for balanced semi-primes.
Marco Cesati
doaj +1 more source
Mersenne version of Brocard-Ramanujan equation
In this study, we deal with a special form of the Brocard-Ramanujan equation, which is one of the interesting and still open problems of Diophantine analysis.
Ayşe Nalli, Seyran İbrahimov
doaj +1 more source
Conjugacy Systems Based on Nonabelian Factorization Problems and Their Applications in Cryptography
To resist known quantum algorithm attacks, several nonabelian algebraic structures mounted upon the stage of modern cryptography. Recently, Baba et al. proposed an important analogy from the integer factorization problem to the factorization problem over
Lize Gu, Shihui Zheng
doaj +1 more source
A factorization formula for power series [PDF]
Given an odd prime p, we give an explicit factorization over the ring of formal power series with integer coefficients for certain reducible polynomials whose constant term is of the form $p^w$ with $w>1$.
Daniel Birmajer +2 more
doaj +1 more source
The authors give conditions under which a rectangular integer matrix has an integer LU-factorization. They use a modified Gaussian elimination to find the LU-factorization and they consider such factorizations for adjacency matrices of trees.
Bevis, Jean H., Hall, Frank J.
openaire +1 more source
RSA is one among the most popular public key cryptographic algorithm for security systems. It is explored in the results that RSA is prone to factorization problem, since it is sharing common modulus and public key exponent.
Raghunandan K. R. +3 more
doaj +1 more source
<p>This report gives a summary of methods for factoring large integers and presents particular factorizations obtained by these methods using the computer facilities at DAIMI.</p><p>We have used trial division, the continued fraction method, Pollard's methods, and various tests for primality to obtain new factorizations of Fibonacci ...
openaire +2 more sources
ABSTRACT Background We describe clinical and biologic characteristics of neuroblastoma in older children, adolescents, and young adults (OCAYA); describe survival outcomes in the post‐immunotherapy era; and identify if there is an age cut‐off that best discriminates outcomes.
Rebecca J. Deyell +14 more
wiley +1 more source

