Results 1  10
of
12
A Survey of Modern Integer Factorization Algorithms
 CWI Quarterly
, 1994
"... Introduction An integer n ? 1 is said to be a prime number (or simply prime) if the only divisors of n are \Sigma1 and \Sigman. There are infinitely many prime numbers, the first four being 2, 3, 5, and 7. If n ? 1 and n is not prime, then n is said to be composite. The integer 1 is neither prime ..."
Abstract

Cited by 13 (3 self)
 Add to MetaCart
Introduction An integer n ? 1 is said to be a prime number (or simply prime) if the only divisors of n are \Sigma1 and \Sigman. There are infinitely many prime numbers, the first four being 2, 3, 5, and 7. If n ? 1 and n is not prime, then n is said to be composite. The integer 1 is neither prime nor composite. The Fundamental Theorem of Arithmetic states that every positive integer can be expressed as a finite (perhaps empty) product of prime numbers, and that this factorization is unique except for the ordering of the factors. Table 1.1 has some sample factorizations. 1990 = 2 \Delta 5 \Delta 199 1995 = 3 \Delta 5 \Delta 7 \Delta 19 2000 = 2 4 \Delta 5 3 2005 = 5 \Delta 401
//eprint.iacr.org/2009/082. The Case for Quantum Key Distribution
, 2009
"... Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide longterm confidentiality for encrypted information without reliance on computational assumptions. Alt ..."
Abstract

Cited by 3 (2 self)
 Add to MetaCart
(Show Context)
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide longterm confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent maninthemiddle attacks, it can make use of either informationtheoretically secure symmetric key authentication or computationally secure public key authentication: even when using public key authentication, we argue that QKD still offers stronger security than classical key agreement. 1
The Magic Words Are Squeamish Ossifrage (Extended Abstract)
"... We describe the computation which resulted in the title of this paper. Furthermore, we give an analysis of the data collected during this computation. From these data, we derive the important observation that in the final stages, the progress of the double large prime variation of the quadratic siev ..."
Abstract

Cited by 3 (0 self)
 Add to MetaCart
(Show Context)
We describe the computation which resulted in the title of this paper. Furthermore, we give an analysis of the data collected during this computation. From these data, we derive the important observation that in the final stages, the progress of the double large prime variation of the quadratic sieve integer factoring algorithm can more effectively be approximated by a quartic function of the time spent, than by the more familiar quadratic function. We also present, as an update to [15], some of our experiences with the management of a large computation distributed over the Internet. Based on this experience, we give some realistic estimates of the current readily available computational power of the Internet. We conclude that commonlyused 512bit RSA moduli are vulnerable to any organization prepared to spend a few million dollars and to wait a few months.
Integer Factoring
, 2000
"... Using simple examples and informal discussions this article surveys the key ideas and major advances of the last quarter century in integer factorization. ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
Using simple examples and informal discussions this article surveys the key ideas and major advances of the last quarter century in integer factorization.
Computational Methods in Public Key Cryptology
, 2002
"... These notes informally review the most common methods from computational number theory that have applications in public key cryptology. ..."
Abstract

Cited by 1 (1 self)
 Add to MetaCart
(Show Context)
These notes informally review the most common methods from computational number theory that have applications in public key cryptology.
The Case for Quantum Key Distribution Douglas Stebila1,2, Michele Mosca1,2,3 1,3,4 ∗
, 2009
"... Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide longterm confidentiality for encrypted information without reliance on computational assumptions. Alt ..."
Abstract
 Add to MetaCart
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide longterm confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent maninthemiddle attacks, it can make use of either informationtheoretically secure symmetric key authentication or computationally secure public key authentication: even when using public key authentication, we argue that QKD still offers stronger security than classical key agreement. 1
www.informatik2011.de Social Key Exchange Network – From AdHoc Key Exchanges to a Dense Key Network
"... Abstract: Security of public key cryptography is steadily threatened by advancements in algorithmics and computing power. In this work we propose a novel approach to longterm secure key exchange based on security assumptions that are independent of strong complexity assumptions. We present a key pr ..."
Abstract
 Add to MetaCart
Abstract: Security of public key cryptography is steadily threatened by advancements in algorithmics and computing power. In this work we propose a novel approach to longterm secure key exchange based on security assumptions that are independent of strong complexity assumptions. We present a key propagation scheme that sets up a network of distributed keys. Whenever two parties meet, they exchange new keys (e.g. using near field communication) and pass on all keys received so far. This establishes a dense key network growing and spreading with each meeting of protocol participants. Even two parties that have never met in person can use this network to obtain a common secret. A notable security feature of our scheme is the anonymity of the established keys, making it hard for an adversary to track movements of protocol participants. Keywords: Key Propagation, Mobile AdHoc Networks, Key Exchange. 1
New Techniques for Security Proofs of Quantum Cryptography
"... I hereby declare that I am the sole author of this thesis. I authorise the University of Waterloo to lend this thesis to other institutions or individuals for the purpose of scholarly research. ..."
Abstract
 Add to MetaCart
(Show Context)
I hereby declare that I am the sole author of this thesis. I authorise the University of Waterloo to lend this thesis to other institutions or individuals for the purpose of scholarly research.
The Case for Quantum Key Distribution
, 2009
"... Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide longterm confidentiality for encrypted information without reliance on computational assumptions. Alt ..."
Abstract
 Add to MetaCart
(Show Context)
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide longterm confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent maninthemiddle attacks, it can make use of either informationtheoretically secure symmetric key authentication or computationally secure public key authentication: even when using public key authentication, we argue that QKD still offers stronger security than classical key agreement. 1