Cryptographie et factorisation

Jean-Louis Nicolas

Groupe d'étude en théorie analytique des nombres (1985-1986)

  • Volume: 2, page 1-6

How to cite

top

Nicolas, Jean-Louis. "Cryptographie et factorisation." Groupe d'étude en théorie analytique des nombres 2 (1985-1986): 1-6. <http://eudml.org/doc/114220>.

@article{Nicolas1985-1986,
author = {Nicolas, Jean-Louis},
journal = {Groupe d'étude en théorie analytique des nombres},
language = {fre},
pages = {1-6},
publisher = {Secrétariat mathématique},
title = {Cryptographie et factorisation},
url = {http://eudml.org/doc/114220},
volume = {2},
year = {1985-1986},
}

TY - JOUR
AU - Nicolas, Jean-Louis
TI - Cryptographie et factorisation
JO - Groupe d'étude en théorie analytique des nombres
PY - 1985-1986
PB - Secrétariat mathématique
VL - 2
SP - 1
EP - 6
LA - fre
UR - http://eudml.org/doc/114220
ER -

References

top
  1. [Bri] Brillhart ( J.), Lehmer ( D.H.), Selfridge ( J.-L.), Tuckerman ( B.) and Wagstaff ( S.S.). - Factorizations of bn ± 1 . - Providence, American mathematical Society, 1983 (Contemporary Mathematics, 22). Zbl0527.10001MR996414
  2. [De B] De Bruijn ( N.G.). - On the number of positive integers ≤ x and free of prime factors &gt; y , II, Koninkl. nederl. Akad. Wetensch., Proc., Series A, t. 69, 1966, p. 239-247 ; Indag. Math., t. 28, 1966, p. 239-247. Zbl0139.27203MR205945
  3. [Hil] Hildebrand ( A.) and Tenenbaum ( G.). - On integers free of large prime factors, Trans. Amer. math. Soc., t. 296, 1986, p. 265-290. Zbl0601.10028MR837811
  4. [Kon] Konheim ( A.G.). - Cryptography. A primer. - New York, J. Wiley and Sons, 1981. Zbl0581.94001MR613498
  5. [Mey] Meyer ( C.H.) and Matyas ( S.M.). - Cryptography : A new dimension in computer data security. - New York, J. Wiley and Sons, 1982. Zbl0584.94015
  6. [Odl] Odlyzko ( A.M.). - Discrete logarithms in finite fields and their cryptographic significance, "Advances in cryptology", p. 224-314. - Berlin, Springer-Verlag (Lecture Notes in Computer Science, 209). Zbl0594.94016MR825593
  7. [Pom] Pomeramce ( C.). - Analysis and comparison of soue integer factoring algorithms, "Computational methods in number theory", part 1, p. 89-139. - Amsterdam, Mathematisch Centrum, 1982 (Mathematical Centre Tracts, 154). Zbl0508.10004MR700260
  8. [Riv] Rivest ( R.L.), Shamir ( A.) and Adleman ( L.). - A method for obtaining digital signatures and public-key cryptosystems, Communic. Assoc. comput. Mach., t. 21, 1978, p. 120-126. Zbl0368.94005MR700103

NotesEmbed ?

top

You must be logged in to post comments.

To embed these notes on your page include the following JavaScript code on your page where you want the notes to appear.

Only the controls for the widget will be shown in your chosen language. Notes will be shown in their authored language.

Tells the widget how many notes to show per page. You can cycle through additional notes using the next and previous controls.

    
                

Note: Best practice suggests putting the JavaScript code just before the closing </body> tag.