Academic literature on the topic 'Fermat's factorization'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Fermat's factorization.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Fermat's factorization"

1

Aminudin, Aminudin, and Eko Budi Cahyono. "A Practical Analysis of the Fermat Factorization and Pollard Rho Method for Factoring Integers." Lontar Komputer : Jurnal Ilmiah Teknologi Informasi 12, no. 1 (2021): 33. http://dx.doi.org/10.24843/lkjiti.2021.v12.i01.p04.

Full text
Abstract:
The development of public-key cryptography generation using the factoring method is very important in practical cryptography applications. In cryptographic applications, the urgency of factoring is very risky because factoring can crack public and private keys, even though the strength in cryptographic algorithms is determined mainly by the key strength generated by the algorithm. However, solving the composite number to find the prime factors is still very rarely done. Therefore, this study will compare the Fermat factorization algorithm and Pollard rho by finding the key generator public key
APA, Harvard, Vancouver, ISO, and other styles
2

James, Joseph. "UNIQUE FACTORIZATION FERMAT'S LAST THEOREM BEAL'S CONJECTURE." Journal of Progressive Research in Mathematics 10, no. 1 (2016): 1434–39. https://doi.org/10.5281/zenodo.3976651.

Full text
Abstract:
In this paper the following statememt of Fermat\rq{}s Last Theorem is proved.  If  $x, y, z$ are positive integers$\pi$ is an odd prime and  $z^\pi=x^\pi+y^\pi, x, y, z$ are all even. Also, in this paper, is proved (Beal\rq{}s conjecture): The equation $z^\xi=x^\mu+y^\nu$ has no solution in relatively prime positive integers $x, y, z, $ with $\xi, \mu, \nu$ primes at least $3.
APA, Harvard, Vancouver, ISO, and other styles
3

Kritsanapong, Somsuk. "The new integer factorization algorithm based on fermat's factorization algorithm and euler's theorem." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (2020): 1469–76. https://doi.org/10.11591/ijece.v10i2.pp1469-1476.

Full text
Abstract:
Although, Integer Factorization is one of the hard problems to break RSA, many factoring techniques are still developed. Fermat’s Factorization Algorithm (FFA) which has very high performance when prime factors are close to each other is a type of integer factorization algorithms. In fact, there are two ways to implement FFA. The first is called FFA-1, it is a process to find the integer from square root computing. Because this operation takes high computation cost, it consumes high computation time to find the result. The other method is called FFA-2 which is the different technique to
APA, Harvard, Vancouver, ISO, and other styles
4

Oduor, Maurice, Olege Fanuel, Aywa Shem, and Okaka A. Colleta. "CHARACTERIZATION OF CODES OF IDEALS OF THE POLYNOMIAL RING F30 2 [x] mod ô€€€ x30 ô€€€ 1 FOR ERROR CONTROL IN COMPUTER APPLICATONS." JOURNAL OF ADVANCES IN MATHEMATICS 12, no. 5 (2016): 6238–47. http://dx.doi.org/10.24297/jam.v12i5.260.

Full text
Abstract:
The study of ideals in algebraic number system has contributed immensely in preserving the notion of unique factorization in rings of algebraic integers and in proving Fermat's last Theorem. Recent research has revealed that ideals in Noethe-rian rings are closed in polynomial addition and multiplication.This property has been used to characterize the polynomial ring Fn 2 [x] mod (xn 1) for error control. In this research we generate ideals of the polynomial ring using GAP software and characterize the polycodewords using Shannon's Code region and Manin's bound.
APA, Harvard, Vancouver, ISO, and other styles
5

Malik, M. Aslam, and M. Khalid Mahmood. "On Simple Graphs Arising from Exponential Congruences." Journal of Applied Mathematics 2012 (2012): 1–10. http://dx.doi.org/10.1155/2012/292895.

Full text
Abstract:
We introduce and investigate a new class of graphs arrived from exponential congruences. For each pair of positive integersaandb, letG(n)denote the graph for whichV={0,1,…,n−1}is the set of vertices and there is an edge betweenaandbif the congruenceax≡b (mod n)is solvable. Letn=p1k1p2k2⋯prkrbe the prime power factorization of an integern, wherep1<p2<⋯<prare distinct primes. The number of nontrivial self-loops of the graphG(n)has been determined and shown to be equal to∏i=1r(ϕ(piki)+1). It is shown that the graphG(n)has2rcomponents. Further, it is proved that the componentΓpof the simp
APA, Harvard, Vancouver, ISO, and other styles
6

Babindamana, Regis Freguin, Gilda Rech Bansimba, and Basile Guy Richard Bossoto. "Lattice Points on the Fermat Factorization Method." Journal of Mathematics 2022 (January 28, 2022): 1–18. http://dx.doi.org/10.1155/2022/6360264.

Full text
Abstract:
In this paper, we study algebraic properties of lattice points of the arc on the conics x 2 − d y 2 = N especially for d = 1 , which is the Fermat factorization equation that is the main idea of many important factorization methods like the quadratic field sieve, using arithmetical results of a particular hyperbola parametrization. As a result, we present a generalization of the forms, the cardinal, and the distribution of its lattice points over the integers. In particular, we prove that if N − 6 ≡ 0 mod 4 , Fermat’s method fails. Otherwise, in terms of cardinality, it has, respectively, 4, 8
APA, Harvard, Vancouver, ISO, and other styles
7

Overmars, Anthony, and Sitalakshmi Venkatraman. "New Semi-Prime Factorization and Application in Large RSA Key Attacks." Journal of Cybersecurity and Privacy 1, no. 4 (2021): 660–74. http://dx.doi.org/10.3390/jcp1040033.

Full text
Abstract:
Semi-prime factorization is an increasingly important number theoretic problem, since it is computationally intractable. Further, this property has been applied in public-key cryptography, such as the Rivest–Shamir–Adleman (RSA) encryption systems for secure digital communications. Hence, alternate approaches to solve the semi-prime factorization problem are proposed. Recently, Pythagorean tuples to factor semi-primes have been explored to consider Fermat’s Christmas theorem, with the two squares having opposite parity. This paper is motivated by the property that the integer separating these
APA, Harvard, Vancouver, ISO, and other styles
8

Candra, Ade, Mohammad Andri Budiman, and Dian Rachmawati. "On Factoring The RSA Modulus Using Tabu Search." Data Science: Journal of Computing and Applied Informatics 1, no. 1 (2017): 30–37. http://dx.doi.org/10.32734/jocai.v1.i1-65.

Full text
Abstract:
It is intuitively clear that the security of RSA cryptosystem depends on the hardness of factoring a very large integer into its two prime factors. Numerous studies about integer factorization in the field of number theory have been carried out, and as a result, lots of exact factorization algorithms, such as Fermat’s factorization algorithm, quadratic sieve method, and Pollard’s rho algorithm have been found. The factorization problem is in the class of NP (non-deterministic polynomial time). Tabu search is a metaheuristic in the field of artificial intelligence which is often used to solve N
APA, Harvard, Vancouver, ISO, and other styles
9

Raghunandan, K. R., Aithal Ganesh, Shetty Surendra, and K. Bhavya. "Key Generation Using Generalized Pell’s Equation in Public Key Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and Its Security Analysis." Cybernetics and Information Technologies 20, no. 3 (2020): 86–101. http://dx.doi.org/10.2478/cait-2020-0030.

Full text
Abstract:
AbstractRSA is one among the most popular public key cryptographic algorithm for security systems. It is explored in the results that RSA is prone to factorization problem, since it is sharing common modulus and public key exponent. In this paper the concept of fake modulus and generalized Pell’s equation is used for enhancing the security of RSA. Using generalized Pell’s equation it is explored that public key exponent depends on several parameters, hence obtaining private key parameter itself is a big challenge. Fake modulus concept eliminates the distribution of common modulus, by replacing
APA, Harvard, Vancouver, ISO, and other styles
10

Omollo, Richard, and Arnold Okoth. "Large Semi Primes Factorization with Its Implications to RSA Cryptosystems." BOHR International Journal of Smart Computing and Information Technology 3, no. 1 (2020): 1–8. http://dx.doi.org/10.54646/bijscit.011.

Full text
Abstract:
RSA’s strong cryptosystem works on the principle that there are no trivial solutions to integer factorization. Furthermore, factorization of very large semi primes cannot be done in polynomial time when it comes to the processing power of classical computers. In this paper, we present the analysis of Fermat’s Last Theorem and Arnold’s Theorem. Also highlighted include new techniques such as Arnold’s Digitized Summation Technique (A.D.S.T.) and a top-to-bottom, bottom-to-top approach search for the prime factors. These drastically reduce the time taken to factorize large semi primes as for the
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Fermat's factorization"

1

Hammad, Yousef Bani. "Novel methods for primality testing and factoring." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16142/1/Yousef_Bani_Hammad_Thesis.pdf.

Full text
Abstract:
From the time of the Greeks, primality testing and factoring have fascinated mathematicians, and for centuries following the Greeks primality testing and factorization were pursued by enthusiasts and professional mathematicians for their intrisic value. There was little practical application. One example application was to determine whether or not the Fermat numbers, that is, numbers of the form F;, = 2'" + 1 were prime. Fermat conjectured that for all n they were prime. For n = 1,2,3,4, the Fermat numbers are prime, but Euler showed that F; was not prime and to date no F,, n 2 5 has be
APA, Harvard, Vancouver, ISO, and other styles
2

Hammad, Yousef Bani. "Novel Methods for Primality Testing and Factoring." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16142/.

Full text
Abstract:
From the time of the Greeks, primality testing and factoring have fascinated mathematicians, and for centuries following the Greeks primality testing and factorization were pursued by enthusiasts and professional mathematicians for their intrisic value. There was little practical application. One example application was to determine whether or not the Fermat numbers, that is, numbers of the form F;, = 2'" + 1 were prime. Fermat conjectured that for all n they were prime. For n = 1,2,3,4, the Fermat numbers are prime, but Euler showed that F; was not prime and to date no F,, n 2 5 has be
APA, Harvard, Vancouver, ISO, and other styles
3

Podhorský, Jiří. "Integer Factorization on the GPU." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-412908.

Full text
Abstract:
This work deals with factorization, a decomposition of composite numbers on prime numbers and possibilities of its parallelization. It summarizes also the best known algorithms for factoring and most popular platforms for the implementation of these algorithms on the graphics card. The main part of the thesis deals with the design and implementation of hardware acceleration current fastest algorithm on the graphics card by using the OpenCL framework. Subsequently, the work provides a comparison of speeds accelerated algorithm implemented in this work with other versions of the best known algor
APA, Harvard, Vancouver, ISO, and other styles
4

Breitenbacher, Dominik. "Paralelizace faktorizace celých čísel z pohledu lámání RSA." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234905.

Full text
Abstract:
This paper follows up the factorization of integers. Factorization is the most popular and used method for RSA cryptoanalysis. The SIQS was chosen as a factorization method that will be used in this paper. Although SIQS is the fastest method (up to 100 digits), it can't be effectively computed at polynomial time, so it's needed to look up for options, how to speed up the method as much as possible. One of the possible ways is paralelization. In this case OpenMP was used. Other possible way is optimalization. The goal of this paper is also to show, how easily is possible to use paralelizion and
APA, Harvard, Vancouver, ISO, and other styles
5

Brinkmann, Daniel. "Hilbert-Kunz functions of surface rings of type ADE." Doctoral thesis, 2013. https://repositorium.ub.uni-osnabrueck.de/handle/urn:nbn:de:gbv:700-2013082711496.

Full text
Abstract:
We compute the Hilbert-Kunz functions of two-dimensional rings of type ADE by using representations of their indecomposable, maximal Cohen-Macaulay modules in terms of matrix factorizations, and as first syzygy modules of homogeneous ideals.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Fermat's factorization"

1

Bressoud, David M. "Fermat, Euler, and Pseudoprimes." In Factorization and Primality Testing. Springer New York, 1989. http://dx.doi.org/10.1007/978-1-4612-4544-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bressoud, David M. "Factorization Techniques from Fermat to Today." In Factorization and Primality Testing. Springer New York, 1989. http://dx.doi.org/10.1007/978-1-4612-4544-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Mu-En, Raylin Tso, and Hung-Min Sun. "On the Improvement of Fermat Factorization." In Network and System Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ali, Fahed, and Mehwish Mustafa. "IMMFV2: Improved Modified Fermat Factorization Algorithm." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19968-4_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Somsuk, Kritsanapong, and Sumonta Kasemvilas. "Possible Prime Modified Fermat Factorization: New Improved Integer Factorization to Decrease Computation Time for Breaking RSA." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-06538-0_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Balasubramanian, Kannan, and Ahmed Mahmoud Abbas. "Integer Factoring Algorithms." In Algorithmic Strategies for Solving Complex Problems in Cryptography. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2915-6.ch017.

Full text
Abstract:
Most cryptographic systems are based on an underlying difficult problem. The RSA cryptosystem and many other cryptosystems rely on the fact that factoring a large composite number into two prime numbers is a hard problem. The are many algorithms for factoring integers. This chapter presents some of the basic algorithms for integer factorization like the Trial Division, Fermat's Algorithm. Pollard's Rho Method, Pollard's p-1 method and the Elliptic Curve Method. The Number Field Sieve algorithm along with Special Number field Sieve and the General Number Field Sieve are also used in factoring l
APA, Harvard, Vancouver, ISO, and other styles
7

Reilly, Norman R. "Elliptic Curves." In Introduction to Applied Algebraic Systems. Oxford University PressNew York, NY, 2009. http://dx.doi.org/10.1093/oso/9780195367874.003.0008.

Full text
Abstract:
Abstract Although elliptic curves have been studied for many decades and a wealth of information was gained about them, it is only relatively recently that they have gained a certain level of “notoriety”. This has been the result of the application of the theory of elliptic curves to such things as Fermat’s Last Theorem, cryptography, and integer factorization. In this chapter we develop somebasic properties of elliptic curves, particularly thegroup structureon an elliptic curve. There are other situations, and also simpler situations, when it is possibleto definean algebraic structureon a set
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Fermat's factorization"

1

Karpinski, Mikolaj, Stepan Ivasiev, Ihor Yakymenko, Mykhajlo Kasianchuk, and Tomasz Gancarczyk. "Advanced method of factorization of multi-bit numbers based on Fermat's theorem in the system of residual classes." In 2016 16th International Conference on Control, Automation and Systems (ICCAS). IEEE, 2016. http://dx.doi.org/10.1109/iccas.2016.7832500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!