Cryptology Beyond Shannon's Information Theory: Preparing for When the Enemy Knows the Systemm with Technical Focus on Number Field Sieve Cryptanalysis Algorithms for Most Efficient Prime Factorization on Composites
2000 ◽
pp. 209-231
◽
2002 ◽
Vol 72
(242)
◽
pp. 953-968
◽
Keyword(s):