{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T07:48:57Z","timestamp":1776844137630,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540239758","type":"print"},{"value":"9783540305392","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30539-2_8","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T13:41:57Z","timestamp":1268401317000},"page":"92-102","source":"Crossref","is-referenced-by-count":12,"title":["Sieving Using Bucket Sort"],"prefix":"10.1007","author":[{"given":"Kazumaro","family":"Aoki","sequence":"first","affiliation":[]},{"given":"Hiroki","family":"Ueda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Mathematics","volume-title":"The development of the number field sieve","year":"1993","unstructured":"Lenstra, A.K., Lenstra Jr., H.W. (eds.): The development of the number field sieve. Lecture Notes in Mathematics, vol.\u00a01554. Springer, Heidelberg (1993)"},{"key":"8_CR2","unstructured":"Intel Corporation: IA-32 Intel Architecture Optimization Reference Manual. (2004) Order Number: 248966-010, \n                    \n                      http:\/\/support.intel.com\/design\/pentium4\/manuals\/248966.htm"},{"key":"8_CR3","unstructured":"Wambach, G., Wettig, H.: Block sieving algorithms. Technical Report 190, Informatik, Universit\u00e4t zu K\u00f6ln (1995), \n                    \n                      http:\/\/www.zaik.uni-koeln.de\/~paper\/index.html?show=zpr95-190"},{"key":"8_CR4","series-title":"The Art of Computer Programming","volume-title":"Sorting and Searching","author":"D.E. Knuth","year":"1998","unstructured":"Knuth, D.E.: Sorting and Searching. The Art of Computer Programming, vol.\u00a03. Addison-Wesley, Reading (1998)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/3-540-36288-6_19","volume-title":"Public Key Cryptography - PKC 2003","author":"W. Geiselmann","year":"2002","unstructured":"Geiselmann, W., Steinwandt, R.: A dedicated sieving hardware. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 254\u2013266. Springer, Heidelberg (2002)"},{"key":"8_CR6","unstructured":"Bernstein, D.J.: Circuits for integer factorizaion: a proposal (2002), Available at \n                    \n                      http:\/\/cr.yp.to\/factorization.html#nfscircuit\n                    \n                    \n                  )"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/3-540-58691-1_38","volume-title":"Algorithmic Number Theory","author":"R.A. Golliver","year":"1994","unstructured":"Golliver, R.A., Lenstra, A.K., McCurley, K.S.: Lattice sieving and trial division. In: Huang, M.-D.A., Adleman, L.M. (eds.) ANTS 1994. LNCS, vol.\u00a0877, pp. 18\u201327. Springer, Heidelberg (1994)"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1090\/S0025-5718-1987-0866119-8","volume":"48","author":"R.D. Silverman","year":"1987","unstructured":"Silverman, R.D.: The multiple polynomial quadratic sieve. Mathematics of Computation\u00a048, 329\u2013339 (1987)","journal-title":"Mathematics of Computation"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-45146-4_1","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"A. Shamir","year":"2003","unstructured":"Shamir, A., Tromer, E.: Factoring large numbers with the TWIRL device. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 1\u201326. Springer, Heidelberg (2003)"},{"key":"8_CR10","unstructured":"Bahr, F., Franke, J., Kleinjung, T.: Factorization of 158-digit cofactor of 2953\u2009+\u20091 (2002), Available at \n                    \n                      http:\/\/www.crypto-world.com\/announcements\/c158.txt"},{"key":"8_CR11","series-title":"Progress in Mathematics","volume-title":"Prime Numbers and Computer Methods for Factorization","author":"H. Riesel","year":"1993","unstructured":"Riesel, H.: Prime Numbers and Computer Methods for Factorization, 2nd edn. Progress in Mathematics, vol.\u00a0126. Birkh\u00e4user, Basel (1993)","edition":"2"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45539-6_1","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"S. Cavallar","year":"2000","unstructured":"Cavallar, S., Dodson, B., Lenstra, A.K., Lioen, W., Montgomery, P.L., Murphy, B., te Riele, H., Aardal, K., Gilchrist, J., Guillerm, G., Leyland, P., Marchand, J., Morain, F., Muffett, A., Putnam, C., Zimmermann, P.: Factorization of a 512-bit RSA modulus. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 1\u201318. Springer, Heidelberg (2000)"},{"key":"8_CR13","unstructured":"Contini, S.: Factor world! (2002), \n                    \n                      http:\/\/www.crypto-world.com\/FactorWorld.html"},{"key":"8_CR14","unstructured":"Wagstaff, S.S.: The Cunningham Project (2003), \n                    \n                      http:\/\/www.cerias.purdue.edu\/homes\/ssw\/cun\/"},{"key":"8_CR15","unstructured":"Aoki, K., Kida, Y., Shimoyama, T., Sonoda, Y., Ueda, H.: GNFS164 (2003), \n                    \n                      http:\/\/www.rkmath.rikkyo.ac.jp\/~kida\/gnfs164e.htm"},{"key":"8_CR16","unstructured":"Aoki, K., Kida, Y., Shimoyama, T., Sonoda, Y., Ueda, H.: SNFS248 (2004), \n                    \n                      http:\/\/www.rkmath.rikkyo.ac.jp\/~kida\/snfs248e.htm"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30539-2_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:59:14Z","timestamp":1605761954000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30539-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540239758","9783540305392"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30539-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}