{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T01:04:35Z","timestamp":1765933475373,"version":"3.48.0"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819987290"},{"type":"electronic","value":"9789819987306"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-8730-6_5","type":"book-chapter","created":{"date-parts":[[2023,12,17]],"date-time":"2023-12-17T07:02:04Z","timestamp":1702796524000},"page":"138-166","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["We are on\u00a0the\u00a0Same Side. Alternative Sieving Strategies for\u00a0the\u00a0Number Field Sieve"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9416-6244","authenticated-orcid":false,"given":"Charles","family":"Bouillaguet","sequence":"first","affiliation":[]},{"given":"Ambroise","family":"Fleury","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4997-2276","authenticated-orcid":false,"given":"Pierre-Alain","family":"Fouque","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Kirchner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,18]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Aoki, K., Ueda, H.: Sieving using bucket sort. In: Lee, P.J. (ed.) Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, 5\u20139 December 2004, Proceedings. LNCS, vol. 3329, pp. 92\u2013102. Springer, Cham (2004). https:\/\/doi.org\/10.1007\/978-3-540-30539-2_8","DOI":"10.1007\/978-3-540-30539-2_8"},{"issue":"2","key":"5_CR2","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1006\/jagm.1999.1008","volume":"31","author":"EA Bender","year":"1999","unstructured":"Bender, E.A., Canfield, E.: An approximate probabilistic model for structured Gaussian elimination. J. Algorithms 31(2), 271\u2013290 (1999). https:\/\/doi.org\/10.1006\/jagm.1999.1008","journal-title":"J. Algorithms"},{"key":"5_CR3","unstructured":"Bernstein, D.J.: How to find small factors of integers, September 2002. https:\/\/cr.yp.to\/papers.html#sf, (Apparenly) unpublished manuscript"},{"key":"5_CR4","unstructured":"Bernstein, D.J.: How to find smooth parts of integers, May 2004. https:\/\/cr.yp.to\/papers.html#smoothparts, unpublished manuscript"},{"key":"5_CR5","unstructured":"Bernstein, D.J.: Scaled remainder trees, August 2004. https:\/\/cr.yp.to\/papers.html#scaledmod, unpublished manuscript"},{"key":"5_CR6","doi-asserted-by":"publisher","unstructured":"Boudot, F., Gaudry, P., Guillevic, A., Heninger, N., Thom\u00e9, E., Zimmermann, P.: Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment. In: Micciancio, D., Ristenpart, T. (eds.) Advances in Cryptology - CRYPTO 2020\u201340th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, 17\u201321 August 2020, Proceedings, Part II. LNCS, vol. 12171, pp. 62\u201391. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56880-1_3","DOI":"10.1007\/978-3-030-56880-1_3"},{"key":"5_CR7","unstructured":"Bouillaguet, C., Zimmermann, P.: Parallel structured Gaussian elimination for the number field sieve. Math. Cryptol. 0(1), 22\u201339 (2021). https:\/\/journals.flvc.org\/mathcryptology\/article\/view\/126033"},{"key":"5_CR8","series-title":"Lecture Notes in Mathematics","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/BFb0091539","volume-title":"The development of the number field sieve","author":"JP Buhler","year":"1993","unstructured":"Buhler, J.P., Lenstra, H.W., Pomerance, C.: Factoring integers with the number field sieve. In: Lenstra, A.K., Lenstra, H.W. (eds.) The development of the number field sieve. LNM, vol. 1554, pp. 50\u201394. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/BFb0091539"},{"key":"5_CR9","unstructured":"Buhler, J., Stevenhagen, P.: Algorithmic Number Theory: Lattices, Number Fields, Curves and Cryptography. Mathematical Sciences Research Institute Publications, Cambridge University Press (2011)"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"De La Bret\u00e8che, R., Tenenbaum, G.: Propri\u00e9t\u00e9s statistiques des entiers friables. Ramanujan J. 9, 139\u2013202 (2005). https:\/\/doi.org\/10.1007\/s11139-005-0832-6","DOI":"10.1007\/s11139-005-0832-6"},{"issue":"1","key":"5_CR11","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107\u2013113 (2008). https:\/\/doi.org\/10.1145\/1327452.1327492","journal-title":"Commun. ACM"},{"key":"5_CR12","doi-asserted-by":"publisher","unstructured":"Hildebrand, A., Tenenbaum, G.: On integers free of large prime factors. Trans. Am. Math. Soc. 296 (1986). https:\/\/doi.org\/10.2307\/2000573","DOI":"10.2307\/2000573"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Joux, A.: Algorithmic Cryptanalysis. CRC Press, Boca Raton (2009)","DOI":"10.1201\/9781420070033"},{"key":"5_CR14","doi-asserted-by":"publisher","unstructured":"Kleinjung, T., et al.: Factorization of a 768-bit RSA modulus. In: Rabin, T. (ed.) Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, 15\u201319 August 2010, Proceedings. LNCS, vol. 6223, pp. 333\u2013350. Springer, Cham (2010). https:\/\/doi.org\/10.1007\/978-3-642-14623-7_18, https:\/\/doi.org\/10.1007\/978-3-642-14623-7","DOI":"10.1007\/978-3-642-14623-7_18"},{"key":"5_CR15","unstructured":"Kruppa, A.: Speeding up integer multiplication and factorization. Theses, Universit\u00e9 Henri Poincar\u00e9 - Nancy 1, January 2010. https:\/\/theses.hal.science\/tel-01748662"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/BFb0091537","volume-title":"The Development of the Number Field Sieve","author":"AK Lenstra","year":"1993","unstructured":"Lenstra, A.K., Lenstra, H.W., Manasse, M.S., Pollard, J.M.: The number field sieve. In: Lenstra, A.K., Lenstra, H.W. (eds.) The Development of the Number Field Sieve, pp. 11\u201342. Springer, Heidelberg (1993)"},{"key":"5_CR17","series-title":"Universitext","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-9356-6","volume-title":"Number Fields","author":"D Marcus","year":"2012","unstructured":"Marcus, D.: Number Fields. Universitext, Springer, New York (2012). https:\/\/doi.org\/10.1007\/978-1-4684-9356-6"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Montgomery, P.L.: Square roots of products of algebraic numbers. In: Gautschi, W. (ed.) Mathematics of Computation 1943\u20131993: A Half-Century of Computational Mathematics, pp. 567\u2013571. American Mathematical Society, Providence (1994)","DOI":"10.1090\/psapm\/048\/1314892"},{"key":"5_CR19","series-title":"Lecture Notes in Mathematics","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/BFb0091538","volume-title":"The development of the number field sieve","author":"JM Pollard","year":"1993","unstructured":"Pollard, J.M.: The lattice sieve. In: Lenstra, A.K., Lenstra, H.W. (eds.) The development of the number field sieve. LNM, vol. 1554, pp. 43\u201349. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/BFb0091538"},{"key":"5_CR20","unstructured":"The CADO-NFS Development Team: CADO-NFS, an implementation of the number field sieve algorithm (2017). https:\/\/gitlab.inria.fr\/cado-nfs\/cado-nfs, release 2.3.0"},{"key":"5_CR21","doi-asserted-by":"publisher","unstructured":"Vall\u00e9e, B., Vera, A.: Probabilistic analyses of lattice reduction algorithms. In: Nguyen, P.Q., Vall\u00e9e, B. (eds.) The LLL Algorithm - Survey and Applications, pp. 71\u2013143. Information Security and Cryptography. Springer, Cham (2010). https:\/\/doi.org\/10.1007\/978-3-642-02295-1_3","DOI":"10.1007\/978-3-642-02295-1_3"},{"key":"5_CR22","doi-asserted-by":"publisher","unstructured":"Zaharia, M., et al.: Apache spark: a unified engine for big data processing. Commun. ACM 59(11), 56\u201365 (2016). https:\/\/doi.org\/10.1145\/2934664","DOI":"10.1145\/2934664"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8730-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T01:02:51Z","timestamp":1765933371000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8730-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819987290","9789819987306"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8730-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"18 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"375","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"106","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}