{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T06:40:20Z","timestamp":1776840020987,"version":"3.51.2"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2000,3,1]],"date-time":"2000-03-01T00:00:00Z","timestamp":951868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2000,3,1]],"date-time":"2000-03-01T00:00:00Z","timestamp":951868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[2000,3]]},"DOI":"10.1023\/a:1008350005447","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T09:41:38Z","timestamp":1040550098000},"page":"129-145","source":"Crossref","is-referenced-by-count":75,"title":["Discrete Logarithms: The Past and the Future"],"prefix":"10.1007","volume":"19","author":[{"given":"Andrew","family":"Odlyzko","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"253937_CR1","doi-asserted-by":"crossref","unstructured":"L. M. Adleman, The function field sieve, Algorithmic Number Theory: First Intern. Symp., ANTS-I (L. M. Adleman and M.-D. Huang, eds.), Lecture Notes in Math., Springer, 877 (1994) pp. 108\u2013121.","DOI":"10.1007\/3-540-58691-1_48"},{"key":"253937_CR2","doi-asserted-by":"crossref","unstructured":"L. M. Adleman, J. De Marrais, and M.-D. A. Huang, A subexponential algorithm for discrete logarithms over the rational subgroup of the Jacobians of large genus hyperelliptic curves over finite fields, Algorithmic Number Theory: First Intern. Symp., ANTS-I (L. M. Adleman and M.-D. Huang, eds.), Lecture Notes in Math., Springer, 877 (1994) pp. 28\u201340.","DOI":"10.1007\/3-540-58691-1_39"},{"key":"253937_CR3","unstructured":"L. M. Adleman and M.-D. A. Huang, Function field sieve method for discrete logarithms over finite fields, Information and Computation (to appear)."},{"key":"253937_CR4","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1109\/18.6030","volume":"34","author":"H. R. Amirazizi","year":"1988","unstructured":"H. R. Amirazizi and M. E. Hellman, Time-memory-processor trade-offs, IEEE Trans. Inform. Theory, Vol. 34 (1988) pp. 505\u2013512.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"253937_CR5","doi-asserted-by":"crossref","unstructured":"L. Babai and E. Szemeredi, On the complexity of matrix group problems I, Proc. 25\u2013th Found. Computer Sci. Symp., IEEE Press (1984) pp. 229\u2013240.","DOI":"10.1109\/SFCS.1984.715919"},{"key":"253937_CR6","unstructured":"E. Bach and J. Shallit, Algorithmic Number Theory. Vol. I: Efficient Algorithms, MIT Press (1996)."},{"key":"253937_CR7","doi-asserted-by":"crossref","unstructured":"D. Boneh and R. Venkatesan, Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes, Advances in Cryptology-CRYPTO '96 (N. Koblitz, ed.), Lecture Notes in Computer Science, Springer, 1109 (1996) pp. 129\u2013142.","DOI":"10.1007\/3-540-68697-5_11"},{"key":"253937_CR8","doi-asserted-by":"crossref","unstructured":"R. P. Brent, Some parallel algorithms for integer factorization, Proc. Euro-Par '99, Lecture Notes in Computer Sci., Springer(1999, to appear). Available at <ftp:\/\/ftp.comlab.ox.ac.uk\/pub\/Documents\/techpapers\/ Richard.Brent\/rpb193.ps.gz>.","DOI":"10.1007\/3-540-48311-X_1"},{"key":"253937_CR9","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1006\/jnth.1996.0088","volume":"59","author":"J. A. Buchmann","year":"1996","unstructured":"J. A. Buchmann and C. S. Hollinger, On smooth ideals in number fields, J. Number Theory, Vol. 59 (1996) pp. 82\u201387.","journal-title":"J. Number Theory"},{"key":"253937_CR10","unstructured":"S. Cavallar, W. Lioen, H. te Riele, B. Dodson, A. Lenstra, P. Leyland, P. Montgomery, B. Murphy, and P. Zimmermann, Factorization of RSA-140 using the number field sieve, to be published."},{"key":"253937_CR11","unstructured":"Certicom elliptic curve challenge. Details and current status available at \u2329http:\/\/www.certicom.com\u232a."},{"key":"253937_CR12","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1109\/TIT.1984.1056941","volume":"30","author":"D. Coppersmith","year":"1984","unstructured":"D. Coppersmith, Fast evaluation of logarithms in fields of characteristic two, IEEE Trans. Inform. Theory, Vol. 30 (1984) pp. 587\u2013594.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"253937_CR13","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/0024-3795(93)90235-G","volume":"192","author":"D. Coppersmith","year":"1993","unstructured":"D. Coppersmith, Solving linear equations over GF(2): block Lanczos algorithm, Linear Algebra Appl., Vol. 192 (1993) pp. 33\u201360.","journal-title":"Linear Algebra Appl."},{"key":"253937_CR14","first-page":"333","volume":"62","author":"D. Coppersmith","year":"1994","unstructured":"D. Coppersmith, Solving homogeneous linear equations overGF(2) via block Wiedemann algorithm, Math. Comp., Vol. 62 (1994) pp. 333\u2013350.","journal-title":"Math. Comp."},{"key":"253937_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BF01840433","volume":"1","author":"D. Coppersmith","year":"1986","unstructured":"D. Coppersmith, A. Odlyzko, and R. Schroeppel, Discrete logarithms in GF(p), Algorithmica, Vol. 1 (1986) pp. 1\u201315.","journal-title":"Algorithmica"},{"key":"253937_CR16","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory, Vol. 22 (1976) pp. 644\u2013654.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"253937_CR17","unstructured":"distributed.net, \"The largest computer on Earth,\" \u2329http:\/\/www.distributed.net\/\u232a."},{"key":"253937_CR18","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory, Vol. 31 (1985) pp. 469\u2013472.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"253937_CR19","unstructured":"A. Enge, Computing discrete logarithms in high-genus hyperelliptic Jacobians in provably subexponential time, to be published. Available at \u2329http:\/\/www.cacr.math.uwaterloo.ca\u232a."},{"key":"253937_CR20","unstructured":"Entropia.com, Inc. software for massive distributed computations. See \u2329http:\/\/entropia.com\u232a."},{"issue":"2","key":"253937_CR21","first-page":"15","volume":"4","author":"A. E. Escot","year":"1998","unstructured":"A. E. Escot, J. C. Sager, A. P. L. Selkirk, and D. Tsapakidis, Attacking elliptic curve cryptosystems using the parallel Pollard rho method, CryptoBytes (The technical newsletter of RSA Laboratories), Vol. 4, No. 2 (1998) pp. 15\u201319. Available at \u2329http:\/\/www.rsa.com\/rsalabs\/pubs\/cryptobytes\/\u232a.","journal-title":"CryptoBytes (The technical newsletter of RSA Laboratories)"},{"key":"253937_CR22","unstructured":"T. Garefalakis and D. Panario, Polynomials over finite fields free from large and small degree irreducible factors, to be published."},{"key":"253937_CR23","unstructured":"T. Garefalakis and D. Panario, The index calculus method using non-smooth polynomials, to be published."},{"key":"253937_CR24","unstructured":"Several reports on GCHQ's secret discovery of non-secret (public key) cryptography by C. Cocks, J. H. Ellis, and M. Williamson, available at \u2329http:\/\/www.cesg.gov.uk\/pkc.htm\u232a."},{"key":"253937_CR25","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1137\/0406010","volume":"6","author":"D. M. Gordon","year":"1993","unstructured":"D. M. Gordon, Discrete logarithms in GF(p) using the number field sieve, SIAM J. Discr. Math., Vol. 6 (1993) pp. 124\u2013138.","journal-title":"SIAM J. Discr. Math."},{"key":"253937_CR26","doi-asserted-by":"crossref","unstructured":"D. M. Gordon and K. McCurley, Massively parallel computation of discrete logarithms, Advances in Cryptology-CRYPTO '92 (E. F. Brickell, ed.), Lecture Notes in Computer Science, Springer, 740 (1992) pp. 312\u2013323.","DOI":"10.1007\/3-540-48071-4_22"},{"key":"253937_CR27","doi-asserted-by":"crossref","unstructured":"J. H\u00e5stad and M. N\u00e4slund, The security of individual RSA bits, Proc. 39\u2013th Found. Comp. Sci. Symp., IEEE (1998) pp. 510\u2013519.","DOI":"10.1109\/SFCS.1998.743502"},{"key":"253937_CR28","doi-asserted-by":"crossref","first-page":"411","DOI":"10.5802\/jtnb.101","volume":"5","author":"A. Hildebrand","year":"1993","unstructured":"A. Hildebrand and G. Tenenbaum, Integers without large prime factors, J. Theor. Nombres Bordeaux, Vol. 5 (1993) pp. 411\u2013484.","journal-title":"J. Theor. Nombres Bordeaux"},{"key":"253937_CR29","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1090\/S0025-5718-99-01003-0","volume":"68","author":"M. J. Jacobson Jr.","year":"1999","unstructured":"M. J. Jacobson, Jr., Applying sieving to the computation of quadratic class groups, Math. Comp., Vol. 68 (1999) pp. 859\u2013867.","journal-title":"Math. Comp."},{"key":"253937_CR30","unstructured":"M. J. Jacobson, Jr., N. Koblitz, J. H. Silverman, A. Stein, and E. Teske, Analysis of the Xedni calculus attack, Designs, Codes and Cryptography, Vol. 19 (2000). Available at \u2329http:\/\/www.cacr.math.uwaterloo.ca\u232a."},{"key":"253937_CR31","first-page":"777","volume":"64","author":"E. Kaltofen","year":"1995","unstructured":"E. Kaltofen, Analysis of Coppersmith's block Wiedemann algorithm for the parallel solution of sparse linear systems, Math. Comp., Vol. 64 (1995) pp. 777\u2013806.","journal-title":"Math. Comp."},{"key":"253937_CR32","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1023\/A:1008354106356","volume":"19","author":"N. Koblitz","year":"2000","unstructured":"N. Koblitz, A. J. Menezes, and S. Vanstone, The state of elliptic curve cryptography, Designs, Codes, and Cryptography, Vol. 19 (2000) pp. 173\u2013194.","journal-title":"Designs, Codes, and Cryptography"},{"key":"253937_CR33","doi-asserted-by":"crossref","unstructured":"B. A. LaMacchia and A. M. Odlyzko, Solving large sparse linear systems over finite fields, Advances in Cryptology: CRYPTO '90 (A. Menezes and S. Vanstone, eds.), Lecture Notes in Computer Science, Springer, 537 (1991) pp. 109\u2013133. Available at \u2329http:\/\/www.research.att.com\/\u00bbamo\u232a.","DOI":"10.1007\/3-540-38424-3_8"},{"key":"253937_CR34","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1007\/BF00123958","volume":"1","author":"B. A. LaMacchia","year":"1991","unstructured":"B. A. LaMacchia and A. M. Odlyzko, Computation of discrete logarithms in prime fields, Designs, Codes, and Cryptography, Vol. 1 (1991) pp. 46\u201362. Available at \u2329http:\/\/www.research.att.com\/\u00bbamo\u232a.","journal-title":"Designs, Codes, and Cryptography"},{"key":"253937_CR35","unstructured":"R. Lambert, Computational aspects of discrete logarithms, Ph.D. thesis, Dept. Electrical Comp. Eng., Univ. of Waterloo (1996)."},{"key":"253937_CR36","unstructured":"Quantum Physics e-print archive, \u2329http:\/\/xxx.lanl.gov\/archive\/quant-ph\u232a."},{"key":"253937_CR37","unstructured":"A. Lebedev, The discrete logarithm problem, manuscript in preparation."},{"key":"253937_CR38","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1023\/A:1008397921377","volume":"19","author":"A. K. Lenstra","year":"2000","unstructured":"A. K. Lenstra, Integer factoring, Designs, Codes, and Cryptography, Vol. 19 (2000) pp. 101\u2013128.","journal-title":"Designs, Codes, and Cryptography"},{"key":"253937_CR39","doi-asserted-by":"crossref","unstructured":"A. K. Lenstra and H. W. Lenstra, Jr., eds., The development of the number field sieve, Lecture Notes in Mathematics, Springer, 1554 (1993).","DOI":"10.1007\/BFb0091534"},{"key":"253937_CR40","doi-asserted-by":"crossref","unstructured":"R. Lovorn Bender and C. Pomerance, Rigorous discrete logarithm computations in finite fields via smooth polynomials, Computational Perspectives on Number Theory (Chicago, 1995), AMS\/IS Stud. Adv. Math., Amer. Math. Soc., 7 (1998) pp. 221\u2013232.","DOI":"10.1090\/amsip\/007\/11"},{"key":"253937_CR41","doi-asserted-by":"crossref","unstructured":"K. S. McCurley, The discrete logarithm problem, Cryptography and Computational Number Theory (C. Pomerance, ed.), Proc. Symp. Appl. Math., Amer. Math. Soc., 42 (1990) pp. 49\u201374.","DOI":"10.1090\/psapm\/042\/1095551"},{"key":"253937_CR42","first-page":"135","volume-title":"New Trends in Probability and Statistics, Vol. 2 (Palanga, 1991)","author":"E. Manstavicius","year":"1992","unstructured":"E. Manstavicius, Semigroup elements free of large prime factors, New Trends in Probability and Statistics, Vol. 2 (Palanga, 1991), VSP, Utrecht (1992) pp. 135\u2013153. MR 93m:11091."},{"key":"253937_CR43","first-page":"512","volume":"32","author":"E. Manstavicius","year":"1992","unstructured":"E. Manstavicius, Remarks on elements of semigroups that are free of large prime factors, Liet. Mat. Rink., Vol. 32 (1992) pp. 512\u2013525 (Russian). English translation in Lithuanian Math. J., Vol. 32 (1992) pp. 400\u2013409. MR 94j:11093.","journal-title":"Liet. Mat. Rink."},{"key":"253937_CR44","doi-asserted-by":"crossref","unstructured":"U. Maurer and S. Wolf, Lower bounds on generic algorithms in groups, Advances in Cryptology-EUROCRYPT '98 (K. Nyberg, ed.), Lecture Notes in Computer Science, Springer, 1403 (1998) pp. 72\u201384.","DOI":"10.1007\/BFb0054118"},{"key":"253937_CR45","unstructured":"A. Menezes, P. C. Van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press (1996)."},{"key":"253937_CR46","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1090\/S0025-5718-99-01040-6","volume":"68","author":"V. M\u00fcller","year":"1999","unstructured":"V. M\u00fcller, A. Stein, and C. Thiel, Computing discrete logarithms in real quadratic congruence function fields of large genus, Math. Comp., Vol. 68 (1999) pp. 807\u2013822.","journal-title":"Math. Comp."},{"key":"253937_CR47","first-page":"91","volume":"55","author":"V. I. Nechaev","year":"1994","unstructured":"V. I. Nechaev, On the complexity of a deterministic algorithm for a discrete logarithm, Math. Zametki, Vol. 55 (1994) pp. 91\u2013101. English translation in Math. Notes, Vol. 55 (1994) pp. 165\u2013172.","journal-title":"Math. Zametki"},{"key":"253937_CR48","unstructured":"Victor Miller's number theory mailing list archive, available at \u2329http:\/\/www.listserv.nodak.edu\u232a."},{"key":"253937_CR49","doi-asserted-by":"crossref","unstructured":"P. L. Montgomery, A block Lanczos algorithm for finding dependencies over GF(2), Advances in Cryptology-EUROCRYPT '95 (L. C. Guillou and J.-J. Quisquater, eds.), Lecture Notes in Computer Science, Springer, 921 (1995) pp. 106\u2013120.","DOI":"10.1007\/3-540-49264-X_9"},{"key":"253937_CR50","doi-asserted-by":"crossref","unstructured":"A. M. Odlyzko, Discrete logarithms in finite fields and their cryptographic significance, Advances in Cryptology: Proceedings of Eurocrypt '84 (T. Beth, N. Cot, and I. Ingemarsson, eds.), Lecture Notes in Computer Science, Springer-Verlag, 209 (1985) pp. 224\u2013314. Available at \u2329http:\/\/www.research.att.com\/\u00bbamo\u232a.","DOI":"10.1007\/3-540-39757-4_20"},{"key":"253937_CR51","doi-asserted-by":"crossref","unstructured":"A. M. Odlyzko, Discrete logarithms and smooth polynomials, Finite Fields: Theory, Applications and Algorithms (G. L. Mullen and P. Shiue, eds.), Contemporary Math., Amer. Math. Soc., 168 (1994) pp. 269\u2013278. Available at \u2329http:\/\/www.research.att.com\/\u00bbamo\u232a","DOI":"10.1090\/conm\/168\/01706"},{"issue":"2","key":"253937_CR52","first-page":"5","volume":"1","author":"A. M. Odlyzko","year":"1995","unstructured":"A. M. Odlyzko, The future of integer factorization, CryptoBytes (The technical newsletter of RSA Laboratories), Vol. 1, No. 2 (1995) pp. 5\u201312. Available at \u2329http:\/\/www.rsa.com\/rsalabs\/pubs\/cryptobytes\/\u232a and \u2329http:\/\/www.research.att.com\/\u00bbamo\u232a.","journal-title":"CryptoBytes (The technical newsletter of RSA Laboratories)"},{"key":"253937_CR53","doi-asserted-by":"crossref","unstructured":"D. Panario, X. Gourdon, and P. Flajolet, An analytic approach to smooth polynomials over finite fields, Algorithmic Number Theory: Third Intern. Symp., ANTS-III, (J. P. Buhler, ed.), Lecture Notes in Math., Springer, 1423 (1998) pp. 226\u2013236.","DOI":"10.1007\/BFb0054865"},{"key":"253937_CR54","first-page":"918","volume":"32","author":"J. M. Pollard","year":"1978","unstructured":"J. M. Pollard, Monte Carlo methods for index computations mod p, Math. Comp., Vol. 32 (1978) pp. 918\u2013924.","journal-title":"Math. Comp."},{"key":"253937_CR55","unstructured":"J. M. Pollard, Kangaroos, Monopoly and discrete logarithms, J. Cryptology (to appear)."},{"key":"253937_CR56","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1080\/10586458.1992.10504250","volume":"1","author":"C. Pomerance","year":"1992","unstructured":"C. Pomerance and J. W. Smith, Reduction of huge, sparse matrices over finite fields via created catastrophes, Experimental Math., Vol. 1 (1992) pp. 89\u201394.","journal-title":"Experimental Math."},{"key":"253937_CR57","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1137\/0217023","volume":"17","author":"C. Pomerance","year":"1988","unstructured":"C. Pomerance, J. W. Smith, and R. Tuler, A pipeline architecture for factoring large integers with the quadratic sieve algorithm, SIAM J. Comput., Vol. 17 (1988) pp. 387\u2013403.","journal-title":"SIAM J. Comput."},{"key":"253937_CR58","unstructured":"RSAData Security factoring challenge. Details and current status available at \u2329http:\/\/www.rsadsi.com\u00bbamo\u232a."},{"key":"253937_CR59","first-page":"409","volume":"A405","author":"O. Schirokauer","year":"1993","unstructured":"O. Schirokauer, Discrete logarithms and local units, Phil. Trans. Royal Soc. London, Vol. A405 (1993) pp. 409\u2013423.","journal-title":"Phil. Trans. Royal Soc. London"},{"key":"253937_CR60","doi-asserted-by":"crossref","unstructured":"O. Schirokauer, Using number fields to compute logarithms in finite fields, Math. Comp. (1999, to appear).","DOI":"10.1090\/S0025-5718-99-01137-0"},{"key":"253937_CR61","unstructured":"O. Schirokauer, manuscript in preparation."},{"key":"253937_CR62","doi-asserted-by":"crossref","unstructured":"O. Schirokauer, D. Weber, and T. Denny, Discrete logarithms: The effectiveness of the index calculus method, Algorithmic Number Theory: Second Intern. Symp., ANTS-II (H. Cohen, ed.), Lecture Notes in Math., Springer, 1122 (1996) pp. 337\u2013362.","DOI":"10.1007\/3-540-61581-4_66"},{"key":"253937_CR63","unstructured":"B. Schneier, Applied Cryptography, 2nd ed., Wiley (1995)."},{"key":"253937_CR64","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C. P. Schnorr","year":"1991","unstructured":"C. P. Schnorr, Efficient signature generation by smart cards, J. Cryptology, Vol. 4 (1991) pp. 161\u2013174.","journal-title":"J. Cryptology"},{"key":"253937_CR65","unstructured":"C. P. Schnorr and M. Jakobsson, Security of discrete log cryptosystems in the random oracle + generic model, to be published."},{"key":"253937_CR66","first-page":"99","volume":"7","author":"I. A. Semaev","year":"1995","unstructured":"I. A. Semaev, An algorithm for discrete logarithms over an arbitrary finite field, Diskret. Mat., Vol. 7 (1995) pp. 99\u2013109 (Russian). English translation in Discrete Math. Appl., Vol. 5 (1995) pp. 107\u2013116.","journal-title":"Diskret. Mat."},{"key":"253937_CR67","doi-asserted-by":"crossref","unstructured":"I. A. Semaev, A generalization of the number field sieve, Probabilistic Methods in Discrete Mathematics (Petrozavodsk, 1996), VSP (1997) pp. 45\u201363.","DOI":"10.1515\/9783112314074-006"},{"key":"253937_CR68","doi-asserted-by":"crossref","first-page":"1679","DOI":"10.1090\/S0025-5718-98-00969-7","volume":"67","author":"I. A. Semaev","year":"1998","unstructured":"I. A. Semaev, An algorithm for evaluation of discrete logarithms in some nonprime finite fields, Math. Comp., Vol. 67 (1998) pp. 1679\u20131689.","journal-title":"Math. Comp."},{"key":"253937_CR69","unstructured":"I. A. Semaev, Special prime numbers and discrete logs in prime finite fields, to be published."},{"key":"253937_CR70","unstructured":"SETI@home distributed computing project. See \u2329http:\/\/setiathome.ssl.berkeley.edu\u232a."},{"key":"253937_CR71","doi-asserted-by":"crossref","unstructured":"A. Shamir, Factoring large numbers with the TWINKLE device, to be published. Available at \u2329http:\/\/jya.com\/twinkle.eps\u232a 72. P. W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J. Comput., Vol. 26 (1997) pp. 1484\u20131509. Available at \u2329http:\/\/www.research.att.com\/\u00bbshor\u232a.","DOI":"10.1137\/S0097539795293172"},{"key":"253937_CR72","doi-asserted-by":"crossref","unstructured":"V. Shoup, Lower bounds for discrete logarithms and related problems, Advances in Cryptology-EUROCRYPT '97 (W. Fumy, ed.), Lecture Notes in Computer Science Springer, 1233 (1997) pp. 256\u2013266.","DOI":"10.1007\/3-540-69053-0_18"},{"key":"253937_CR73","doi-asserted-by":"crossref","unstructured":"J. H. Silverman and J. Suzuki, Advances in Cryptology-ASIACRYPT '98 (K. Ohta and D. Pei, eds.), Lecture Notes in Computer Science, Springer, 1514 (1998) pp. 110\u2013125.","DOI":"10.1007\/3-540-49649-1_10"},{"key":"253937_CR74","unstructured":"K. Soundararajan, Asymptotic formulae for the counting function of smooth polynomials, unpublished manuscript."},{"key":"253937_CR75","doi-asserted-by":"crossref","first-page":"1665","DOI":"10.1090\/S0025-5718-98-00973-9","volume":"67","author":"J. Teitelbaum","year":"1998","unstructured":"J. Teitelbaum, Euclid's algorithm and the Lanczos method over finite fields, Math. Comp., Vol. 67 (1998) pp. 1665\u20131678.","journal-title":"Math. Comp."},{"key":"253937_CR76","doi-asserted-by":"crossref","unstructured":"E. Teske, Speeding up Pollard's rho method for computing discrete logarithms, Algorithmic Number Theory: Third Intern. Symp., ANTS-III (J. P. Buhler, ed.), Lecture Notes in Math., Springer, 1423 (1998) pp. 541\u2013554.","DOI":"10.1007\/BFb0054891"},{"key":"253937_CR77","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/PL00003816","volume":"12","author":"P. C. Van Oorschot","year":"1999","unstructured":"P. C. Van Oorschot and M. J. Wiener, Parallel collision search with cryptanalytic applications, J. Cryptology, Vol. 12 (1999) pp. 1\u201328.","journal-title":"J. Cryptology"},{"key":"253937_CR78","unstructured":"G. Villard, Further analysis of Coppersmith's block Wiedemann algorithm for the solution of sparse linear systems, Proc. ISSAC'97."},{"key":"253937_CR79","doi-asserted-by":"crossref","unstructured":"D. Weber, Computing discrete logarithms with quadratic number rings, Advances in Cryptology-EUROCRYPT '98 (K. Nyberg, ed.), Lecture Notes in Computer Science, Springer, 1403 (1998) pp. 171\u2013183.","DOI":"10.1007\/BFb0054125"},{"key":"253937_CR80","doi-asserted-by":"crossref","unstructured":"D. Weber and T. F. Denny, The solution of McCurley's discrete log challenge, Advances in Cryptology-CRYPTO '98 (H. Krawczyk, ed.), Lecture Notes in Computer Science, Springer, 1462 (1998) pp. 458\u2013471.","DOI":"10.1007\/BFb0055747"},{"key":"253937_CR81","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/TIT.1986.1057137","volume":"32","author":"D. H. Wiedemann","year":"1986","unstructured":"D. H. Wiedemann, Solving sparse linear equations over finite fields, IEEE Trans. Inform. Theory, Vol. 32 (1986) pp. 54\u201362.","journal-title":"IEEE Trans. Inform. Theory"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008350005447.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008350005447\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008350005447.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T03:28:35Z","timestamp":1753759715000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008350005447"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,3]]},"references-count":81,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2000,3]]}},"alternative-id":["253937"],"URL":"https:\/\/doi.org\/10.1023\/a:1008350005447","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2000,3]]}}}