{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T15:29:12Z","timestamp":1774106952203,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/nabic.2013.6617850","type":"proceedings-article","created":{"date-parts":[[2013,10,10]],"date-time":"2013-10-10T19:27:30Z","timestamp":1381433250000},"page":"126-131","source":"Crossref","is-referenced-by-count":4,"title":["Meta heuristics for prime factorization problem"],"prefix":"10.1109","author":[{"given":"Pranav","family":"Dass","sequence":"first","affiliation":[]},{"given":"Harish","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Jagdish Chand","family":"Bansal","sequence":"additional","affiliation":[]},{"given":"Kendall E.","family":"Nygard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"17","article-title":"Digital signatures and public-key encryptions as intractable as factorization","author":"rabin","year":"1979","journal-title":"Technical Report"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1002\/9780470549124","author":"rao","year":"2009","journal-title":"Engineering Optimization Theory and Practice"},{"key":"15","first-page":"85","article-title":"A tale of two sieves","author":"pomerance","year":"2008","journal-title":"Biscuits of Number Theory"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.1996.534790"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.2307\/2005475"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2006.1688535"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2002.1004478"},{"key":"12","first-page":"337","article-title":"A survey of modern integer factorization algorithms","volume":"7","author":"montgomery","year":"1994","journal-title":"CWI Quarterly"},{"key":"3","author":"eberhart","year":"2001","journal-title":"Swarm Intelligence"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.7326\/0003-4819-110-11-916"},{"key":"2","first-page":"895911","article-title":"A new crossover operator for real coded genetic algorithms","volume":"188","author":"thakur","year":"2007","journal-title":"Applied Mathematics and Computation"},{"key":"20","author":"schwefel","year":"1993","journal-title":"Evolution and Optimum Seeking The Sixth Generation"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s002000100088"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.na.2005.03.003"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1201\/9781420075199"},{"key":"5","author":"goldberg","year":"1989","journal-title":"Genetic Algorithms in Search Optimization and Machine Learning"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1364\/OPEX.13.000545"},{"key":"9","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/978-3-642-14623-7_18","article-title":"Factorization of a 768-bit rsa modulus","author":"kleinjung","year":"2010","journal-title":"Advances in Cryptology-CRYPTO 2010"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1997.637339"}],"event":{"name":"2013 World Congress on Nature and Biologically Inspired Computing (NaBIC)","location":"Fargo, ND, USA","start":{"date-parts":[[2013,8,12]]},"end":{"date-parts":[[2013,8,14]]}},"container-title":["2013 World Congress on Nature and Biologically Inspired Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6603433\/6617834\/06617850.pdf?arnumber=6617850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T12:12:12Z","timestamp":1564488732000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6617850\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/nabic.2013.6617850","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}