<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">The Method of Factorizing Multi-Digit Numbers Based on the Operation of Adding Odd Numbers</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Mykhailo</forename><surname>Kasianchuk</surname></persName>
							<email>kasyanchuk@ukr.net</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer Engineering</orgName>
								<orgName type="institution" key="instit1">Ternopil National Economic University</orgName>
								<orgName type="institution" key="instit2">UKRAINE</orgName>
								<address>
									<settlement>Ternopil</settlement>
								</address>
							</affiliation>
							<affiliation key="aff7">
								<orgName type="institution">Shevchenko Str</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Igor</forename><surname>Yakymenko</surname></persName>
							<email>iyakymenko@ukr.net</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer Engineering</orgName>
								<orgName type="institution" key="instit1">Ternopil National Economic University</orgName>
								<orgName type="institution" key="instit2">UKRAINE</orgName>
								<address>
									<settlement>Ternopil</settlement>
								</address>
							</affiliation>
							<affiliation key="aff7">
								<orgName type="institution">Shevchenko Str</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Stepan</forename><surname>Ivasiev</surname></persName>
							<email>stepan.ivasiev@gmail.com</email>
							<affiliation key="aff2">
								<orgName type="department">Department of Cyber Security</orgName>
								<orgName type="institution" key="instit1">Ternopil National Economic University</orgName>
								<orgName type="institution" key="instit2">UKRAINE</orgName>
								<address>
									<settlement>Ternopil</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ruslan</forename><surname>Shevchuk</surname></persName>
							<affiliation key="aff4">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Ternopil National Economic University</orgName>
								<orgName type="institution" key="instit2">UKRAINE</orgName>
								<address>
									<settlement>Ternopil</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Lidiya</forename><surname>Tymoshenko</surname></persName>
							<affiliation key="aff6">
								<orgName type="department">Department of Computer Science and Information Systems Management</orgName>
								<orgName type="institution" key="instit1">Odesa National Polytechnic University</orgName>
								<orgName type="institution" key="instit2">UKRAINE</orgName>
								<address>
									<settlement>Odesa</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="department">Chekhova</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff3">
								<orgName type="institution">Chekhova str</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff5">
								<orgName type="department">Chekhova</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">The Method of Factorizing Multi-Digit Numbers Based on the Operation of Adding Odd Numbers</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">1B8ECB9F54B0FBE8BBAF19075BC48537</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T02:22+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>factorization</term>
					<term>Fermat method</term>
					<term>addition</term>
					<term>multi-digit numbers</term>
					<term>time complexity</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The method for factorizing multi-digit numbers based on the addition of odd numbers is developed in this article. The temporal characteristics of software implementations of the proposed method, the classical Fermat method and its improvement are experimentally investigated. It is revealed that the proposed algorithm, whose time reduction is linear, has an advantage over the other two with a large difference between the multipliers that are factorized. Other dependencies are declining parabolic.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>I. INTRODUCTION</head><p>The factorization of a natural number or its decomposition into simple multipliers belongs to the main problems of the modern theory of numbers <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref>, various forms of the system of residual classes <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref> and plays an important role in cryptographic information security systems <ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref>. As a rule, large-scale computing and time resources are required for the expansion of the multiplicity of the number obtained as a result of the product of two large prime numbers <ref type="bibr" target="#b8">[9]</ref>.</p><p>This circumstance is used in cryptographic algorithms as protection against potential hacking attempts: for the creation and multiplication of two prime numbers of large bits, it does not require significant costs <ref type="bibr" target="#b9">[10]</ref>, and their factorization is a long and laborious process. Despite the considerable efforts of scientists in this direction, to date, there are no quantum algorithms for factorizing multi-digit numbers, which allow executing the timetable for the multipliers at a practical time. But the proof that there is no solution to this problem in polynomial time is also absent <ref type="bibr" target="#b10">[11]</ref>.</p><p>Particular interest to the factorization problem was the emergence of cryptographic algorithm encryption RSA, which uses its computational complexity <ref type="bibr" target="#b11">[12]</ref>.</p><p>The decomposition of numbers containing in a binary record up to 768 bits inclusive was obtained for polynomial time by the modern methods (in particular, the general method of the numerical field sieve) <ref type="bibr" target="#b12">[13]</ref>. However, further increase in the dimension significantly increases the complexity of the scheduling operation of a composite number. In connection with this, it is necessary to develop other approaches to solving the problem of factorization of integers.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>II. FERMAT'S FACTORIZATION METHOD</head><p>Fermat's method is the most widely used method <ref type="bibr" target="#b10">[11]</ref>, which is based on the search for pairs of natural numbers А and В, for which equality n=A 2 -B 2 is performed, where n=p⋅q is known integer, which is the product of two unknown primes p and q, which should be found.</p><p>For this purpose [ ]</p><formula xml:id="formula_0">n m =</formula><p>is searched and then the parameter f(x)=(m+x) 2 -n is calculated, where x=1, 2, 3, … , as long as some value f(x) will not be equal to the full square of a number, for example В 2 .</p><p>Then, respectively, А 2 =(m+x) 2 and the desired decomposition will be n=p⋅q= А 2 -В 2 =(А-В)(А+В).</p><p>The most computable complex operations in this case are elevation to a square and the search for a square root. In <ref type="bibr" target="#b13">[14]</ref>, an improved Fermat's factorization method is proposed, where the condition is used that squares of integers can be represented as a sum of odd numbers, the number of which is equal to this number:</p><formula xml:id="formula_1">( ) ∑ = − = s i i s 1 2 1 2</formula><p>.</p><p>(1) Therefore, having found m та f1(x)=f(x) when х=1, the following steps occur according to the expression fi=fi-1+2(m+i)-1, where і=2, 3, 4, … as long as fi will not be a full square of a certain number.</p><p>The decomposition for multipliers will be determined by this expression: n=(m+i-fi)( m+i+fi). Table <ref type="table" target="#tab_0">1</ref> provides an example of factorization using the classical and improved Fermat's method for n=4717</p><formula xml:id="formula_2">( [ ]<label>68</label></formula><formula xml:id="formula_3">4717 1 = = m</formula><p>). Thus the decomposition of the number 4717 on simple multipliers is obtained: 4717=71 2 -18 2 =(71+18)(71-18)=89⋅53. It should be noted that the number of iterations in both methods is the same. However, in the improved Fermat's method, the operation of elevating to a square of large numbers is excluded. In addition, arithmetic operations are performed over numbers of a much smaller digit than the classical ones. But the most computationally labor-intensive operation is the extraction of a square root.</p><p>Therefore, the purpose of our work is to develop a factorization algorithm based on the Fermat's method, in which there will be no square root search operation, which is especially important for work with numbers of large bit rate for the experimental study, as well as an experimental study of the time characteristics of the software implementation of the Fermat's method, its modification and the proposed algorithm.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>III. DESCRIPTION OF THE PROPOSED FACTORIZATION ALGORITHM</head><p>The property ( <ref type="formula">1</ref>) is also used in the proposed algorithm, the parameters m1=m and f11=f1 are calculated similarly to the previous case. Then the sequence of operations f1і=f1 і-1-r1 і-1, r11=1, r1 і-1=2i-3=r1 і-2+2, i=2, 3, … are performed until the condition for some і is not fulfilled: f1і-r1і≤0.</p><p>(2) Further calculations occur in such a way when performing a strict inequality (2): m2=m1+1; f21=f1і+2 m2+1-r1і, r21=r1і+2. Searching for the following values f2і, r2і is carried out in the same way as the previous case. In the general case, these calculations can be described by the following expressions: fj і+1= fjі-rjі≤0, rj i+1=rjі+2, if fjі-rjі&gt;0;</p><p>(3) are determined which will be a positive integer, the desired quantity, which will be a natural number.</p><formula xml:id="formula_4">fj+1 1= fjі+2mj+1-rjі≤0, rj i+1=rjі+2, if fjі-rjі&lt;0. (<label>4</label></formula><p>It should be noted that in this case the value of the parameter j corresponds to the number of steps in the classical and improved Fermat's method.  </p><formula xml:id="formula_5">  n n q − = 2 r1=1   1 2 2 + ⋅ = n r q= q+r2 r1= r1+2 q = q -r1 q-r1&gt; r1+2 r2= r2+2 q=0 (r2-1)/2-(r1-1)/2 end</formula><p>Consequently, the decomposition of the number 4717 into simple multipliers are carried out in this way:</p><p>( )</p><formula xml:id="formula_6">18 4717 3 68 2 = − + = B , 4717=71 2 -18 2 =(71+18)⋅ ⋅(71- 18)=89⋅53</formula><p>. This procedure is performed without the use of a computationally cumbersome operation extracting the square root. Additionally, addition and subtraction are performed over smaller numbers than in the two previous methods, although the number of these operations is greater.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>IV. EXPERIMENTAL STUDY OF TIME CHARACTERISTICS OF FACTORIZATION METHODS</head><p>The multiplier р was chosen to be fixed and equal to the largest prime number of a certain bit rate for the experimental study of the factorization of the number n=p⋅q.</p><p>Then, a number of prime numbers of the same digit are determined that of p, of which 1000 values for the number q were selected uniformly in the order of growth.</p><p>After multiplying p by q, the timer fixed the factorization time for each of the 1000 received products. The time characteristics of the software implementation of the classical (curve 1) and improved (curve 2) Fermat's methods, as well as the proposed algorithm (curve 3) are presented in Figures <ref type="figure">2 and 3</ref> for the bit rates 30 (р=1073741789) and 32 (р=4294967291) bits respectively. All calculations were carried out on a portable computer Lenovo B50-70 with processor Intel Pentium 3558U (1.7 GHz). The amount of RAM in the device was 4 GB. When designing the computing software, a high level programming language C ++ was selected, which allows you to transform the codes into different architectures and operating systems.</p><p>All graphics are descending character, indicating a decrease in the factorization time with a decrease in the difference between the multipliers, whose product is factorized. The proposed algorithm, whose time reduction is linear, has an advantage over the other two at small values of q. With increasing q the least time is characterized by an improved Fermat's algorithm.</p><p>Further growth of q leads to the fact that the proposed algorithm uses the most time compared to the other two. It should be noted that with increasing the bit rate number of the point of intersection of the straight line with the curves obtained by using the Fermat's method, are shifted to the left on the graphs.</p><p>Figure <ref type="figure">4</ref> depicts the graphs of the dependence of the average factorization time of three methods on the bit rate number for 1000 values selected by the above-described method. It can be seen that all graphs grow in parabolic law with increasing bit rate. The least average factorization time is characterized by an improved Fermat's algorithm, and the largest one is classical. Fig. <ref type="figure">4</ref>. Graphs of the dependence of the average factorization time on the number of digits: 1 -the classical Fermat's method; 2 -an improved Fermat's method; 3 -the proposed algorithm Consequently, it is advisable to apply the proposed method when there is a big difference between the numbers whose product is to be factorized.</p><p>The Table <ref type="table" target="#tab_2">3</ref> shows the results of the factorization of the product of two prime numbers for a fixed р=3571 and a variable q (t1 -the classical Fermat's method, t2 -the improved Fermat's method, t3 -the proposed algorithm).</p><p>It can be seen from the Table <ref type="table" target="#tab_2">3</ref> that the improved Fermat's method increases the speed factorization approximately into 1.1-1.2 times, and the proposed method -into 5-11 times compared with the classical Fermat's method. </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>) Under the condition fjі-rjі=0, the desired quantities А=(m+j) and</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 1 Fig. 1 .</head><label>11</label><figDesc>Fig. 1. Block diagram of the developed algorithm</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 2 .Fig. 3 .</head><label>23</label><figDesc>Fig. 2. Time characteristics of software implementation of factorization methods for multipliers with bit rate 30 bits (jnumber in the sample)</figDesc><graphic coords="3,42.60,350.65,242.50,147.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>TABLE 1 .</head><label>1</label><figDesc>EXAMPLE OF THE FACTORIZATION OF THE NUMBER 4717 USING CLASSICAL AND IMPROVED FERMAT'S METHOD</figDesc><table><row><cell cols="2">х m+x</cell><cell>f(x), classical</cell><cell>f(x), improved method</cell></row><row><cell></cell><cell></cell><cell>method</cell><cell></cell></row><row><cell>1</cell><cell>62</cell><cell>69 2 -4717=44</cell><cell>62 2 -4717=44</cell></row><row><cell>2</cell><cell>63</cell><cell>70 2 -4717=183</cell><cell>44+139=183</cell></row><row><cell>3</cell><cell>64</cell><cell>71 2 -4717=324=18 2</cell><cell>183+141=324=18 2</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>TABLE 2 .</head><label>2</label><figDesc>THE EXAMPLE OF FACTORIZATION OF THE NUMBER 4717 BY THE PROPOSED ALGORITHM</figDesc><table><row><cell>i</cell><cell>j=1, m1=68</cell><cell></cell><cell>j=2, m2=69</cell><cell></cell><cell cols="2">j=3, m3=70</cell></row><row><cell></cell><cell>f1i</cell><cell>r1i</cell><cell>f2i</cell><cell>r2i</cell><cell>f3i</cell><cell>r3i</cell></row><row><cell>1</cell><cell>69 2 -4717= 44</cell><cell>1</cell><cell>8+139-13= 134</cell><cell>15</cell><cell cols="2">14+141-27= 128</cell><cell>29</cell></row><row><cell>2</cell><cell>44-1=43</cell><cell>3</cell><cell>134-15= 119</cell><cell>17</cell><cell>128-29= 99</cell><cell></cell><cell>31</cell></row><row><cell>3</cell><cell>43-3=40</cell><cell>5</cell><cell>119-17=102</cell><cell>19</cell><cell>99-31=68</cell><cell></cell><cell>33</cell></row><row><cell>4</cell><cell>40-5=35</cell><cell>7</cell><cell>102-19=83</cell><cell>21</cell><cell>68-33= 35</cell><cell></cell><cell>35</cell></row><row><cell>5</cell><cell>35-7=28</cell><cell>9</cell><cell>83-21=62</cell><cell>23</cell><cell>35-35=0</cell><cell></cell></row><row><cell>6</cell><cell>28-9=19</cell><cell>11</cell><cell>62-23=39</cell><cell>25</cell><cell></cell><cell></cell></row><row><cell>7</cell><cell>19-11= 8&lt;13</cell><cell>13</cell><cell>39-25=14&lt;27</cell><cell>27</cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>TABLE 3 .</head><label>3</label><figDesc>INVESTIGATION OF THE TIME CHARACTERISTICS</figDesc><table><row><cell>р</cell><cell>q</cell><cell>p⋅q</cell><cell>t1, s</cell><cell>t2, s</cell><cell>t3, s</cell></row><row><cell>3571</cell><cell>99991</cell><cell>357067861</cell><cell></cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>

			<div type="funding">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>0,031 0,031 0,016 3571 323789 1156250519 0,172 0,157 0,032 3571 523771 1870386241 0,297 0,281 0,047 3571 723791 2584657661 0,438 0,406 0,063 3571 1913803 6834190513 1,156 1,109 0,203 3571 2913803 10405190513 1,781 1,703 0,313 3571 7913809 28260211939 4,86 4,656 0,875 3571 9913807 35402204797 6,265 5,828 1,094 3571 19191383 68532428693 12,843 12,156 2,407 3571 39192331 139955814001 26,875 26,235 4,969 3571 49392341 176380049711 32,859 34,406 6,172 3571 139392347 497770071137 103,078 86,391 18,031 3571 337392373 1204828163983 214,141 220,375 42,483 3571 931392317 3326001964007 646 571,828 116,453 3571 1931392319 6897001971149 1112,657 1106,469 269,156 3571 2971215073 10610209025683 2775,718 2765,922 437,531 3571 6712170737 23969161701827 11159,56 9080,454 937,67</p></div>
			</div>

			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>V. CONCLUSIONS</head><p>This paper is devoted to the experimental study of the time complexity for the factorization of many digit numbers using the classical and improved Fermat method, and also the factorization algorithm based on the subtraction operation is proposed and investigated. Appropriate graphic dependencies have been constructed. It is shown that the proposed algorithm is characterized by less temporal complexity in the case where the big difference between the numbers whose product must be factorized.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><surname>Venturi</surname></persName>
		</author>
		<title level="m">Lecture Notes on Algorithmic Number Theory</title>
				<meeting><address><addrLine>New-York-Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page">217</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">On an approach to the problem of the factorization of natural numbers</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ishmukhametov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Boyko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Zyatdinov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of High Schools. Mathematics</title>
				<meeting>High Schools. Mathematics</meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="15" to="22" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Computational Introduction to Number Theory and Algebra</title>
		<author>
			<persName><forename type="first">V</forename><surname>Shoup</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>Cambridge University Press</publisher>
			<biblScope unit="page">600</biblScope>
		</imprint>
	</monogr>
	<note>Sec.Edition</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The Construction of the modified Perfect Form of Residual Classes System Using Factorization</title>
		<author>
			<persName><forename type="first">M</forename><surname>Kasianchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Radio Electronics, Computer Science, Control</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="page" from="53" to="59" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Theoretical Foundations of the Modified Perfect Form of Residue Number System</title>
		<author>
			<persName><forename type="middle">M</forename><surname>Ya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Nykolaychuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">Z</forename><surname>Kasianchuk</surname></persName>
		</author>
		<author>
			<persName><surname>Yakymenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybernetics and Systems Analysis</title>
		<imprint>
			<biblScope unit="volume">52</biblScope>
			<biblScope unit="page" from="219" to="223" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Practical cryptography: algorithms and their programming</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Agranovsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Hadi</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Solon-Press</publisher>
			<biblScope unit="page">256</biblScope>
			<pubPlace>Moscow</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Theoretical and numerical algorithms in cryptography</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">N</forename><surname>Vasilenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Moscow: Center for Continuous Mathematical Education</title>
				<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page">326</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Course of Number Theory and Cryptography</title>
		<author>
			<persName><forename type="first">N</forename><surname>Koblitz</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001">2001</date>
			<publisher>TVP</publisher>
			<biblScope unit="page">260</biblScope>
			<pubPlace>Moscow</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Prime Numbers: A Computational Perspective. Chapter 5: Exponential Factoring Algorithms</title>
		<author>
			<persName><forename type="first">R</forename><surname>Crandall</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Pomerance</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>Springer-Verlag</publisher>
			<biblScope unit="page" from="2" to="6" />
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Vector Module Exponential in the Remaining Classes System</title>
		<author>
			<persName><forename type="first">D</forename><surname>Kozaczko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ivasiev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Yakymenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kasianchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS&apos;2015)</title>
				<meeting>the 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS&apos;2015)<address><addrLine>Warsaw, Poland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="161" to="163" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Methods for the factorization of natural numbers: a tutorial</title>
		<author>
			<persName><surname>Ishmukhametov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page">190</biblScope>
			<pubPlace>Kazan</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Kazan University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Theoretical and numerical methods in cryptography: Textbook</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">B</forename><surname>Makhovenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Helios ARV</title>
		<imprint>
			<biblScope unit="page">320</biblScope>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<ptr target="https://www.emc.com/emc-%20plus/rsa-labs/historical/the-rsa-challenge-numbers.htm" />
		<title level="m">RSA Challenge</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Advanced method of factorization of multi-bit numbers based on Fermat&apos;s theorem in the system of residual classes</title>
		<author>
			<persName><forename type="first">M</forename><surname>Karpiński</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ivasiev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Yakymenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kasianchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Gancarczyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of 16th International Conference on Control, Automation and Systems (ICCAS-2016)</title>
				<meeting>of 16th International Conference on Control, Automation and Systems (ICCAS-2016)<address><addrLine>Gyeongju, Korea</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016-10">October, 2016</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="1484" to="1486" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
