Kernel Factor Pairs for Semiprime Factorization

Abstract

We show that any semiprime number can be factorized as the product of two prime numbers in the form of a kernel factor pair of two out of 48 root numbers. Specifically, each natural number without factors of 2, 3, 5 and 7 can be traced back to one unique number of a total of 48 root numbers falling in [ 11,220 ] in periods of length 210. Unlike the commonly used sieve-based methods, under no preconditions, will the proposed kernel-factor-pair-based algorithm be guaranteed to successfully factorize any given semiprime α by searching over 1/2 logα binary variables. The proposed method is well structured for factorization in breaking RSA encryption and is readily applicable for parallel computation.

Share and Cite:

Li, H.-L., Fang, S.-C., Kuo, W. and Lin, N.R. (2025) Kernel Factor Pairs for Semiprime Factorization. Advances in Pure Mathematics, 15, 629-642. doi: 10.4236/apm.2025.159032.

1. Introduction

One of the greatest theorems of mathematics states that any natural number can be represented uniquely as a product of primes [1] [2]. Over years, prime numbers have been an important topic of number theory [3] [4]. Primes exhibit numerous interesting properties and are widely used in many fields in recent years, such as data science, cryptography , color theory [5] and reliability design .

Semiprime factorization methods are to decompose a semiprime number into its two prime factors, which serve as the key to cryptography including RSA public key encryption and RSA digital signature [6]-[12].

To the best of our knowledge, almost all available semiprime factorization methods are sieve-based, which can be classified into the following three categories [13] [14]:

  • Category 1: The Trivial Sieve Method [15] comes from the well-known Aristotle sieve technique of utilizing exhaustive brute force to factorize a semiprime number. The Wheel Sieve Method [16] [17] identifies potential prime numbers starting from a small wheel and expanding to larger ones which improves the Trivial Sieve Method.

  • Category 2: The Quadratic Sieve Method [18] includes the Pollard’s Rho [19] and Lenstra Elliptic Curve techniques [20]-[22].

  • Category 3: The General Sieve Method [8] [23] includes the General Number Field Sieve (GNFS) and Schnorr methods [24]-[26].

Each of the above-mentioned sieve-based methods may suffer from the following limitations:

i) They often employ heuristic techniques to factorize a semiprime number, guaranteeing no convergence to a feasible solution. For example, the GNFS method depends on the specification of two polynomial functions [13] [23]. Similarly, since Pollard’s Rho method [19] is a probabilistic algorithm, it may not reach a convergent solution.

ii) Some require a good deal of pre-known information in the factorization process. For example, the Trivial Sieve method needs to know all prime numbers smaller than α beforehand to factorize a semiprime number α , while the GNFS method likely uses more than half of its computing time to detect whether a number is smooth or not [13].

iii) Sieve methods often induce high space complexity. For example, to factorize a semiprime α , the Trivial Sieve method needs to reserve a large memory space to store α pre-known primes for computations. The space complexity gets higher as α grows larger.

iv) Often needed by some of the methods are the special structure for a given semiprime. For example, the GNFS method can only factorize a semiprime with limited smoothness values [13]. Similarly, Pollard’s Rho [19] and Elliptic Curve [22] methods are special purpose algorithms, whose running time depends on the size of the smaller prime factor of a given semiprime number.

v) Wheel Sieve is an improvement of the method of Sieve of Eratosthenes. Such methods are intended to construct a prime list using the first few primes. Pritchard’s method [16], proposed in 1982, is one of the early works that explored the concept of wheels for factorization. The idea has been elaborated by others such as [17] into various forms. The wheel-sieve-based algorithms in general suffer from the difficulties of clearly identifying or distinguishing primes and composites. Consequently, the solutions usually get fuzzy when the involved numbers become large.

Recently, Li, Fang and Kuo discovered the Periodic Table of Primes (PTP) which reveals all primes and composites with no factors of 2, 3, 5 and 7 exclusively in a compact table. One unique feature of the PTP is to identify the cyclic appearance of composites through the Cyclic Table of Composites (CTC) , and then differentiate primes and composites from a feasible set like that used in the wheel sieve, but subject to no preconditions. The PTP clearly shows that the ratio of the number of primes to that of the composites approaches zero when the table size grows. An early version of the SSRN archive [28] also provided examples to highlight the potential of using the PTP for factorization.

To overcome the general difficulties and limitations of sieve-based factoring methods, we now propose an innovative scheme for semiprime factorization. By extending our previous work of building the PTP [27], we introduce the concepts of “factor pairs” and “kernel factor pairs” for fast factorization. A short table of all factor pairs listed in 48 rows and 28 columns is constructed to steer the factorization of any given semiprime under no preconditions. With the Factor-Pairs Table (Table 1) in hand, there is no need to know, calculate, and store any primes that come before α for a given semiprime α . This may significantly reduce the space complexity issue faced by some sieve-based methods. The number of potential factor pairs involved in selecting a kernel factor pair corresponding to a given semiprime α naturally leads to the design of a highly parallelable algorithm for semiprime factorization.

The proposed method is well structured for semiprimes factorization when breaking RSA encryption and readily applicable for parallel computation.

The rest of the paper is organized as follows. In Section 2, we introduce the basic theory of semiprime factorization based on the concepts of factor pair and kernel factor pair. In Section 3, we provide a framework of designing a Linear-search Factor-pair Kernel (LFK) algorithm for semiprime factorization. The proposed LFK algorithm is presented in Section 4 while a complexity analysis is given in Section 5. An illustrative example is provided in Section 6. The paper ends with conclusions and discussions in Section 7.

The following notations are used throughout the paper:

  • α : a semiprime number

  • N 0 ={ 0,1,2, } : all non-negative integers

  • N={ 1,2,3, } : all natural numbers

  • Λ = { nN|n>1 and n has no factors of 2, 3, 5 and 7}

  • P = { nN|n>1 and n is a prime}: all prime numbers

  • P S = { nN|n is a product of two primes}: all semiprime numbers

  • [ a,b ] N ={ nN|anb }

  • FT 210 = a table of 48 rows and 28 columns consisting of all factor-pairs

  • x = ceiling function of the smallest integer greater than or equal to x

  • x = floor function of the largest integer smaller than or equal to x

2. Basic Theory

For a given number nN , it is relatively easy to identify if it has any factor of 2, 3, 5 and 7. Since 2×3×5×7=210 , we may group every 210 numbers in one period starting from 11, i.e., [ 11,220 ] N , [ 221,430 ] N , [ 431,640 ] N , … Checking the numbers in [ 11,220 ] N , we can identify 48 numbers which have no factors of 2, 3, 5 and 7, i.e., [ 11,220 ] N Λ=48 . These 48 numbers are listed as the roots (root numbers) in the following set:

S={ r 1 =11 , r 2 =13, r 3 =17, r 4 =19, r 5 =23, r 6 =29, r 7 =31, r 8 =37, r 9 =41, r 10 =43, r 11 =47, r 12 =53, r 13 =59, r 14 =61, r 15 =67, r 16 =71, r 17 =73, r 18 =79, r 19 =83, r 20 =89, r 21 =97, r 22 =101, r 23 =103, r 24 =107, r 25 =109, r 26 =113, r 27 =121, r 28 =127, r 29 =131, r 30 =137, r 31 =139, r 32 =143, r 33 =149, r 34 =151, r 35 =157, r 36 =163, r 37 =167, r 38 =169, r 39 =173, r 40 =179, r 41 =181, r 42 =187, r 43 =191, r 44 =193, r 45 =197, r 46 =199, r 47 =209, r 48 =211 }.

A quick observation shows that 5 roots in S are composite numbers, namely, r 27 =121=11×11 , r 32 =143=11×13 , r 38 =169=13×13 , r 42 =187=11×17 and r 47 =209=11×19 , and the rest 43 root numbers in S are primes.

An immediate result shows that any natural number α without factors of 2, 3, 5 and 7, no matter it is a prime or composite number, can be traced back to a unique root r i S .

Theorem 1.

A number αΛ if and only if there exists a unique r i S and k N 0 such that α= r i +210×k .

Proof.

i) If α= r i +210×k for any r i S and k N 0 , then αΛ because r i is the residue of α divided by 2, 3, 5 and 7.

ii) If αΛ , then we let k= ( α10 )/ 210 N 0 and α210×k [ 11,220 ] N Λ . Hence there exists a unique r i S such that α= r i +210×k . ◻

Theorem 1 ensures that every number α without factors of 2, 3, 5 and 7 is an offspring of one unique root r i S in the k -th period of 210. Here we emphasize that any prime number greater than 10 is rooted back to a unique r i S . Moreover, we enlist all numbers without factors of 2, 3, 5 and 7 as below:

Period k=0 , [ 11,220 ] N Λ={ q 1 = r 1 , q 2 = r 2 ,, q 48 = r 48 } .

Period k=1 , [ 221,430 ] N Λ={ q 1 +210, q 2 +210,, q 48 +210 } ,

Period k= k ¯ , [ 11+210 k ¯ ,220+210 k ¯ ] N Λ={ q 1 +210× k ¯ , q 2 +210× k ¯ ,, q 48 + 210× k ¯ } .

We now focus on semiprime numbers. Since any semiprime α P S is a product of two primes and it is easy to identify if α has any factor of 2, 3, 5 or 7, without loss of generality, we may limit our consideration to α P S Λ . In this case, from Theorem 1, there exists a unique r i S , k i N 0 such that

α= r i +210 k i . (1)

Moreover, there must exist r j , r j ^ S and k j , k j ^ N 0 such that

α=( r j +210 k j )×( r j ^ +210 k j ^ ) . (2)

Note that r j = r j ^ and/or k j = k j ^ are allowed.

Equation (1) and Equation (2) require that

r j × r j ^ r i 210 = k i ( k j × r j ^ + k j ^ × r j +210 k j × k j ^ ).

Therefore, r j × r j ^ r i has to be a multiple of 210. We call ( r j , r j ^ )S×S a factor pair with respect to r i S and denote the pair by ( q j|i , q j ^ |i ) where q j|i = r j and q j ^ |i = r j ^ . When r j = r j ^ , we call ( q j|i = r j , q j ^ |i = r j ^ ) a co-factor pair with respect to r i .

Obtained through some elaborative calculations, the Factor-Pairs Table FT 210 (Table 1) shows all factor/co-factor pairs ( q j|i , q j ^ |i )S×S with respect to each r i S in the arrangement of q j|i q j ^ |i . For each r i S , i=1,2,,48 , we define Q( i )={ ( q j|i , q j ^ |i )S×S| q j|i q j ^ |i and q j|i × q j ^ |i r i isamultipleof210 } .

From FT 210 , we see that (i) for i=18,25,27,34,38 and 48, | Q( i ) |=28 with 4 co-factor pairs, (ii) for the rest 42 r i ’s, | Q( i ) |=24 with no co-factor pairs, and (iii) q j|i × q j ^ |i r i for all r i S .

Summarizing the above, we reach the next result.

Theorem 2.

For any given semiprime α with no factors of 2, 3, 5 and 7, i.e., α P S Λ , there exists a unique r i S with k i N 0 and a factor pair ( q j|i , q j ^ |i )Q( i ) with k j , k j ^ N 0 such that

α= r i +210 k i =( q j|i +210 k j )×( q j ^ |i +210 k j ^ ) . (3)

It is important to note that since the factorization of a semiprime α is unique, the corresponding factor pair of α , i.e., ( q j|i , q j ^ |i )Q( i ) , is unique. We call it the kernel factor pair associated with the semiprime α .

3. Algorithm Design

Based on Theorem 2, we introduce the overall design of an algorithm for semiprime factorization based on the kernel factor pair.

For a given semiprime α , it is easy to check if α has a factor of 2, 3, 5 or 7. Without loss of generality, we may assume that α P S Λ . The root number r i S can be readily identified by computing

r i =α α10 210 ×210 (4)

with

k i = α10 210 .

Once r i is determined for i{ 1,,48 } , then we check each factor pair ( q j|i , q j ^ |i )Q( i ) to see if Equation (3) is satisfied by certain k j , k j ^ N 0 . If the answer is Yes, then ( q j|i ,  q j ^ |i ) is a kernel factor pair for factoring α , and the existence and uniqueness of a kernel factor pair in Q( i ) for α r i ( mod210 ) is assured by Theorem 2.

For a given factor pair ( q j|i , q j ^ |i )Q( i ) , to check if it is a kernel factor pair for α is equivalent to finding θ and θ ^ N 0 such that

α=( q j|i +210×θ )( q j ^ |i +210× θ ^ ),

or equivalently,

α q j|i × q j ^ |i 210 = q j|i × θ ^ + q j ^ |i ×θ+210×θ× θ ^ .

Denoting

σ j|i = α( q j|i × q j ^ |i ) 210 ( α 11 2 210 ), (5)

we have

σ j|i = q j|i × θ ^ + q j ^ |i ×θ+210×θ× θ ^ . (6)

Consequently, we may perform a less desirable “quadratic search” on θ, θ ^ { 0,1,, σ j|i / 11 } simultaneously to see if ( q j|i , q j ^ |i ) is a kernel factor pair for α .

4. LFK—A Linear Search Algorithm

To reduce the complexity involved in the quadratic search, we conduct further analysis to reach a “linear search” algorithm. The algorithm presented here is closely related to the theoretical framework developed in [29], which involves an innovative algorithm for general primality testing. In this paper, matching the concept of “factor pairs” with the characteristics of “semiprime”, we focus on developing an elaborated algorithm specifically for semiprime factorization.

Without loss of generality, we assume that θ θ ^ 0 in Equation (6) which leads to

σ j|i 210×θ× θ ^ 210 θ ^ 2 .

Together with Equation (5), we have

θ ^ 2 σ j|i 210 α 11 2 210 2 .

Hence θ ^ α / 210 . This means that it is sufficient to check for θ ^ { 0,1,, α / 210 } .

Once θ ^ is selected, Equation (6) indicates that

θ= σ j|i q j|i × θ ^ q j ^ |i +210 θ ^ (7)

should be an integer greater than or equal to θ ^ .

Our approach leads to the following LFK method for semiprime factorization.

Step1: Input a semiprime number α . If α can be fully divided by 2, 3, 5 or 7, then stop with a simple factorization.

Step2: Determine the root number r i S .

  • Set r i =α α10 210 ×210 .

Step3: Determine the kernel factor pair in Q( i ) .

  • Pick one unchecked factor pair a time in Q( i ) from FT 210 , say ( q j|i , q j ^ |i ) .

  • Set σ j|i = ( α q j|i × q j ^ |i )/ 210 .

Step4: Check for possible θ θ ^ 0 .

  • For θ ^ { 0,1,, α / 210 } , compute θ using Equation (7).

  • If θ is an integer and θ θ ^ , then output ( q j|i , q j ^ |i ) as the kernel factor pair and α=( q j|i +210×θ )×( q j ^ |i +210× θ ^ ) . Stop the algorithm.

Step5: Check for possible 0θ θ ^ .

  • For θ{ 0,1,, α / 210 } , compute

θ ^ = σ j|i q j ^ |i ×θ q j|i +210θ .

  • If θ ^ is an integer and θ ^ >θ , then output ( q j|i , q j ^ |i ) as the kernel factor pair and α=( q j|i +210×θ )×( q j ^ |i +210× θ ^ ) . Stop the algorithm.

Step6: Mark the current factor pair as “checked” and Return to Step 3 for the next unchecked factor pair in Q( i ) .

As a direct consequence of Theorem 2, we obtain the next result.

Corollary 3.

The proposed LFK algorithm always terminates in finite steps with a unique kernel factor pair for any given semiprime α .

5. Complexity Analysis

For any given semiprime number α P S , we know α= p 1 × p 2 for a unique pair of p 1 P and p 2 P . Except that p 1 or p 2 is 2, 3, 5 or 7, which can be easily verified, α has no factors of 2, 3, 5 and 7, i.e., α P S Λ . Theorem 1 assures that α has a unique root number r i S . Table FT 210 shows that there are either 24 or 28 factor pairs in Q( i ) for a semiprime rooted at r i .

Theorem 2 further confirms the existence of a unique kernel factor pair ( q j|i , q j ^ |i )Q( i ) such that α can be factorized as the product of ( q j|i +210×θ ) and ( q j ^ |i +210× θ ^ ) .

Steps 1 - 3 of the LFK Algorithm set up the platform with simple calculations. Considering the possible relations between θ and θ ^ , the desired kernel factor pair can be identified by searching through 1+ α / 210 integer values for θ ^ first and then, when needed, searching through 1+ α / 210 integer values for θ . Therefore, the LFK algorithm involves at most 28×2=56 linear searches over 1+ α / 210 integer values. In other words, a rough estimation of the required work for factoring a semiprime α involves no more than searching through 56× α / 210 α /4 integer values. The previous analysis leads to the next result.

Theorem 4.

The LFK algorithm requires at most 56 linear searches over the integer values in [ 0, α / 210 ] to find a unique kernel factor pair for any given semiprime α .

It is worthy to point out that the tasks for searching the kernel factor pair out of the 28 (or 24) factor pairs in Q( i ) can be conducted independently in parallel.

6. Illustrating Example

We illustrate the LFK algorithm using the following example to factor an 11-digit semiprime α=12648677849 .

Step1: Since α cannot be fully divided by 2, 3, 5 and 7, we know α P S Λ .

Step2: Since α=59+210×60231799 , r 13 =59 is the root number of α .

Step3: We sequentially check the 24 factor-pairs in Q( 13 ) from FT 210 , namely, Q( 13 )={ ( 11,139 ),( 13,53 ),( 17,127 ),,( 71,199 ),,( 179,181 ) } . After taking 12 iterations going through Steps 4 and 5 to check ( q j|13 , q j ^ |13 ) for j=1,2,,12 without finding any feasible solution, we check ( q 13|13 , q 13 ^ |13 )=( 71,199 ) . Calculate σ 13|13 = α71×199 210 =60231732 .

Step4: Check for possible θ θ ^ 0 .

  • Compute

  • θ= σ j|i q j|i × θ ^ q j ^ |i +210 θ ^ = 6023173271 θ ^ 199+210 θ ^

  • for each θ ^ { 0,1,, α / 210 }={ 0,1,,536 } . Since none of the θ ^ ’s are integers, continue to Step 5.

Step5: Check for possible 0θ θ ^ .

  • Compute θ ^ = σ j|i q j ^ |i ×θ q j|i +210θ = 60231732199θ 71+210θ for each θ{ 0,1,,536 } . When θ=473 , θ ^ = 60231732199×473 71+210×473 =605>θ is an integer. Output (71, 199) as the kernel factor pair and α=12648677849=( 71+210×473 )×( 199+210×605 )=99401×127249 .

7. Conclusions and Discussions

In this paper, we introduce the concepts of factor pairs and kernel factor pairs to form a new framework for designing an efficient semiprime factoring algorithm that serves as the key input to the RSA algorithm for computer encryption. Unlike commonly developed sieve-based methods, the proposed kernel-factor-pair-based LFK algorithm is proven to successfully factorize any given semiprime α by taking at most 56 linear searches over the integer values in [0, α / 210 ]. The overall computational complexity is less than searching through α /4 integer values with simple calculations. The LFK algorithm works under no preconditions and finds the exact factors for any given semiprime. The required search can be conducted naturally in parallel for fast computations.

As pointed out in [27], instead of eliminating the factors of 2, 3, 5 and 7 for consideration, an “extended” PTP table can be easily built by eliminating fewer factors, such as 2, 3, 5 only, or by eliminating more factors, such as 2, 3, 5, 7 and 11. Since the construction of the PTP is not sieve-based, it requires no prior knowledge or processing efforts of any other primes. In fact, an extended PTP that eliminates more factors for consideration will have a longer period but with more roots. The concepts of factor pairs and kernel factor pair follow accordingly for the LFK algorithm to prevail.

Some further discussions are as follows:

1) Notice that the LFK searches θ (and θ ^ ) through the integer values from 0 to α / 210 . When α 2 d becomes a huge number in d digits, the searching range could be a concern. In this case, by adopting a prime-logarithmic technique in [4], we can simply find an integer m such that 2 m α / 210 2 m1 and introduce m ( ~ 1 2 logα ) 0 - 1 binary variables u 1 ,, u m such that θ can be represented by

θ= 2 0 u 1 + 2 1 u 2 + 2 2 u 3 ++ 2 m1 u m for u i { 0,1 } .

In other words, the task of searching θ through the integer values from 0 to α / 210 can be replaced by checking the values of m (about 1/2 logα ) binary variables. For instance, to factorize a semiprime α= 2 32 +1=4294967297 , we only need 16 binary variables to find the solution being

2 32 +1=( 11+210×3 )×( 157+210×31906 )=641×6700417.

However, the performance of the prime-logarithmic technique developed by Li et al. [4] strongly depends on, firstly, the way of formulating the related linear binary programming problem, and secondly, the software package used to solve the linear binary programming problem. This will remain for further study.

2) Compared with the commonly used sieve-based semiprime factoring methods, we observe that:

(1) Heuristic versus deterministic: Many sieve-based methods are heuristic and may not converge to a feasible solution. However, the proposed LFK algorithm is a deterministic approach which guarantees to factorize any semiprime number into two prime factors.

(2) High space complexity versus low space complexity: The Trial Sieve Method requires a high space complexity to store all primes that come before α , while, with the FT 210 in hand, the LFK algorithm needs at most 28 memory spaces to store the corresponding factor pairs.

(3) Hard-to-manage versus manageable parallel computing: Sieve-based methods may generate numerous subproblems which are hard to arrange for parallel processing. The LFK algorithm can easily arrange all subproblems into 24 or 28 processes to be computed parallelly.

In conclusion, fast semiprime factorization is essential for breaking RSA encryption. The kernel-factor-based LFK algorithm provides a new angle for further investigation on designing efficient factoring methods for information security.

Acknowledgements

We thank Professor Xiaohua Jia of City University of Hong Kong and an anonymous reviewer for reviewing and providing valuable comments to the article. We are grateful for the in-kind-support from NTU and the financial support for Way Kuo from the Hong Kong Institute for Advanced Study (CityU 9610556).

Conflicts of Interest

The authors declare no conflicts of interest regarding the publication of this paper.

References

[1] Zagier, D. (1977) The First 50 Million Prime Numbers. The Mathematical Intelligencer, 1, 7-19.
https://doi.org/10.1007/bf03351556
[2] Zagier, D. (1997) Newman’s Short Proof of the Prime Number Theorem. The American Mathematical Monthly, 104, 705-708.
https://doi.org/10.1080/00029890.1997.11990704
[3] Dickson, L.E. (2005) History of the Theory of Numbers, Volume II: Diophantine Analysis. Dover Publications.
[4] Li, H., Huang, Y., Fang, S. and Kuo, W. (2021) A Prime-Logarithmic Method for Optimal Reliability Design. IEEE Transactions on Reliability, 70, 146-162.
https://doi.org/10.1109/tr.2020.3020597
[5] Li, H., Fang, S., Lin, B.M.T. and Kuo, W. (2023) Unifying Colors by Primes. Light: Science & Applications, 12, Article No. 32.
https://doi.org/10.1038/s41377-023-01073-x
[6] Konheim, A.G. (2006) Computer Security and Cryptography. Wiley.
https://doi.org/10.1002/0470083980
[7] Li, D., Luo, M., Zhao, B. and Che, X. (2018) Provably Secure APK Redevelopment Authorization Scheme in the Standard Model. Computers, Materials & Continua, 56, 447-465.
https://doi.org/10.3970/cmc.2018.03692
[8] RSA Laboratories (2013) The RSA Factoring Challenge.
https://web.archive.org/web/20130921043459/
http://www.emc.com/emc-plus/rsa-labs/historical/the-rsa-factoring-challenge.htm
[9] Shor, P.W. (1997) Polynomial-time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal on Computing, 26, 1484-1509.
https://doi.org/10.1137/s0097539795293172
[10] Shoshina, A.V., Borzunov, G.I. and Ivanova, E.Y. (2021) Application of Bio-Inspired Algorithms to the Cryptanalysis of Asymmetric Ciphers on the Basis of Composite Number. 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), St. Petersburg, 26-29 January 2021, 2399-2403.
https://doi.org/10.1109/elconrus51938.2021.9396242
[11] Upadhyay, S. and Gupta, V.K. (2022) A Literature Review on the Concept of Cryptography and RSA Algorithm. International J of Advance and Innovative Research, 9, 237-240.
[12] Vandersypen, L.M.K., Steffen, M., Breyta, G., Yannoni, C.S., Sherwood, M.H. and Chuang, I.L. (2001) Experimental Realization of Shor’s Quantum Factoring Algorithm Using Nuclear Magnetic Resonance. Nature, 414, 883-887.
https://doi.org/10.1038/414883a
[13] Boudot, F., Gaudry, P., Guillevic, A., Heninger, N., Thome, E. and Zimmermann, P. (2022) The State of the Art in Integer Factoring and Breaking Public-Key Cryptography. IEEE Security & Privacy, 20, 80-86.
https://doi.org/10.1109/msec.2022.3141918
[14] Zhang, X., Li, M., Jiang, Y. and Sun, Y. (2019) A Review of the Factorization Problem of Large Integers. In: Sun, X., Pan, Z. and Bertino, E., Eds., Artificial Intelligence and Security, Springer, 202-213.
https://doi.org/10.1007/978-3-030-24268-8_19
[15] Pomerance, C. and Erdös, P. (1996) A Tale of Two Sieves. Notices of the American Mathematical Society, 43, 1473-1485.
[16] Pritchard, P. (1982) Explaining the Wheel Sieve. Acta Informatica, 17, 477-485.
https://doi.org/10.1007/bf00264164
[17] Wikipedia Contributors (2025) Wheel Factorization.
https://en.wikipedia.org/w/index.php?title=Wheel_factorization&oldid=1279299441
[18] Atkin, A.O.L. and Bernstein, D.J. (2003) Prime Sieves Using Binary Quadratic Forms. Mathematics of Computation, 73, 1023-1030.
https://doi.org/10.1090/s0025-5718-03-01501-1
[19] Pollard, J.M. (1993) The Lattice Sieve. In: Lenstra, A.K. and Lenstra, H.W., Eds., The Development of the Number Field Sieve, Springer, 43-49.
https://doi.org/10.1007/bfb0091538
[20] Dixon, B. and Lenstra, A.K. (1994) Factoring Integers Using SIMD Sieves. In: Helleseth, T., Ed., Advances in CryptologyEUROCRYPT’93. EUROCRYPT 1993, Springer, 28-39.
[21] Kleinjung, T., Aoki, K., Franke, J., Lenstra, A.K., Thomé, E., Bos, J.W., et al. (2010) Factorization of a 768-Bit RSA Modulus. In: Rabin, T., Ed., Advances in CryptologyCRYPTO 2010, Springer, 333-350.
https://doi.org/10.1007/978-3-642-14623-7_18
[22] Menezes, A. and Vanstone, S.A. (1993) Elliptic Curve Cryptosystems and Their Implementation. Journal of Cryptology, 6, 209-224.
[23] Bai, S., Gaudry, P., Kruppa, A., Thomé, E. and Zimmermann, P. (2016) Factorisation of RSA-220 with CADO-NFS.
https://inria.hal.science/hal-01315738
[24] Schnorr, C.P. (2013) Factoring Integers by CVP Algorithms. In: Fischlin, M. and Katzenbeisser, S., Eds., Number Theory and Cryptography, Springer, 73-93.
https://doi.org/10.1007/978-3-642-42001-6_6
[25] Schnorr, C.P. (2021) Fast Factoring Integers by SVP Algorithms.
https://eprint.iacr.org/2021/933
[26] Tang, X., Xu, J. and Duan, B. (2018) A Memory-Efficient Simulation Method of Grover’s Search Algorithm. Computers, Materials & Continua, 57, 307-319.
https://doi.org/10.32604/cmc.2018.03693
[27] Li, H., Fang, S. and Kuo, W. (2024) The Periodic Table of Primes. Advances in Pure Mathematics, 14, 394-419.
https://doi.org/10.4236/apm.2024.145023
[28] Li, H., Fang, S. and Kuo, W. (2024) The Periodic Table of Primes. SSRN Electronic Journal.
https://doi.org/10.2139/ssrn.4742238
[29] Li, H., Fang, S., Kuo, W. and Lin, N. (2025) Listing Prime Numbers Periodically. Advances in Pure Mathematics, 15, 247-268.
https://doi.org/10.4236/apm.2025.154012

Copyright © 2025 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.