
The problem of prime factorization is particularly important in fields such as cryptography, where it plays a crucial role, especially in the security of public key cryptosystems like RSA. There are numerous factorization algorithms that have been developed over time, each with varying levels of complexity. These algorithms have played a crucial role in fields like mathematics and cryptography, where prime factorization remains a key challenge. In this study, the continued fraction method one of the factorization methods, is examined. To highlight the importance of the continued fraction factorization method, a brief mention is made of RSA's vulnerability to attacks, such as Weiner's attack, which exploits small private keys. Our approach aims to enhance the efficiency of factorization by integrating this method with relevant theorems by giving concrete examples with detailed tables.
Factorization algorithms;continued fractions;RSA algorithm;cryptography., Cryptography, Kriptografi
Factorization algorithms;continued fractions;RSA algorithm;cryptography., Cryptography, Kriptografi
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
