
The article deals with factoring cryptanalysis that can be used in attack on popular encryption and digital signing algorithm RSA. Factoring reduces to SAT problem, and one's solution is unique and corresponds to multiplier's bit. A method of simple iteration is applied to SAT, also three polynomial heuristics are applied with the goal to improve convergence. Also it describes alternative method of solving SAT based on constructing system of linear equations and it's solution by Gauss-Zeidel method. The statistics of each SAT component's correct recognition is formed after numerical experiments. The obtained data is used in hybrid with famous local-search algorithm GSAT for attack RSA algorithm.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
