Abstract
This paper presents new short decryption exponent attacks on RSA, which successfully leads to the factorization of RSA modulus in polynomial time. The paper has two parts. In the first part, we report the usage of the small prime difference method of the form where the ratio of is close to , which yields a bound from the convergents of the continued fraction expansion of . The second part of the paper reports four cryptanalytic attacks on t instances of RSA moduli for where we use as an approximation of satisfying generalized key equations of the shape , , , and for unknown positive integers , and , where we establish that t RSA moduli can be simultaneously factored in polynomial time using combinations of simultaneous Diophantine approximations and lattice basis reduction methods. In all the reported attacks, we have found an improved short secret exponent bound, which is considered to be better than some bounds as reported in the literature.
1. Introduction
The RSA cryptosystem is the most widely used public key cryptosystem, invented by three mathematicians, Rivest, Shamir, and Adleman [1] and since then has been extensively used for many applications in the government as well as commercial domain, which include e-banking, secure telephone, smart cards, and communications in different types of networks [2].
RSA key generation involves a random selection of two distinct large prime numbers such that their product is represented as and called an RSA modulus. The Euler totient function is computed as . Additionally, choose an integer such that and compute short decryption exponent d such that the relation is satisfied. Then, are the public pair and are private key tuple.
The encryption function is computed by choosing a message and computing the ciphertext , while the plaintext can be recovered by computing the decryption exponent from equation . The primes p and q in most cases are considered to have same bit-length.
In simpler terms, an RSA cryptosystem involves three processes of key generation, encryption, and decryption algorithms as presented in Algorithms 1–3 below:
| Algorithm 1 RSA key generation |
|
| Algorithm 2 RSA encryption |
|
| Algorithm 3 RSA decryption |
|
The security of an RSA cryptosystem depends on the difficulty of solving the integer factorization problem, the failure of an adversary to compute the secret key d from RSA key equation , where only the public key e is given as outlined in Algorithm 1 and the difficulty of solving the -root problem of as outlined in Algorithm 2. The problem of computing d from is equivalent to the problem of factoring RSA modulus N into its nontrivial prime factors of p and q, as proven by Reference [3]. It is therefore recommended for RSA users to generate primes p and q in such a way that the problem of factoring is computationally infeasible for an adversary. Choosing p and q as strong primes has been recommended as a way of maximizing the difficulty of factoring RSA modulus N.
In an RSA cryptosystem, there are public key pairs and private key tuples . Once the private key d is known, it can lead to the total break of RSA. It is often tempting to use a small decryption exponent so as to speed up computation in RSA decryption and signature verification. However, this poses a great security challenge to the system. A very small decryption exponent can be broken by a trivial brute force exhaustive search to find the correct decryption exponent. For instance, all private exponents can be recovered easily, but it is computationally infeasible to recover all private exponents by brute force attack [4].
The first attack on small decryption exponent was reported by Wiener in 1990. He showed that RSA is insecure if the small decryption exponent is using the continued fractions method to recover d from the convergents of the continued fractions expansion of , [5]. Since then, many attacks on short decryption exponents emerged, which improved the bound. Boneh and Durfee (1999) proposed an attack on the small decryption exponent using the Coppersmith lattice-based technique, in which they heuristically showed that RSA in insecure if , as reported by Reference [6].
In another development, B. De Weger (2002) also used the primes difference method to carry out an attack on RSA modulus , where he proved that if , then the RSA cryptosystem is considered to be insecure where primes p and q have the same bit-length, which is an improvement on Wiener’s bound as reported by Reference [7]. In addition, Maitra and Sarkar (2008) improved the work of Reference [7] using the prime difference method of and showed that RSA is not secure if , as reported by Reference [8].
Furthermore, Chen’s et al. (2009) have generalized the work of Reference [7], where they proposed an attack using the generalization method, in which they proved that RSA modulus can be broken if and , where the ratio of two primes is very near to the ratio , where , a, and b are small positive integers less than , then the RSA modulus can be factored from the convergents of the continued fraction expansion of . Substituting gave the approximation of as reported by [7]. Also, taking and gave approximation of as reported by Reference [8]. In their experiment result, they used the value of to justify their theorem, as reported by Reference [9].
Nitaj (2013) improved Wiener’s bound to , as reported by Reference [10]. Asbullah (2015) also improved Wiener’s bound to , as reported [11].
This paper reports the use of the small prime difference method to factor the RSA modulus N and its relation to further extend the bound of weak decryption exponents. Given public key pair , we exploited RSA key equation and broke the instances of RSA by factoring the modulus N into its nontrivial prime factors p and q. We also reported four cryptanalytic attacks on factoring t RSA moduli using a system of equations where, in one instance, the moduli shared a common decryption exponent d and, in another scenario, every pair had its own unique decryption exponent . The method uses such that if the ratio of is close to the ratio of , where a and b are small positive integers and , then private key can be efficiently recovered from the convergents of the continued fraction expansion of . Our bound is considered to be an improved bound of that of References [5,9,11]. This paper also presents an experimental result which shows that taking , we can recover primes p and q if the private key . This is an improvement of the result of Reference [9], as they did not give an experiment result of .
The second part of the paper presents t instances of factoring RSA moduli for by transforming generalized key equations of the form , , , and for unknown parameters , and into simultaneous Diophantine problem and applying the lattice basis reduction and methods to find the values of d, , , and k. We formulated a quadratic equation which enabled us to find t prime factors and and finally factorize t moduli in polynomial time. We have found decryption exponents bounds that are greater than those of References [12,13].
The rest of the paper is organized as follows. In Section 2, we present a review of some preliminary results on continued fractions and state some theorems that are related to our work. Section 3 presents our proposed findings and discussion on the results. We give experimental results to illustrate our theorems, which show how an incorrect choice of d can lead to the factorization of RSA modulus in polynomial time. Finally, in Section 4, we conclude the paper.
2. Preliminaries and Methods
In this section, we state some basics on continued fraction, the lattice basis reduction technique, simultaneous Diophantine approximations, and theorems related to our work.
Definition 1 (Continued fractions).
For any positive , define and for , do , until . Then, x can be expanded as continued fraction in following form,
This expression is often used in the form . Any rational number can be expressed as a finite continued fraction . The convergents of x are the fractions denoted by for . We note that if is a rational number, then the continued fraction expansion of x is finite with total number of convergents being polynomial in .
Definition 2.
Let where V is a vector space subset of . The set of vectors are said to be linearly dependent if there exist , which are not all zero and such that:
Otherwise, they are said to be linearly independent.
Definition 3.
(Lenstra et al. 1982) Let n be a positive integer. A subset of an n-dimensional real vector space is called a lattice and if there exists a basis on such that we have the following relation . In this situation, we say that are the basis for or that they span
Definition 4.
(Nitaj, 2013) (LLL Reduction) Let be a basis for a lattice and suppose be the associated Gram–Schmidt orthogonal basis. Let:
The basis is said to be LLL reduced if it satisfies the following two conditions:
- . Equivalently, it can be written as:
Theorem 1.
(Legendre’s Theorem). Let α be a positive real number. If the rational numbers such that and:
then is one of the convergents of the continued fraction expansion α.
Proof.
See Reference [14]. ☐
Theorem 2.
(Wang et al., 2016). If are convergents of the simple continued fraction , then the numerators and denominators of these convergents satisfy the following recursive relations:
for .
Theorem 3.
(Wiener, 1990). Let be an RSA modulus with . Let be a public exponent and d be the corresponding private key. If , then one can factor N in polynomial time.
Theorem 4.
(B. de Weger, 2002). Let be an RSA modulus with such that for , and . Let e and d be public and private keys respectively such that with and . If , then the convergents can be found from the continued fraction of , which led to the factorization of N.
Theorem 5.
(Maitra-Sarkar, 2008). Let be an RSA modulus satistying . Suppose that with and . Then N can be factored in polynomial time if from the convergents of the continued fraction expansion of .
Theorem 6.
(Chen et al., 2009). Let p and q be RSA primes satisfying . Let . If is close to such that , then the secret key can be discovered from the convergents of .
Theorem 7.
(Blomer-May, 2004). Let be an RSA public pair with modulus and the prime difference . Suppose that the public exponent satisfies with and for . Then, N can be factored in polynomial time.
Theorem 8.
(Lenstra et al., 1982). Let be a lattice basis of dimension n having a basis The algorithm produces a reduced basis satisfying the following condition:
for all
Proof.
See Reference [15]. ☐
We will use the following Theorem 9 in our proofs of Theorems 14–17.
Theorem 9.
(Simultaneous Diophantine Approximations) (Nitaj et al., 2014). Given any rational numbers of the form and , there is a polynomial time algorithm to compute integers and a positive integer q such that:
Theorem 10.
(Nitaj et al. 2014). Let for be k RSA moduli. Let and , be k public exponents. Define . If there exist an integer and k integers and such that for , then one can factor k RSA moduli in polynomial time.
Theorem 11.
(Nitaj et al., 2014). Let , for be k RSA moduli where p and p are balanced primes. Let , , be k public exponents with . Define . If there exist an integer and k integers and such that for , then one can factor the k RSA moduli in polynomial time.
Theorem 12.
(Asbullah, 2015). Let with . Let and d satisfy . If , then is a convergent of the continued fraction .
3. The Proposed Findings and Discussion
In this section, we present our findings. The first part reported a short secret exponent attack on RSA modulus , where p and q are prime numbers of the same bit-length. We show that if , then one can find from the convergents of the continued fraction expansion of which leads to the factorization of RSA modulus N in polynomial time. In the second part of the paper, we presented four cryptanalytic attacks using a generalized key equation of the shape , , , and for unknown integers , and . We showed that t RSA moduli can be simultaneously factored in polynomial time where .
3.1. A Short Decryption Exponent Attack Using
In this section, we present two lemmas and a theorem with numerical examples.
Lemma 1.
Let p and q be prime numbers, where and . If a and b are small positive integers such that is close to for and , then .
Proof of Lemma 1.
Let , then we get,
Adding to both sides we have,
Then . ☐
Lemma 2.
Let p and q be prime numbers where and . If,
then,
Proof of Lemma 2.
We first compute,
Since , we get,
☐
Theorem 13.
Let p and q be prime numbers, where and . Given the pair for as a public key pair and (d,p,q) as a private key tuple, let . If is close to such that the relation holds and , then can be calculated efficiently from the convergent of the continued fraction expansion of for and are positive integers less than .
Proof of Theorem 13.
Since and , then from Lemma 2 we have,
Using RSA key equation , for some , this gives us,
Taking as approximation of , this becomes,
Finally,
Now, assuming that , and , where a and b are small positive integers, plugging the conditions into above inequality (Equation (1)), we get,
Suppose that , then,
Hence, we have,
This shows that Theorem 13 produces as the convergent of the continued fraction expansion of . This terminates the proof. ☐
This is an improvement on the work of Reference [9], whose . Also taking the value of , we have our decryption exponent , which is also an improvement on the results of References [5,11] whose decryption exponents were and , respectively.
From Table 1 one can observe that our bound is an improvement of the abovementioned bounds.
Table 1.
Comparison of the bounds on d for RSA modulus .
Example 1.
In this example, we illustrate how to factor the RSA modulus for the case . Let,
and , , . Taking the continued fraction expansion of , we get,
and their corresponding convergents are as follows,
and computing,
Finally, solving the quadratic equation leads to the factorization of N. This reveals the factors of N as and Taking the value of , this shows that our bound increases to , that is, . This shows that our private key is greater than the bounds of References [5,11], i.e., (bound of Reference [5] ) and (bound of Reference [11]). This is an improvement on bounds stated in Table 1.
3.2. System of Equations Using as Approximation of
In this section, we present four cryptanalytic attacks on t RSA moduli using a system of equations of the form , , , and for , in which we successfully factor t RSA moduli in polynomial time for unknown positive integers d, , , , and k for .
3.2.1. The Attack on t RSA Moduli Satisfying
Taking , let , . The attack works for t instances when there exist an integer d and t integers satisfying equation . We show that prime factors and of t RSA moduli for can be found efficiently for N and In this case, the RSA instances shared common decryption exponent d.
Theorem 14.
Let be t RSA moduli for and let be a public key pair and be a private key pair such that and the relation is satisfied. Let also N ; if there exist positive integers such that equation holds, then prime factors of t RSA moduli can be successfully recovered in polynomial time.
Proof of Theorem 14.
For , and let , be t moduli. Let N and suppose that . Then equation can be rewritten as,
Let and suppose that are positive integers and from Theorem 13, it was shown that,
We therefore have,
Hence, to show the existence of integer d and t integers we let , with . Then, we have,
Following Theorem 9, we have for , then, we get . It follows that if , then for . Finally,
This clearly satisfies the conditions of Theorem 9, and we proceed to reveal the private key d and t integers for . Next, from equation we compute,
Finally, by finding the roots of the quadratic equation , the prime factors and can be revealed, which lead to the factorization of t RSA moduli for in polynomial time. ☐
Let,
Define,
Consider the lattice spanned by the matrix,
Taking suitable small positive integers a and b, the matrix M can be used in computing the reduced basis after we apply the LLL algorithm.
Example 2.
In what follows, we give an illustration of how Theorem 14 works on three RSA moduli and their corresponding public exponents,
Observe that,
By using , and since , we will have from Algorithm 4 and
| Algorithm 4 Theorem 14 |
|
Applying Theorem 9 and using Algorithm 4 for , we compute,
Consider the lattice spanned by the matrix,
Therefore, by applying the LLL algorithm to , we obtain the reduced basis with the following matrix,
Next, from Algorithm 4 we compute ,
From the first row of matrix Q, we obtain , and as follows,
Using Algorithm 4, we now compute for .
Next, from Algorithm 4 we proceed to compute for .
Finally, solving the quadratic equation for yields , , and , which lead to the factorization of three RSA moduli That is,
From our result, one can observe that we get , which is larger than Blömer–May’s bound , as reported in Reference [12]. Our is also larger than Nitaj et al.’s bound , as reported in Reference [13].
3.2.2. The Attack on t RSA Moduli Satisfying
In this section, we consider a second case in which t RSA moduli satisfy t equations of the form for unknown positive integers and k for . In this case, every pair of the RSA instances has its own unique decryption exponent .
Theorem 15.
Let be t RSA moduli for and let be a public key pair and be a private key pair with and the given relation is satisfied. Let e be t public exponents; if there exist t integers such that equation holds, then t prime factors of RSA moduli can be successfully recovered in polynomial time.
Proof of Theorem 15.
For and , be t RSA moduli. Let be t public exponents for and suppose that . Then, the equation can be rewritten as,
Let and , be positive integers and from Theorem 13, it was shown that,
Additionally, suppose that , then we have,
Hence, we get,
We now proceed to show the existence of integer k and t integers . Let and . Then, we get,
Following Theorem 9, we have for , then we get . It follows that if and following Theorem 9, we have for . Finally,
This clearly satisfies the conditions of Theorem 9, and we proceed to reveal t integers of the private key and integer k for . Next, from equation we compute,
Finally, by finding the roots of the quadratic equation , the prime factors and can be found, which lead to the factorization of t RSA moduli for ☐
Let,
Define,
Consider the lattice spanned by the matrix,
Taking suitable small positive integers a and b, the matrix M can be used in computing the reduced basis after we apply the LLL algorithm
Example 3.
In what follows, we give a numerical example to illustrate how our attack of Theorem 15 works on three RSA Moduli. We consider the following three RSA moduli and their corresponding public exponents,
Observe that,
with with . By using , and since , we will have from Algorithm 5 and .
Applying Theorem 9 and using Algorithm 5, we compute,
| Algorithm 5 Theorem 15 |
|
Consider the lattice spanned by the matrix,
Therefore, by applying the LLL algorithm to , we obtain the reduced basis with the following matrix,
Next, from Algorithm 5, we compute ,
From the second row of matrix Q, we obtain , and as follows,
Using Algorithm 5, we compute for . That is,
Next, from Algorithm 5 we proceed to compute for .
Finally, solving the quadratic equation for yields , , and which lead to the factorization of three RSA moduli That is,
From our result, one can observe that we get , which is larger than Blömer–May’s bound , as reported in Reference [12].
3.2.3. The Attack on t RSA Moduli Satisfying
In this section, we consider another case in which t RSA moduli satisfies t equations of the form for unknown positive integers , k, and for .
For , let , for . The attack works for t instances if there exist an integer d and t integers such that holds. We show that prime factors and of t RSA moduli for can be found efficiently for N and , and for all for unknown positive integers , and In this case, the RSA instances shared a common decryption exponent d.
Theorem 16.
Let be RSA moduli for and let the pair be public keys and bea private key with and the given relation is satisfied. Let N for . If there exist integers such that equation holds, then the prime factors of t RSA moduli can be successfully recovered in polynomial time.
Proof of Theorem 16.
For , and let , be t RSA moduli. Let N and suppose that . Then equation can be rewritten as,
Taking and suppose that , are positive integers and from Theorem 13, it was shown that,
Plugging into Equation (5) yields,
Hence, we have,
Hence, to show the existence of integer d and t integers , we let , with . Then, we have:
Following Theorem 9, we have for , then we get . It follows that if , then for . Finally,
This also satisfies the conditions of Theorem 9, and we next proceed to reveal the private key d and t integers for . Next, from equation we compute,
Finally, by finding the roots of the quadratic equation , prime factors and can be revealed, which lead to the factorization of t RSA moduli for in polynomial time. ☐
Let,
Define,
Consider the lattice spanned by the matrix,
Taking suitable small positive integers a and b, the matrix M can be used in computing the reduced basis after we apply the LLL algorithm.
Example 4.
In what follows, we give a numerical example to illustrate how our attack of Theorem 16 works on t RSA Moduli. We consider the following three RSA moduli and their corresponding public exponents,
Observe that,
By using , and since , we will have from Algorithm 6 and Applying Theorem 9 and Algorithm 6 for we compute,
| Algorithm 6 Theorem 16 |
|
Consider the lattice spanned by the matrix
Therefore, by applying the LLL algorithm to , we obtain the reduced basis with the following matrix,
Next, from Algorithm 6, we compute ,
From the first row of matrix Q, one can observe that we obtain , and as follows,
Using Algorithm 6, we compute for where are,
Next, from Algorithm 6, we compute for
Finally, solving the quadratic equation for yields , , and which lead to the factorization of three RSA moduli That is,
From our result, one can observe that we get , which is larger than Blömer–May’s bound , as reported in Reference [12]. Our is also larger than Nitaj et al.’s bound , as reported in Reference [13].
3.2.4. The Attack on t RSA Moduli Satisfying
In this section, we present another case in which t RSA moduli satisfies t equations of the form for unknown positive integers , k, and for , which can be simultaneously factored in polynomial time. In this case, every pair of the RSA instances has its own unique decryption exponent .
Theorem 17.
Let be t RSA moduli for and let be a public key pair and be a private key pair with condition and the given relation is satisfied. Let be t public exponents. If there exist positive integers , for all such that the equation holds, then t prime factors of RSA moduli can be found successfully in polynomial time.
Proof of Theorem 17
For and suppose to be t RSA moduli for . Suppose that are t public exponents and suppose that . Then, equation can be rewritten as,
Let for , and , , be positive integers and , e , then we have,
Hence, we get,
We now proceed to show the existence of integer k and t integers . Let and . Then, we get,
Following Theorem 9, we have for , then we get . It follows that if , then for . Finally,
This satisfies the conditions of Theorem 9 and we proceed to find the values of and k for . Next, from the equation we compute,
Finally, by finding the roots of the quadratic equation , the prime factors and can be found, which lead to the factorization of t RSA moduli for . ☐
Let,
Define,
Consider the lattice spanned by the matrix,
Taking suitable small positive integers a and b, the matrix M can be used in computing the reduced basis after we apply the LLL algorithm.
| Algorithm 7 Theorem 17 |
|
Example 5.
In what follows, we give a numerical example to illustrate how our attack of Theorem 17 works on t RSA Moduli. We consider the following three RSA moduli and their corresponding public exponents,
Observe that,
with for . By using , and since , we will have from Algorithm 7 and .
Applying Theorem 9 and using Algorithm 7, we compute,
Consider the lattice spanned by the matrix,
Therefore, by applying the LLL algorithm to , we obtain the reduced basis with the following matrix,
Next, from Algorithm 7 we compute ,
From the first row of matrix J, one can observe that we obtain , and as follows,
Using Algorithm 7, we compute for , where are,
Next, from Algorithm 7 we compute for .
Finally, solving the quadratic equation for yields , , and , which lead to the factorization of three RSA moduli That is,
From our result, one can observe that we get , which is larger than Blömer–May’s bound , as reported in Reference [12].
4. Conclusions
In this paper, it has been shown that our proposed cryptanalytic attacks on RSA modulus using the prime difference method can be used efficiently. The use of as a good approximation of is necessary as we have discovered a short decryption exponent bound as a right candidate from the convergents of the continued fraction expansion of that led to the successful factorization of the RSA modulus in polynomial time. This paper also reported instances of factoring t RSA moduli by transforming generalized key equations , , , and , where into a simultaneous Diophantine approximations problem and later applied the LLL and lattice basis reduction methods, which produced a reduced basis that yielded the values of , and . Finally, we computed and solved a system of quadratic equation for , which produce the roots , , and as prime factors of t RSA moduli In all the four attacks presented on t instances of RSA moduli , we have improved the short secret exponent bound.
Author Contributions
All the authors made substantial contributions in the development of this paper. M.R.K.A. and S.I.A. oversaw the paper from its introduction to its conclusion. M.A.A. provided insight into the conceptualization of the paper and also into running the Maple for numerical examples, as contained in the paper. F.Y. provided thorough revision, including punctuations of the paper and made useful suggestions in improving the quality of the paper.
Funding
This research work is funded by the Fundamental Research Grant Scheme [02-01-15-1745FR] provided by the Ministry of Higher Education, Malaysia.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
- Dubey, M.K.; Ratan, R.; Verma, N.; Saxena, P.K. Cryptanalytic Attacks and Countermeasures on RSA. In Proceedings of the Third International Conference on Soft Computing for Problem Solving; Springer: New Delhi, India, 2014; pp. 805–819. [Google Scholar]
- Bach, E.; Miller, G.; Shallit, J. Sums of divisors, perfect numbers and factoring. SIAM J. Comput. 1986, 15, 1143–1154. [Google Scholar] [CrossRef]
- Hinek, M.J. Cryptanalysis of RSA and Its Variants; Chapman and Hall/CRC: Boca Raton, FL, USA, 2009. [Google Scholar]
- Wiener, M. Cryptanalysis of Short RSA Secret Exponents. IEEE Trans. Inform. Theory 1990, 36, 553–558. [Google Scholar] [CrossRef]
- Boneh, D.; Glenn, D. Cryptanalysis of RSA with private key d less than N0.292. IEEE Trans. Inf. Theory 2000, 46, 1339–1349. [Google Scholar] [CrossRef]
- De Weger, B. Cryptanalysis of RSA with small prime difference. Appl. Algebra Eng. Commun. Comput. 2002, 13, 17–28. [Google Scholar] [CrossRef]
- Maitra, S.; Sarkar, S. Revisiting Wiener’s attack–new weak keys in RSA. In International Conference on Information Security; Springer: Berlin/Heidelberg, Germany, 2008; pp. 228–243. [Google Scholar]
- Chen, C.Y.; Hsueh, C.C.; Lin, Y.F. A Generalization of de Weger’s Method. In Proceedings of the 2009 Fifth International Conference on Information Assurance and Security, Xi’an, China, 18–20 August 2009; Volume 1, pp. 344–347. [Google Scholar]
- Nitaj, A. Diophantine and lattice cryptanalysis of the RSA cryptosystem. In Artificial Intelligence, Evolutionary Computing and Metaheuristics; Springer: Berlin/Heidelberg, Germany, 2013; pp. 139–168. [Google Scholar]
- Asbullah, M.A. Cryptanalysis on the Modulus N = p2q and the Design of Rabin Cryptosystem without Decryption Failure. Ph.D. Thesis, Universiti Putra Malaysia, Selangor, Malaysia, 2015. [Google Scholar]
- Blömer, J.; May, A. A generalized Wiener attack on RSA. In International Workshop on Public Key Cryptography; Springer: Berlin/Heidelberg, Germany, 2004; pp. 1–13. [Google Scholar]
- Nitaj, A.; Ariffin, M.R.; Nassr, D.I.; Bahig, H.M. New attacks on the RSA cryptosystem. In International Conference on Cryptology in Africa; Springer: Cham, Switzerland, 2014; pp. 178–198. [Google Scholar]
- Wang, X.; Xu, G.; Wang, M.; Meng, X. Mathematical Foundations of Public Key Cryptography; CRC Press: Boca Raton, FL, USA, 2016. [Google Scholar]
- Lenstra, A.K.; Lenstra, H.W.; Lovász, L. Factoring polynomials with rational coefficients. Mathematische Annalen 1982, 261, 515–534. [Google Scholar] [CrossRef]
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).