{"id":"https://openalex.org/W2014627726","doi":"https://doi.org/10.1145/2261417.2261426","title":"Review of primality testing and integer factorization in public key cryptography by Song Y. Yan","display_name":"Review of primality testing and integer factorization in public key cryptography by Song Y. Yan","publication_year":2012,"publication_date":"2012-06-11","ids":{"openalex":"https://openalex.org/W2014627726","doi":"https://doi.org/10.1145/2261417.2261426","mag":"2014627726"},"language":"en","primary_location":{"id":"doi:10.1145/2261417.2261426","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2261417.2261426","pdf_url":null,"source":{"id":"https://openalex.org/S4210206003","display_name":"ACM SIGACT News","issn_l":"0163-5700","issn":["0163-5700","1943-5827"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGACT News","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046752882","display_name":"S. C. Coutinho","orcid":"https://orcid.org/0000-0003-0362-1366"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"S. C. Coutinho","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5046752882"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07045512,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"43","issue":"2","first_page":"33","last_page":"35"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.947700023651123,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/primality-test","display_name":"Primality test","score":0.9688140153884888},{"id":"https://openalex.org/keywords/integer-factorization","display_name":"Integer factorization","score":0.602286159992218},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5845595598220825},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5428568720817566},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5333751440048218},{"id":"https://openalex.org/keywords/factorization","display_name":"Factorization","score":0.5162734985351562},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5159481167793274},{"id":"https://openalex.org/keywords/citation","display_name":"Citation","score":0.4962952733039856},{"id":"https://openalex.org/keywords/prime","display_name":"Prime (order theory)","score":0.4638998508453369},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3445097804069519},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3332309126853943},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.27774322032928467},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.21172592043876648},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17977088689804077},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1654549241065979},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.11195334792137146}],"concepts":[{"id":"https://openalex.org/C191421660","wikidata":"https://www.wikidata.org/wiki/Q829546","display_name":"Primality test","level":3,"score":0.9688140153884888},{"id":"https://openalex.org/C119677069","wikidata":"https://www.wikidata.org/wiki/Q4846249","display_name":"Integer factorization","level":4,"score":0.602286159992218},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5845595598220825},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5428568720817566},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5333751440048218},{"id":"https://openalex.org/C187834632","wikidata":"https://www.wikidata.org/wiki/Q188804","display_name":"Factorization","level":2,"score":0.5162734985351562},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5159481167793274},{"id":"https://openalex.org/C2778805511","wikidata":"https://www.wikidata.org/wiki/Q1713","display_name":"Citation","level":2,"score":0.4962952733039856},{"id":"https://openalex.org/C184992742","wikidata":"https://www.wikidata.org/wiki/Q7243229","display_name":"Prime (order theory)","level":2,"score":0.4638998508453369},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3445097804069519},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3332309126853943},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.27774322032928467},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.21172592043876648},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17977088689804077},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1654549241065979},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.11195334792137146}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2261417.2261426","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2261417.2261426","pdf_url":null,"source":{"id":"https://openalex.org/S4210206003","display_name":"ACM SIGACT News","issn_l":"0163-5700","issn":["0163-5700","1943-5827"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGACT News","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2091700477","https://openalex.org/W4253034220","https://openalex.org/W4297695779","https://openalex.org/W183411591","https://openalex.org/W586460825","https://openalex.org/W1660229075","https://openalex.org/W2026159487","https://openalex.org/W4251372882","https://openalex.org/W2014627726","https://openalex.org/W2621008504"],"abstract_inverted_index":{"review-article":[0],"Share":[1],"on":[2,80],"Review":[3],"of":[4],"primality":[5],"testing":[6],"and":[7,57],"integer":[8],"factorization":[9],"in":[10,89],"public":[11],"key":[12],"cryptography":[13],"by":[14],"Song":[15],"Y.":[16],"Yan":[17],"Author:":[18],"S.":[19],"C.":[20],"Coutinho":[21],"View":[22],"Profile":[23],"Authors":[24],"Info":[25],"&":[26],"Claims":[27],"ACM":[28],"SIGACT":[29],"NewsVolume":[30],"43Issue":[31],"2June":[32],"2012":[33],"pp":[34],"33\u201335https://doi.org/10.1145/2261417.2261426Online:11":[35],"June":[36],"2012Publication":[37],"History":[38],"0citation130DownloadsMetricsTotal":[39],"Citations0Total":[40],"Downloads130Last":[41],"12":[42],"Months4Last":[43],"6":[44],"weeks2":[45],"Get":[46],"Citation":[47,49,86],"AlertsNew":[48,85],"Alert":[50],"added!This":[51],"alert":[52,77],"has":[53,72],"been":[54,73],"successfully":[55],"added":[56],"will":[58,62],"be":[59,63],"sent":[60],"to:You":[61],"notified":[64],"whenever":[65],"a":[66,98],"record":[67],"that":[68],"you":[69],"have":[70],"chosen":[71],"cited.To":[74],"manage":[75],"your":[76,91],"preferences,":[78],"click":[79],"the":[81],"button":[82],"below.Manage":[83],"my":[84],"Alert!Please":[87],"log":[88],"to":[90,94,96],"account":[92],"Save":[93],"BinderSave":[95],"BinderCreate":[97],"New":[99],"BinderNameCancelCreateExport":[100],"CitationPublisher":[101],"SiteGet":[102],"Access":[103]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
