<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article
  PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "http://jats.nlm.nih.gov/publishing/1.0/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.0" specific-use="sps-1.8" xml:lang="en" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">rfing</journal-id>
			<journal-title-group>
				<journal-title>Revista Facultad de Ingeniería</journal-title>
				<abbrev-journal-title abbrev-type="publisher">Rev. Fac. ing.</abbrev-journal-title>
			</journal-title-group>
			<issn pub-type="ppub">0121-1129</issn>
			<issn pub-type="epub">2357-5328</issn>
			<publisher>
				<publisher-name>Universidad Pedagógica y Tecnológica de Colombia</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="doi">10.19053/01211129.v33.n69.2024.17935</article-id>
			<article-id pub-id-type="publisher-id">00014</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Artículos</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>SYSTEMATIC MAPPING STUDY ON FAST FACTORIZATION USING PARALLEL OR DISTRIBUTED PROCESSING APPLIED TO CRYPTANALYSIS</article-title>
				<trans-title-group xml:lang="es">
					<trans-title>Estudio de mapeo sistemático sobre factorización rápida utilizando procesamiento paralelo o distribuido aplicado al criptoanálisis</trans-title>
				</trans-title-group>
			</title-group>
			<contrib-group>
				<contrib contrib-type="author">
					<contrib-id contrib-id-type="orcid">0000-0001-9725-2359</contrib-id>
					<name>
						<surname>Melo</surname>
						<given-names>Jhon-Alejandro</given-names>
					</name>
					<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
				</contrib>
				<contrib contrib-type="author">
					<contrib-id contrib-id-type="orcid">0000-0002-4571-8273</contrib-id>
					<name>
						<surname>Amador-Donado</surname>
						<given-names>Siler</given-names>
					</name>
					<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
				</contrib>
				<contrib contrib-type="author">
					<contrib-id contrib-id-type="orcid">0000-0002-6907-2905</contrib-id>
					<name>
						<surname>Pardo-Calvache</surname>
						<given-names>César-Jesús</given-names>
					</name>
					<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
				</contrib>
			</contrib-group>
			<aff id="aff1">
				<label>1</label>
				<institution content-type="original">Universidad del Cauca (Popayán-Cauca, Colombia). alejandromelo@unicauca.edu.co</institution>
				<institution content-type="normalized">Universidad del Cauca</institution>
				<institution content-type="orgname">Universidad del Cauca</institution>
				<addr-line>
					<named-content content-type="city">Popayán</named-content>
                        <named-content content-type="state">Cauca</named-content>
				</addr-line>
				<country country="CO">Colombia</country>
				<email>alejandromelo@unicauca.edu.co</email>
			</aff>
			<aff id="aff2">
				<label>2</label>
				<institution content-type="original">Ph, D. (c) Universidad del Cauca (Popayán-Cauca, Colombia). samador@unicauca.edu.co</institution>
				<institution content-type="normalized">Universidad del Cauca</institution>
				<institution content-type="orgname">Universidad del Cauca</institution>
				<addr-line>
					<named-content content-type="city">Popayán</named-content>
                        <named-content content-type="state">Cauca</named-content>
				</addr-line>
				<country country="CO">Colombia</country>
				<email>samador@unicauca.edu.co</email>
			</aff>
			<aff id="aff3">
				<label>3</label>
				<institution content-type="original">Ph. D. Universidad del Cauca (Popayán-Cauca, Colombia). cpardo@unicauca.edu.co</institution>
				<institution content-type="normalized">Universidad del Cauca</institution>
				<institution content-type="orgname">Universidad del Cauca</institution>
				<addr-line>
					<named-content content-type="city">Popayán</named-content>
                        <named-content content-type="state">Cauca</named-content>
				</addr-line>
				<country country="CO">Colombia</country>
				<email>cpardo@unicauca.edu.co</email>
			</aff>
			<author-notes>
				<fn fn-type="other" id="fn1">
					<p>Esta edición se financió con recursos del Patrimonio Autónomo Fondo Nacional de Financiamiento para la Ciencia, la Tecnología y la Innovación, Francisco José de Caldas, Minciencias</p>
				</fn>
			</author-notes>
			<!--<pub-date date-type="pub" publication-format="electronic">
				<day>29</day>
				<month>08</month>
				<year>2024</year>
			</pub-date>
			<pub-date date-type="collection" publication-format="electronic">
				<month>09</month>
				<year>2024</year>
			</pub-date>-->
			<pub-date pub-type="epub">
				<month>09</month>
				<year>2024</year>
			</pub-date>
			<volume>33</volume>
			<issue>69</issue>
			<elocation-id>e17935</elocation-id>
			<history>
				<date date-type="received">
					<day>20</day>
					<month>07</month>
					<year>2024</year>
				</date>
				<date date-type="accepted">
					<day>25</day>
					<month>09</month>
					<year>2024</year>
				</date>
			</history>
			<permissions>
				<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/" xml:lang="en">
					<license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution License</license-p>
				</license>
			</permissions>
			<abstract>
				<title>ABSTRACT</title>
				<p>Cryptography is one of the branches of research within computer security and cybersecurity, it provides security to the stored information and travels between devices. Cryptanalysis, in turn, studies the weaknesses within cryptography, thus allowing improving constants about cryptographic algorithms. Currently there are several algorithms that allow to keep information secure, one of them is RSA (Rivest, Shamir and Adleman), which is used in digital certificates implemented in some communication protocols. However, there is no algorithm capable of deciphering that type of algorithms yet; therefore, the objective of this study is to support other researchers in the area of cryptanalysis. This rapid factorization study using parallel or distributed processing contains 6 research questions that allow us to deepen the use of this type of processing to speed up the execution times of the algorithms. The results made it possible to show that by using this type of processing, factoring time can be reduced.</p>
			</abstract>
			<trans-abstract xml:lang="es">
				<title>RESUMEN</title>
				<p>La criptografía es una de las ramas de investigación dentro de la seguridad informática y la ciberseguridad, proporciona seguridad a la información almacenada y viaja entre dispositivos. El criptoanálisis, a su vez, estudia las debilidades dentro de la criptografía, permitiendo así mejorar las constantes en los algoritmos criptográficos. Actualmente existen varios algoritmos que permiten mantener la información segura, uno de ellos es RSA (Rivest, Shamir y Adleman), que se utiliza en certificados digitales implementados en algunos protocolos de comunicación. Sin embargo, aún no existe un algoritmo capaz de descifrar este otro tipo de algoritmos; por lo tanto, el objetivo de este estudio es apoyar a otros investigadores en el área del criptoanálisis. Este estudio de factorización rápida mediante procesamiento paralelo o distribuido contiene 6 preguntas de investigación que nos permiten profundizar en el uso de este tipo de procesamiento para acelerar los tiempos de ejecución de los algoritmos. Los resultados permitieron demostrar que, mediante el uso de este tipo de procesamiento, se puede reducir el tiempo de factorización.</p>
			</trans-abstract>
			<kwd-group xml:lang="en">
				<title>Keywords:</title>
				<kwd>Cryptanalysis</kwd>
				<kwd>distributed processing</kwd>
				<kwd>factoring</kwd>
				<kwd>parallel processing</kwd>
			</kwd-group>
			<kwd-group xml:lang="es">
				<title>Palabras clave:</title>
				<kwd>Criptoanálisis</kwd>
				<kwd>factorización</kwd>
				<kwd>procesamiento distribuido</kwd>
				<kwd>procesamiento paralelo</kwd>
			</kwd-group>
			<counts>
				<fig-count count="1"/>
				<table-count count="11"/>
				<equation-count count="0"/>
				<ref-count count="26"/>
				<page-count count="15"/>
			</counts>
		</article-meta>
	</front>
	<body>
		<sec sec-type="intro">
			<title>1. INTRODUCTION</title>
			<p>Cryptography is crucial for information security, from the Caesar cipher-named after Julius Caesar- to modern cryptographic algorithms like RSA. These systems have evolved to protect data storage, processing, and transmission over networks. Today, privacy and confidentiality in online operations depend on encryption algorithms; for example, RSA uses the HyperText Transfer Protocol Secure (HTTPS) to secure data transmission, whether personal or financial. A 2022 study by Entrust showed that 62% of companies use encryption strategies, reflecting a 19% increase since 2018, and highlighting the importance of continued research on these algorithms [<xref ref-type="bibr" rid="B1">1</xref>].</p>
			<p>Cryptanalysis studies methods for deciphering encrypted messages without having the key. The factorization of semi-prime numbers is a vital approach to compromising the security of public-key algorithms like RSA. The security of RSA relies on the difficulty of factoring very large composite numbers into their prime factors. For example, if asked to factor the number 15, one can easily identify 3 and 5 as its prime factors. However, for a number as large as RSA-2048, for example <ext-link ext-link-type="uri" xlink:href="https://acortar.link/c48jLQ">https://acortar.link/c48jLQ</ext-link>, which has 617 digits, finding its prime factors is extremely difficult, even for a non-quantum supercomputer. Advances in factorization techniques, such as the Multiple Polynomial Quadratic Sieve (MPQS) and the General Number Field Sieve (GNFS), require longer encryption keys to maintain security.</p>
			<p>This study analyzes cryptanalysis in the factorization of semi-prime numbers through a systematic mapping of the literature. Factorization methods for numbers with more than 10 digits were identified, including the use of artificial intelligence. Although parallel processing has improved execution times, the complexity remains high. Therefore, it is important to explore how emerging technologies can assist. The document is organized as follows: methodology, results and discussions, and conclusions.</p>
		</sec>
		<sec sec-type="methods">
			<title>2. METHODOLOGY</title>
			<sec>
				<title><italic>2.1. Definition of Search Objectives and Research Questions</italic></title>
				<p>A systematic mapping is a process that allows the collection, categorization, and structuring of existing information on a topic of research interest [<xref ref-type="bibr" rid="B2">2</xref>]. For the design of this systematic mapping, the protocol proposed by Petersen et al. in [<xref ref-type="bibr" rid="B3">3</xref>] was used as a reference along with the guidelines presented by Kitchenham and Charters in [<xref ref-type="bibr" rid="B4">4</xref>] and Budgen et al. in [<xref ref-type="bibr" rid="B5">5</xref>]. The following activities were carried out: (i) Apply a GQM approach; (ii) Define a search and selection strategy; (iii) Conduct a review; (iv) Generate a review report. <xref ref-type="fig" rid="f1">Figure 1</xref> presents a more detailed diagram of the process.</p>
				<p>
					<fig id="f1">
						<label>Figure 1</label>
						<caption>
							<title><italic>
 <italic>Stages of the process for systematic mapping. Suggested by</italic> 
</italic> [<xref ref-type="bibr" rid="B6">6</xref>].</title>
						</caption>
						<graphic xlink:href="2357-5328-rfing-33-69-e17935-gf1.jpg"/>
					</fig>
				</p>
				<p>To effectively direct the present systematic mapping, the following search objectives (OB) have been defined:</p>
				<p>OB1. Identify the types of solutions proposed in the selected primary studies and group them to determine the most relevant ones.</p>
				<p>OB2. Analyze the main contributions to rapid factorization, considering the types of solutions proposed to identify those with the greatest impact.</p>
				<p>OB3. Support academics, cryptanalysts, and other interested parties in researching rapid factorization by presenting the challenges encountered in the selected primary studies.</p>
				<p>Based on the search objectives, three (3) research questions (P) have been defined, as presented in <xref ref-type="table" rid="t1">Table 1</xref>. Each question is mapped to the proposed objectives, along with its respective motivation.</p>
				<p>For research question <bold>P1,</bold> the types of solutions described in <bold>Table 2</bold> were defined.</p>
				<p>
					<table-wrap id="t1">
						<label>Table 1</label>
						<caption>
							<title>Research questions.</title>
						</caption>
						<table frame="hsides" rules="groups">
							<colgroup>
								<col/>
								<col/>
								<col/>
								<col/>
							</colgroup>
							<thead>
								<tr>
									<th align="center">Id.</th>
									<th align="center">Research question</th>
									<th align="center">Motivation</th>
									<th align="center">Objectives</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td align="center">P1</td>
									<td align="center">What types of solutions have been proposed?</td>
									<td align="center">Identify the types of contributions described in <xref ref-type="table" rid="t2">Table 2</xref> for the selected studies.</td>
									<td align="center">OB1</td>
								</tr>
								<tr>
									<td align="center">P2</td>
									<td align="center">What results have been achieved with the proposed solutions?</td>
									<td align="center">Identify the impact of the proposed solutions based on the results obtained.</td>
									<td align="center">OB2</td>
								</tr>
								<tr>
									<td align="center">P3</td>
									<td align="center">What challenges does researching the topic involve?</td>
									<td align="center">Determine the challenges that researching the topic presents for the scientific community.</td>
									<td align="center">OB3</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
				</p>
				<p>
					<table-wrap id="t2">
						<label>Table 2</label>
						<caption>
							<title>Types of solutions.</title>
						</caption>
						<table frame="hsides" rules="groups">
							<colgroup>
								<col/>
								<col/>
							</colgroup>
							<thead>
								<tr>
									<th align="center">Type of solution</th>
									<th align="center">Description</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td align="left">Parallel processing</td>
									<td align="left">Articles that use parallel processing to accelerate the factorization process.</td>
								</tr>
								<tr>
									<td align="left">Distributed processing</td>
									<td align="left">Articles that use distributed processing to accelerate the factorization process.</td>
								</tr>
								<tr>
									<td align="left">Performance evaluation</td>
									<td align="left">Articles that propose experiments or evaluations to measure the performance of factorization algorithms.</td>
								</tr>
								<tr>
									<td align="left">Low-level instructions</td>
									<td align="left">Articles that use low-level instructions, such as assembly code or SIMD instructions, to accelerate the factorization process.</td>
								</tr>
								<tr>
									<td align="left">Artificial intelligence</td>
									<td align="left">Articles that use artificial intelligence to enhance factorization processes.</td>
								</tr>
								<tr>
									<td align="left">Code optimization</td>
									<td align="left">Articles that propose improvements to optimize the steps of factorization algorithms.</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
				</p>
			</sec>
			<sec>
				<title><italic>2.2. Search strategy</italic></title>
				<p>The following activities were carried out to search for articles: (i) identification of key terms through document review and consultation with cryptography experts; (ii) combination of terms using &quot;AND&quot; and &quot;OR;&quot; (iii) refinement of the search string; (iv) adaptation of the string to different search engines; and (v) definition of the time frame and inclusion/exclusion criteria. The refined search string was (&quot;factoring large numbers&quot; OR &quot;factoring large integers&quot;) AND (&quot;fast&quot; OR &quot;speed up&quot;) AND (&quot;cryptography&quot; OR &quot;cryptanalysis&quot;) AND (&quot;sieve&quot; OR &quot;sieving&quot;) AND (&quot;parallel&quot; OR &quot;distributed&quot; OR &quot;optimized&quot;). A period from January 2010 to December 2022 was defined. Searches were conducted in Google Scholar, ACM Digital Library, IEEE Digital Library, ScienceDirect, Scopus, and Springer Link, adapting the string to each database. Details of the adaptations are presented in <xref ref-type="table" rid="t3">Table 3</xref>, and findings are shown in Table 8, including discarded articles and those with no available access.</p>
			</sec>
			<sec>
				<title><italic>2.3. Inclusion and exclusion criteria</italic></title>
				<p>For the selection of relevant articles, a two-level review was conducted: (Level 1) review of the title; (Level 2) review of the abstract, introduction, and conclusions. To obtain relevant articles, only those studies that met at least one of the inclusion criteria described in <xref ref-type="table" rid="t4">Table 4</xref> and did not meet any of the exclusion criteria listed in <xref ref-type="table" rid="t5">Table 5</xref> were selected. Subsequently, to achieve the objectives and identify the primary studies, a (Level 3) review of the full text was made.</p>
			</sec>
			<sec>
				<title><italic>2.4. Quality assessment criteria</italic></title>
				<p>To measure the quality of the selected primary studies and determine their relevance to rapid factorization using parallel or distributed processing, a questionnaire containing twelve (12) questions was created with a scoring system of three values (-1, 0, +1), as described in <xref ref-type="table" rid="t6">Table 6</xref>. Each article can receive a quality score ranging from -12 to +12. It is important to clarify that a low-quality score does not imply exclusion but rather helps in ranking articles by relevance for future research.</p>
			</sec>
			<sec>
				<title><italic>2.5. Data extraction</italic></title>
				<p>The following link <ext-link ext-link-type="uri" xlink:href="https://acortar.link/UPrRAU">https://acortar.link/UPrRAU</ext-link> presents the summary sheet that ensured a uniform data extraction strategy for all articles, making it easier to classify the information. This sheet summarizes the most important aspects to be considered for each article.</p>
				<p>
					<table-wrap id="t3">
						<label>Table 3</label>
						<caption>
							<title>Adaptation of the basic search string in the databases.</title>
						</caption>
						<table frame="hsides" rules="groups">
							<colgroup>
								<col/>
								<col/>
								<col/>
							</colgroup>
							<thead>
								<tr>
									<th align="center">No.</th>
									<th align="center">Search string</th>
									<th align="center">Source</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td align="center">1</td>
									<td align="center">(&quot;factoring large numbers&quot; OR &quot;factoring large integers&quot;) AND (&quot;fast&quot; OR &quot;speed up&quot;) AND (&quot;cryptography&quot; OR &quot;cryptanalysis&quot;) AND (&quot;sieve&quot; OR &quot;sieving&quot;) AND ( &quot;parallel&quot; OR &quot;distributed&quot; OR &quot;optimized&quot;)</td>
									<td align="center">Google Scholar</td>
								</tr>
								<tr>
									<td align="center">2</td>
									<td align="center">[[All: &quot;factoring large numbers&quot;] OR [All: &quot;factoring large integers&quot;]] AND [[All: &quot;fast&quot;] OR [All: &quot;speed up&quot;]] AND [[All: &quot;cryptography&quot;] OR [All: &quot;cryptanalysis&quot;]] AND [[All: &quot;sieve&quot;] OR [All: &quot;sieving&quot;]] AND [[All: &quot;parallel&quot;] OR [All: &quot;distributed&quot;] OR [All: &quot;optimized&quot;]] AND [Publication Date: (01/01/2010 TO 07/31/2022)]</td>
									<td align="center">ACM Digital Library</td>
								</tr>
								<tr>
									<td align="center">3</td>
									<td align="center">(&quot;factoring large numbers&quot; OR &quot;factoring large integers&quot;) AND (&quot;fast&quot; OR &quot;speed up&quot;) AND (&quot;cryptography&quot; OR &quot;cryptanalysis&quot;) AND (&quot;sieve&quot; OR &quot;sieving&quot;) AND ( &quot;parallel&quot; OR &quot;distributed&quot; OR &quot;optimized&quot;)</td>
									<td align="center">IEEE Digital Library</td>
								</tr>
								<tr>
									<td align="center">4</td>
									<td align="center">(&quot;factoring large numbers&quot; OR &quot;factoring large integers&quot;) AND (&quot;fast&quot; OR &quot;speed up&quot;) AND (&quot;cryptography&quot; OR &quot;cryptanalysis&quot;) AND (&quot;sieving&quot;) AND ( &quot;parallel&quot; OR &quot;distributed&quot;)</td>
									<td align="center">ScienceDirect</td>
								</tr>
								<tr>
									<td align="center">5</td>
									<td align="center">(&quot;factoring large numbers&quot; OR &quot;factoring large integers&quot;) AND (&quot;fast&quot; OR &quot;speed up&quot;) AND (&quot;cryptography&quot; OR &quot;cryptanalysis&quot;) AND (&quot;sieve&quot; OR &quot;sieving&quot;) AND ( &quot;parallel&quot; OR &quot;distributed&quot; OR &quot;optimized&quot;)</td>
									<td align="center">Scopus</td>
								</tr>
								<tr>
									<td align="center">6</td>
									<td align="center">(&quot;factoring large numbers&quot; OR &quot;factoring large integers&quot;) AND (&quot;fast&quot; OR &quot;speed up&quot;) AND (&quot;cryptography&quot; OR &quot;cryptanalysis&quot;) AND (&quot;sieve&quot; OR &quot;sieving&quot;) AND (&quot;parallel&quot; OR &quot;distributed&quot; OR &quot;optimized&quot;)</td>
									<td align="center">Springer Link</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
				</p>
				<p>
					<table-wrap id="t4">
						<label>Table 4</label>
						<caption>
							<title>Inclusion criteria.</title>
						</caption>
						<table frame="hsides" rules="groups">
							<colgroup>
								<col/>
								<col/>
							</colgroup>
							<thead>
								<tr>
									<th align="center">Id.</th>
									<th align="center">Inclusion criteria (IC)</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td align="center">IC1</td>
									<td align="left">Studies whose main topic is rapid factorization using distributed algorithms.</td>
								</tr>
								<tr>
									<td align="center">IC2</td>
									<td align="left">Studies related to rapid factorization using distributed algorithms.</td>
								</tr>
								<tr>
									<td align="center">IC3</td>
									<td align="left">Studies that have been published in scientific journals and postgraduate theses.</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
				</p>
				<p>
					<table-wrap id="t5">
						<label>Table 5</label>
						<caption>
							<title>Exclusion criteria.</title>
						</caption>
						<table frame="hsides" rules="groups">
							<colgroup>
								<col/>
								<col/>
							</colgroup>
							<thead>
								<tr>
									<th align="center">Id.</th>
									<th align="center">Exclusion criteria (EC)</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td align="center">EC1</td>
									<td align="center">Duplicate articles or studies.</td>
								</tr>
								<tr>
									<td align="center">EC2</td>
									<td align="center">Studies that address the topic superficially or do not address the research topic.</td>
								</tr>
								<tr>
									<td align="center">EC3</td>
									<td align="center">Books or book chapters.</td>
								</tr>
								<tr>
									<td align="center">EC4</td>
									<td align="center">Undergraduate theses.</td>
								</tr>
								<tr>
									<td align="center">EC5</td>
									<td align="center">Studies published before 2010.</td>
								</tr>
								<tr>
									<td align="center">EC6</td>
									<td align="center">Studies in languages other than English.</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
				</p>
				<p>
					<table-wrap id="t6">
						<label>Table 6</label>
						<caption>
							<title>Criteria for evaluating the quality of primary studies.</title>
						</caption>
						<table frame="hsides" rules="groups">
							<colgroup>
								<col/>
								<col/>
								<col span="3"/>
							</colgroup>
							<thead>
								<tr>
									<th align="left" rowspan="2">Id </th>
									<th align="center" rowspan="2">Criterion </th>
									<th align="center" colspan="3">Scoring for responses</th>
								</tr>
								<tr>
									<th align="center">+1</th>
									<th align="center">0</th>
									<th align="center">-1</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td align="center">C1</td>
									<td align="center">The study focuses on investigating rapid factorization of numbers using parallel or distributed processing.</td>
									<td align="center">Yes</td>
									<td align="center">Partially</td>
									<td align="center">No</td>
								</tr>
								<tr>
									<td align="center">C2</td>
									<td align="center">The study provides a clear description of the research problem.</td>
									<td align="center">Yes</td>
									<td align="center">Partially</td>
									<td align="center">No</td>
								</tr>
								<tr>
									<td align="center">C3</td>
									<td align="center">The study follows a structured and well-founded research process.</td>
									<td align="center">Yes</td>
									<td align="center">Partially</td>
									<td align="center">No</td>
								</tr>
								<tr>
									<td align="center">C4</td>
									<td align="center">The study provides clear definitions of rapid factorization and/or distributed processing.</td>
									<td align="center">Yes</td>
									<td align="center">Partially</td>
									<td align="center">No</td>
								</tr>
								<tr>
									<td align="center">C5</td>
									<td align="center">The study proposes a set of techniques to reduce the factorization time.</td>
									<td align="center">Yes</td>
									<td align="center">Partially</td>
									<td align="center">No</td>
								</tr>
								<tr>
									<td align="center">C6</td>
									<td align="center">The study proposes a method for evaluating factorization times.</td>
									<td align="center">Yes</td>
									<td align="center">Partially</td>
									<td align="center">No</td>
								</tr>
								<tr>
									<td align="center">C7</td>
									<td align="center">The study clearly and comprehensively presents the results obtained after validating its proposal.</td>
									<td align="center">Yes</td>
									<td align="center">Partially</td>
									<td align="center">No</td>
								</tr>
								<tr>
									<td align="center">C8</td>
									<td align="center">The study clearly presents the research contributions to industry and/or academia.</td>
									<td align="center">Yes</td>
									<td align="center">Partially</td>
									<td align="center">No</td>
								</tr>
								<tr>
									<td align="center">C9</td>
									<td align="center">The study clearly describes the discussion of the limitations of the research process and the analysis of the results obtained.</td>
									<td align="center">Yes</td>
									<td align="center">Partially</td>
									<td align="center">No</td>
								</tr>
								<tr>
									<td align="center">C10</td>
									<td align="center">The study clearly describes future work or research alternatives.</td>
									<td align="center">Yes</td>
									<td align="center">Partially</td>
									<td align="center">No</td>
								</tr>
								<tr>
									<td align="center">C11</td>
									<td align="center">The study has been published in a relevant journal, conference, or symposium. The journal classification was based on the quartile rankings proposed by Scimago (<ext-link ext-link-type="uri" xlink:href="https://www.scimagojr.com/">https://www.scimagojr.com</ext-link>), and the conference and symposium rankings were based on the Computing Research &amp; Education (CORE) rankings (<ext-link ext-link-type="uri" xlink:href="http://portal.core.edu.au/conf-ranks/">http://portal.</ext-link>
										<ext-link ext-link-type="uri" xlink:href="http://portal.core.edu.au/conf-ranks/">core.edu.au/conf-ranks/</ext-link>).</td>
									<td align="center">Highly relevant (quartile Q1 for journals and A* for conferences and symposia).</td>
									<td align="center">Relevant (quartiles Q2 and Q3 for journals and A or B for conferences and symposia).</td>
									<td align="center">Not relevant (quartile Q4 for journals and C or unclassified for conferences and symposia).</td>
								</tr>
								<tr>
									<td align="center">C12</td>
									<td align="center">The study has been cited by other authors (according to the Google Scholar citation index).</td>
									<td align="center">Has been cited by more than ten authors.</td>
									<td align="center">Between one and ten authors.</td>
									<td align="center">Has not been cited to date.</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
				</p>
			</sec>
		</sec>
		<sec sec-type="results|discussion">
			<title>3. RESULTS AND DISCUSSIONS</title>
			<p>It is important to clarify that the search and selection of articles began by entering the search string in Google Scholar, which was also the data source that yielded the most results. For other sources, most of the articles found were not selected due to EC2. As a result, as shown in <xref ref-type="table" rid="t7">Table 7</xref>, the total number of selected articles that met at least one IC and did not meet any EC was 15, except for 2 articles selected through backward snowballing. A total of 309 articles were excluded. The compendium of primary articles resulting from the search is presented in <xref ref-type="table" rid="t8">Table 8</xref> along with their references, so that readers can explore them further. The results of the quality assessment are presented in <xref ref-type="table" rid="t9">Table 9</xref>, highlighting that only 2 articles (A6, A13) achieved the highest rating with 9 points each. It is also noteworthy that most articles scored above 1 point, with 5 articles scoring 5 points.</p>
			<p>
				<table-wrap id="t7">
					<label>Table 7</label>
					<caption>
						<title>Search results.</title>
					</caption>
					<table frame="hsides" rules="groups">
						<colgroup>
							<col/>
							<col/>
							<col/>
							<col/>
							<col/>
						</colgroup>
						<thead>
							<tr>
								<th align="center">#</th>
								<th align="center">Data source</th>
								<th align="center">Found</th>
								<th align="center">Relevant</th>
								<th align="center">Primary Selected</th>
							</tr>
						</thead>
						<tbody>
							<tr>
								<td align="center">1</td>
								<td align="center">Google Scholar</td>
								<td align="center">246</td>
								<td align="center">42</td>
								<td align="center">15</td>
							</tr>
							<tr>
								<td align="center">2</td>
								<td align="center">ACM Digital Library</td>
								<td align="center">2</td>
								<td align="center">0</td>
								<td align="center">0</td>
							</tr>
							<tr>
								<td align="center">3</td>
								<td align="center">IEEE Xplore</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">0</td>
							</tr>
							<tr>
								<td align="center">4</td>
								<td align="center">Science Direct</td>
								<td align="center">5</td>
								<td align="center">0</td>
								<td align="center">0</td>
							</tr>
							<tr>
								<td align="center">5</td>
								<td align="center">Scopus</td>
								<td align="center">2</td>
								<td align="center">0</td>
								<td align="center">0</td>
							</tr>
							<tr>
								<td align="center">6</td>
								<td align="center">Springer Link</td>
								<td align="center">68</td>
								<td align="center">3</td>
								<td align="center">0</td>
							</tr>
							<tr>
								<td align="center">7</td>
								<td align="center">Backward snowballing</td>
								<td align="center">2</td>
								<td align="center">2</td>
								<td align="center">2</td>
							</tr>
							<tr>
								<td align="center"><bold>TOTAL</bold></td>
								<td align="center"> </td>
								<td align="center"><bold>326</bold></td>
								<td align="center"><bold>47</bold></td>
								<td align="center"><bold>17</bold></td>
							</tr>
						</tbody>
					</table>
				</table-wrap>
			</p>
			<p>
				<table-wrap id="t8">
					<label>Table 8</label>
					<caption>
						<title>Compendium of primary articles resulting from the search.</title>
					</caption>
					<table frame="hsides" rules="groups">
						<colgroup>
							<col/>
							<col/>
							<col/>
							<col/>
							<col/>
						</colgroup>
						<thead>
							<tr>
								<th align="center">Id</th>
								<th align="center">Title</th>
								<th align="center">No. of citations</th>
								<th align="center">Year</th>
								<th align="center">Reference</th>
							</tr>
						</thead>
						<tbody>
							<tr>
								<td align="center">A1</td>
								<td align="center">An Empirical Comparison of the Quadratic Sieve Factoring Algorithm and the Pollard Rho Factoring Algorithm</td>
								<td align="center">0</td>
								<td align="center">2021</td>
								<td align="center">[<xref ref-type="bibr" rid="B7">7</xref>]</td>
							</tr>
							<tr>
								<td align="center">A2</td>
								<td align="center">Parallel structured gaussian elimination for the number field sieve</td>
								<td align="center">2</td>
								<td align="center">2021</td>
								<td align="center">[<xref ref-type="bibr" rid="B8">8</xref>]</td>
							</tr>
							<tr>
								<td align="center">A3</td>
								<td align="center">Fermat factorization using a multi-core system</td>
								<td align="center">3</td>
								<td align="center">2020</td>
								<td align="center">[<xref ref-type="bibr" rid="B9">9</xref>]</td>
							</tr>
							<tr>
								<td align="center">A4</td>
								<td align="center">Factoring integers witd a brain-inspired computer</td>
								<td align="center">9</td>
								<td align="center">2018</td>
								<td align="center">[<xref ref-type="bibr" rid="B10">10</xref>]</td>
							</tr>
							<tr>
								<td align="center">A5</td>
								<td align="center">An improved parallel block Lanczos algoritdm over GF (2) for integer factorization</td>
								<td align="center">12</td>
								<td align="center">2017</td>
								<td align="center">[<xref ref-type="bibr" rid="B11">11</xref>]</td>
							</tr>
							<tr>
								<td align="center">A6</td>
								<td align="center">Use of SIMD-based data parallelism to speed up sieving in integer-factoring algorithms</td>
								<td align="center">13</td>
								<td align="center">2017</td>
								<td align="center">[<xref ref-type="bibr" rid="B12">12</xref>]</td>
							</tr>
							<tr>
								<td align="center">A7</td>
								<td align="center">Efficiency of RSA key factorization by open-source libraries and distributed system architecture</td>
								<td align="center">3</td>
								<td align="center">2017</td>
								<td align="center">[<xref ref-type="bibr" rid="B13">13</xref>]</td>
							</tr>
							<tr>
								<td align="center">A8</td>
								<td align="center">Fast cryptanalysis of RSA encrypted data using a combination of mathematical and brute force attack in distributed computing environment</td>
								<td align="center">2</td>
								<td align="center">2017</td>
								<td align="center">[<xref ref-type="bibr" rid="B14">14</xref>]</td>
							</tr>
							<tr>
								<td align="center">A9</td>
								<td align="center">Impact of Optimization and Parallelism on Factorization Speed of SIQS</td>
								<td align="center">2</td>
								<td align="center">2016</td>
								<td align="center">[<xref ref-type="bibr" rid="B15">15</xref>]</td>
							</tr>
							<tr>
								<td align="center">A10</td>
								<td align="center">Strategy of Relations Collection in Factoring RSA Modulus</td>
								<td align="center">0</td>
								<td align="center">2016</td>
								<td align="center">[<xref ref-type="bibr" rid="B16">16</xref>]</td>
							</tr>
							<tr>
								<td align="center">A11</td>
								<td align="center">A parallel line sieve for the GNFS Algorithm</td>
								<td align="center">1</td>
								<td align="center">2014</td>
								<td align="center">[<xref ref-type="bibr" rid="B17">17</xref>]</td>
							</tr>
							<tr>
								<td align="center">A12</td>
								<td align="center">SIMD-Based Implementations of Sieving in Integer-Factoring Algorithms</td>
								<td align="center">1</td>
								<td align="center">2013</td>
								<td align="center">[<xref ref-type="bibr" rid="B18">18</xref>]</td>
							</tr>
							<tr>
								<td align="center">A13</td>
								<td align="center">An integrated parallel GNFS algorithm for integer factorization based on Linbox Montgomery block Lanczos method over GF (2)</td>
								<td align="center">13</td>
								<td align="center">2010</td>
								<td align="center">[<xref ref-type="bibr" rid="B19">19</xref>]</td>
							</tr>
							<tr>
								<td align="center">A14</td>
								<td align="center">Nios II hardware acceleration of the epsilon quadratic sieve algorithm</td>
								<td align="center">3</td>
								<td align="center">2010</td>
								<td align="center">[<xref ref-type="bibr" rid="B20">20</xref>]</td>
							</tr>
							<tr>
								<td align="center">A15</td>
								<td align="center">Application of bio-inspired algoritdm to tde problem of integer factorization</td>
								<td align="center">23</td>
								<td align="center">2010</td>
								<td align="center">[<xref ref-type="bibr" rid="B21">21</xref>]</td>
							</tr>
							<tr>
								<td align="center">A16</td>
								<td align="center">Parallel Multiple Polynomial Quadratic Sieve on Multi-core Architectures</td>
								<td align="center">6</td>
								<td align="center">2007</td>
								<td align="center">[<xref ref-type="bibr" rid="B22">22</xref>]</td>
							</tr>
							<tr>
								<td align="center">A17</td>
								<td align="center">Integer Factorization by a Parallel GNFS Algorithm for Public Key Cryptosystems</td>
								<td align="center">18</td>
								<td align="center">2005</td>
								<td align="center">[<xref ref-type="bibr" rid="B23">23</xref>]</td>
							</tr>
						</tbody>
					</table>
				</table-wrap>
			</p>
			<p>
				<table-wrap id="t9">
					<label>Table 9</label>
					<caption>
						<title>Quality rating for each article.</title>
					</caption>
					<table frame="hsides" rules="groups">
						<colgroup>
							<col/>
							<col/>
							<col/>
							<col/>
							<col/>
							<col/>
							<col/>
							<col/>
							<col/>
							<col/>
							<col/>
							<col/>
							<col/>
							<col/>
						</colgroup>
						<thead>
							<tr>
								<th align="center">Article</th>
								<th align="center">C1</th>
								<th align="center">C2</th>
								<th align="center">C3</th>
								<th align="center">C4</th>
								<th align="center">C5</th>
								<th align="center">C6</th>
								<th align="center">C7</th>
								<th align="center">C8</th>
								<th align="center">C9</th>
								<th align="center">C10</th>
								<th align="center">C11</th>
								<th align="center">C12</th>
								<th align="center">Total</th>
							</tr>
						</thead>
						<tbody>
							<tr>
								<td align="center">A1</td>
								<td align="center">-1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">-1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">-1</td>
								<td align="center">-1</td>
								<td align="center">0</td>
							</tr>
							<tr>
								<td align="center">A2</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">-1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">0</td>
								<td align="center">-1</td>
								<td align="center">-1</td>
								<td align="center">0</td>
								<td align="center">0</td>
							</tr>
							<tr>
								<td align="center">A3</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">-1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">0</td>
								<td align="center">0</td>
								<td align="center">0</td>
								<td align="center">0</td>
								<td align="center">5</td>
							</tr>
							<tr>
								<td align="center">A4</td>
								<td align="center">-1</td>
								<td align="center">1</td>
								<td align="center">-1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">0</td>
								<td align="center">0</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">-1</td>
							</tr>
							<tr>
								<td align="center">A5</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">-1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">0</td>
								<td align="center">-1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">5</td>
							</tr>
							<tr>
								<td align="center">A6</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">-1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">9</td>
							</tr>
							<tr>
								<td align="center">A7</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">-1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">0</td>
								<td align="center">-1</td>
								<td align="center">-1</td>
								<td align="center">0</td>
								<td align="center">1</td>
							</tr>
							<tr>
								<td align="center">A8</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">-1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">-1</td>
								<td align="center">-1</td>
								<td align="center">0</td>
								<td align="center">4</td>
							</tr>
							<tr>
								<td align="center">A9</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">-1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">-1</td>
								<td align="center">0</td>
								<td align="center">4</td>
							</tr>
							<tr>
								<td align="center">A10</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">-1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">0</td>
								<td align="center">-1</td>
								<td align="center">5</td>
							</tr>
							<tr>
								<td align="center">A11</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">-1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">-1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">5</td>
							</tr>
							<tr>
								<td align="center">A12</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">-1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">0</td>
								<td align="center">0</td>
								<td align="center">4</td>
							</tr>
							<tr>
								<td align="center">A13</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">-1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">9</td>
							</tr>
							<tr>
								<td align="center">A14</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">-1</td>
								<td align="center">-1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">0</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">-1</td>
								<td align="center">0</td>
								<td align="center">0</td>
							</tr>
							<tr>
								<td align="center">A15</td>
								<td align="center">-1</td>
								<td align="center">0</td>
								<td align="center">-1</td>
								<td align="center">-1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">3</td>
							</tr>
							<tr>
								<td align="center">A16</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">-1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">-1</td>
								<td align="center">0</td>
								<td align="center">5</td>
							</tr>
							<tr>
								<td align="center">A17</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">-1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">0</td>
								<td align="center">0</td>
								<td align="center">1</td>
								<td align="center">7</td>
							</tr>
						</tbody>
					</table>
				</table-wrap>
			</p>
			<sec>
				<title><italic>3.1. P1: What types of solutions have been proposed?</italic></title>
				<p>As shown in <xref ref-type="table" rid="t10">Table 10</xref>, 45% (10 articles) of the studies propose the use of parallel processing to accelerate the factorization process. Among these articles, A5, A9, and A10 use code optimization, while A6 employs low-level instructions to enhance the sieving performance. Articles A2, A3, A11, A13, A16, and A17 use parallel processing in one or more common steps of algorithms such as MPQS, GNFS, and Fermat. 18% (4 articles) of the studies use code optimization to improve the methods or functions of each factorization algorithm. Studies A5, A9, A10, and A14 use both code optimization and parallel processing or low-level instructions. 14% (3 articles) of the studies use low-level instructions that provide faster response times between software and hardware, thus accelerating factorization processes. A6 and A14 also employ parallel processing and code optimization, while A12 focuses solely on low-level instructions. Regarding artificial intelligence (AI), which represents 9% (2 articles), A4 and A15 use neuromorphic computing and genetic algorithms, proposing a different type of solution where improvements to algorithms are commonly found. Similarly, performance evaluations account for 9% (2 articles). A1 and A14 evaluate the performance of algorithms or tools for factoring large numbers. It is worth noting that all articles include a section on evaluation or experiments for their solutions. Finally, distributed processing represents 5% (1 article). Shende et al. in A14 apply distributed processing using mobile agents across several servers to divide processing among multiple machines, thereby reducing factorization times.</p>
				<p>
					<table-wrap id="t10">
						<label>Table 10</label>
						<caption>
							<title>Classification of primary articles by type of solution.</title>
						</caption>
						<table frame="hsides" rules="groups">
							<colgroup>
								<col/>
								<col/>
								<col/>
							</colgroup>
							<thead>
								<tr>
									<th align="center">Type of solution</th>
									<th align="center">Article</th>
									<th align="center">%</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td align="left">Parallel processing</td>
									<td align="center">A2, A3, A5, A6, A9, A10, A11, A13, A16, A17</td>
									<td align="center">45</td>
								</tr>
								<tr>
									<td align="left">Artificial intelligence</td>
									<td align="center"><bold>A4, A15</bold></td>
									<td align="center">9</td>
								</tr>
								<tr>
									<td align="left">Code optimization</td>
									<td align="center"><bold>A5, A9, A10, A14</bold></td>
									<td align="center">18</td>
								</tr>
								<tr>
									<td align="left">Low-level instructions</td>
									<td align="center"><bold>A6, A12, A14</bold></td>
									<td align="center">14</td>
								</tr>
								<tr>
									<td align="left">Performance evaluation</td>
									<td align="center"><bold>A1, A7</bold></td>
									<td align="center">9</td>
								</tr>
								<tr>
									<td align="left">Distributed processing</td>
									<td align="center"><bold>A8</bold></td>
									<td align="center">5</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
				</p>
				<p>
					<xref ref-type="table" rid="t10">Table 10</xref> presents the analysis and summary of the different types of solutions found in the reviewed literature on large number factorization. These types of solutions include parallel processing, artificial intelligence, code optimization, low-level instructions, performance evaluation, and distributed processing. Each type of solution is listed along with the corresponding articles that use it and the percentage represented in the total number of reviewed articles.</p>
				<p>
					<xref ref-type="table" rid="t10">Table 10</xref> presents the analysis and summary of the different types of solutions found in the reviewed literature on large number factorization. These types of solutions include parallel processing, artificial intelligence, code optimization, low-level instructions, performance evaluation, and distributed processing. Each type of solution is listed along with the corresponding articles that use it and the percentage represented in the total number of reviewed articles.</p>
			</sec>
			<sec>
				<title><italic>3.2. P2: What results have been achieved with the proposed solutions?</italic></title>
				<p>This study identified 17 articles with various proposals focused on the factorization of large numbers. Primary studies are categorized into different types of solutions, with parallel processing showing the highest percentage (45%). This technique is commonly used in factorization algorithms. This section provides a more detailed exploration of the types of solutions found.</p>
				<p>In the parallel processing solutions, A2, A5, and A13 focus on accelerating sparse matrix solutions, a key component in some factorization algorithms. These studies use parallel processing and code optimization to speed up cryptanalysis. A3 proposes a parallel implementation of the Fermat factorization method, demonstrating its significantly faster performance compared to sequential approaches. A6 and A14, in addition to parallel processing, employ low-level instructions that execute more rapidly, enhancing screening in algorithms such as the Quadratic Sieve (QS), Multiple Polynomial Quadratic Sieve (MPQS), and Number Field Sieve (NFS).</p>
				<p>A9 compares the sequential and parallel versions of the Self-Initialization Quadratic Sieve (SIQS) algorithm, showing superior performance for the parallel version. A10 introduces a new parallel module for collecting relations to find B-smooth numbers for the screening process in algorithms. A11 implements parallel screening in the NFS algorithm, evaluating its performance compared to the sequential version, highlighting the advantages of the parallel algorithm. A16 proposes parallelizing the MPQS algorithm using parallel symbolic computations, demonstrating reduced factorization times with more processors. A17 presents a parallel implementation of the NFS algorithm on a SUN cluster, achieving favorable execution times. Similarly, A8 uses mobile agents to distribute QS algorithm processing, showing that using three machines reduces factorization time.</p>
				<p>In a different approach, A4 and A15 focus on artificial intelligence. A4 uses neuromorphic computing to propose a neuromorphic screening method for identifying B-smooth numbers, while A15 introduces a genetic algorithm for integer factorization, successfully factoring numbers up to 8 digits. A12 employs low-level instructions to accelerate screening in the MPQS and NFS algorithms, achieving speedups of 15% to 40%. Finally, A1 and A7 are dedicated to performance evaluation, with A1 focusing on QS and Pollard's rho (PR) algorithms, and A7 on factorization tools like MSieve, GGNSF, and CADO-NFS. Although other studies also include evaluations and experiments, these two specifically concentrate on performance assessment.</p>
			</sec>
			<sec>
				<title><italic>3.3. P3: What is the main challenge of factoring large numbers?</italic></title>
				<p>There are various challenges in researching fast factorization, with the selected studies revealing interrelated issues concerning computational complexity and algorithm optimization. The increase in computational effort required as numbers grow becomes a key point, exacerbated by the demand for faster sieving. In the context of parallel implementation, obstacles include synchronization between processors, memory optimization, and the efficient selection of algorithms and parameters. Proper memory allocation, managing calculation complexity, effective synchronization, and process efficiency are critical factors to address. <xref ref-type="table" rid="t11">Table 11</xref> details each of these challenges in the selected studies.</p>
			</sec>
			<sec>
				<title><italic>3.4. Main Observations</italic></title>
				<p>Systematic mapping allowed for the identification of related works on fast factorization using parallel or distributed processing. After analyzing the results, the following observations are made:</p>
				<p>
					<list list-type="bullet">
						<list-item>
							<p>There is significant interest from the scientific and academic community in this type of research, with various approaches and perspectives presented in <xref ref-type="table" rid="t11">Table 11</xref> to tackle the problem. In the fields of engineering and mathematics, extensive and diverse research has been conducted to reduce factorization times. This study reveals several techniques that can assist other researchers in improving the performance of various algorithms.</p>
						</list-item>
						<list-item>
							<p>Many proposals focus on dividing the problem to reduce factorization times. Numerous studies, as shown in <xref ref-type="table" rid="t11">Table 11</xref>, utilize parallel processing to enhance the performance of factorization algorithms. Studies that employed this approach demonstrated a reduction in execution time compared to sequential implementations.</p>
						</list-item>
						<list-item>
							<p>Many studies agree that computational complexity is one of the most relevant challenges, which continuously increases as the numbers to be factored grow in digits.</p>
						</list-item>
						<list-item>
							<p>Quantum computing could potentially accelerate the execution times of factorization algorithms, as many studies highlight that current resources are inadequate for such demanding processes in terms of processing power and information storage.</p>
						</list-item>
					</list>
				</p>
			</sec>
		</sec>
		<sec sec-type="conclusions">
			<title>4. CONCLUSIONS</title>
			<p>In this study, which covers 17 research articles dedicated to the factorization of large numbers using various methods and/or techniques to address the computational challenge of performing time-costly operations, it was evident that most approaches focus on the implementation of parallel processing techniques, representing 45% of the studies. This approach particularly leverages the performance of various processors to accelerate processes such as sieving or solving sparse matrices, which are critical steps in cryptanalysis algorithms like QS, MPQS, and NFS. This approach showed significant improvements in algorithm performance compared to their sequential implementations.</p>
			<p>The study provides a diverse perspective on the strategies used by researchers in the field of cryptanalysis, such as code optimization, low-level instructions, AI techniques, and distributed processing. By evaluating the performance of various algorithms and factorization tools, these approaches enrich the research field and should continue to be explored as alternatives to the majority of proposed solutions for accelerating factorization processes. Most of these approaches demonstrated performance improvements that help reduce the factorization times of some algorithms.</p>
			<p>
				<table-wrap id="t11">
					<label>Table 11</label>
					<caption>
						<title>Challenges in factorization</title>
					</caption>
					<table frame="hsides" rules="groups">
						<colgroup>
							<col/>
						</colgroup>
						<tbody>
							<tr>
								<td align="center">A1</td>
								<td align="left">The study faced challenges related to time constraints, the complexity of large numbers, variability in prime factors, and the comparison of factorization algorithm performance. These factors influence the difficulty of efficiently addressing the factorization of large numbers.</td>
							</tr>
							<tr>
								<td align="center">A2</td>
								<td align="left">The study faced challenges in concurrency and memory management when implementing a parallel algorithm for NFS and overcame these obstacles through solutions such as localized row allocation and memory optimization techniques.</td>
							</tr>
							<tr>
								<td align="center">A3</td>
								<td align="left">In the context of this study, the researchers encountered obstacles when employing high-performance computing to accelerate the Fermat Factorization (FF) algorithm. These difficulties included the task of breaking the problem into equally sized parts, efficient communication between processors, and the interdependencies present in some solution steps. Additionally, a lack of previous research on parallelizing the FF algorithm, particularly from the perspective of parallel computing, was identified.</td>
							</tr>
							<tr>
								<td align="center">A4</td>
								<td align="left">This study encountered difficulties such as peak collisions and synchronization issues in a neuromorphic approach. The factor base partitioning strategy also presented challenges. These complexities highlight the need for further research to overcome these difficulties in factoring large numbers.</td>
							</tr>
							<tr>
								<td align="center">A5</td>
								<td align="left">The study faced challenges in factoring due to the exponential time required to find the prime factors of a large semiprime number. Issues such as matrix and vector multiplications were encountered in the parallel Block Lanczos algorithm. Additionally, communication and synchronization stages in the parallel implementation took significant time. These challenges were addressed by redesigning the algorithm to improve efficiency.</td>
							</tr>
							<tr>
								<td align="center">A6</td>
								<td align="left">In this study, challenges such as computational complexity, parallelizing the sieving in factorization algorithms using SIMD, and reducing data packing overhead using online and lattice sieving were faced. Intel SSE2 and AVX instructions were used to overcome these difficulties, achieving acceleration of 5-40%.</td>
							</tr>
							<tr>
								<td align="center">A7</td>
								<td align="left">This study addressed challenges in choosing the appropriate open-source factorization library for large numbers on a computer cluster. They compared the efficiency of libraries such as Msieve, GGNFS, and CADO-NFS, noting that Msieve was not optimal for sieving but showed improvements when combined with GGNFS. In the cluster implementation, unexpected increases in time were observed, possibly due to inefficient distribution. Additionally, they faced difficulties in estimating the time required to factor large RSA numbers</td>
							</tr>
							<tr>
								<td align="center">A8</td>
								<td align="left">The challenge in factoring large numbers is the computational complexity in finding their prime factors. Given the lack of efficient algorithms for this task, especially for numbers resulting from the multiplication of large primes, the process consumes significant time and resources. In the study, the lack of numbers with known factors limited the generalization of results, and scalability faced obstacles due to the exponential increase in computational requirements with larger numbers. In summary, complexity, lack of data, and scalability marked the difficulties in this study.</td>
							</tr>
							<tr>
								<td align="center">A9</td>
								<td align="left">Factoring large numbers involves increasing computational complexity with the size of the number, which requires more time. This study identified challenges in implementing and optimizing the SIQS algorithm for this task. Factoring numbers with more than 70 digits became slow due to its complexity. Memory management was improved with a modified storage approach. The sieving phase, the longest part, faced difficulties with polynomial calculations and candidate selection. The search for optimal performance for different numbers was addressed by time and memory analysis and adjustments. In summary, the study tackled challenges related to computational complexity, memory management, and optimization of the SIQS algorithm for factoring large numbers.</td>
							</tr>
							<tr>
								<td align="center">A10</td>
								<td align="left">The difficulties addressed in this study include the computational complexity of factoring large numbers, the challenge of finding prime factors, the need for efficient algorithms and hardware designs, and the limitations of real-world systems.</td>
							</tr>
							<tr>
								<td align="center">A11</td>
								<td align="left">In the study of the parallel implementation of the GNFS algorithm for factoring large integers, key obstacles were identified, including the time consumed by the sieving step, inefficiencies in previous implementations due to excessive communication and load imbalance, and the goal of parallelizing all steps of the algorithm. These difficulties were addressed in the study to improve the efficiency and acceleration of the parallel implementation of GNFS in the factoring of large integers.</td>
							</tr>
							<tr>
								<td align="center">A12</td>
								<td align="left">The researchers faced difficulties in trying to reduce the overhead of packing and unpacking associated with SIMD-based parallelism. While they achieved some acceleration in index calculations, performing it in the subtraction phase proved challenging. It was observed that the frequent data exchange between regular registers and SIMD hindered the benefits of data parallelism. Surprisingly, there were no attempts at SIMD-based parallelization in sieving algorithms found in the literature.</td>
							</tr>
							<tr>
								<td align="center">A13</td>
								<td align="left">The main challenge in factoring large numbers is the time complexity of algorithms like the General Number Field Sieve (GNFS). Although GNFS can factor numbers with more than 140 digits, it takes several months; the slowest part is the sieving and solving the linear system using the Montgomery Block Lanczos method, which is time-consuming. The challenge is to find more efficient and faster methods for these stages to factor large numbers in a reasonable amount of time.</td>
							</tr>
							<tr>
								<td align="center">A14</td>
								<td align="left">The central challenge in factoring large numbers is the increasing computational effort as the numbers grow, as calculating polynomials and performing sieving tasks take more time with larger numbers. This study faced similar difficulties, highlighting the increased computational effort, the need to compute various polynomials and perform sieving, and the constraints of hardware and software platforms in terms of performance and portability.</td>
							</tr>
							<tr>
								<td align="center">A15</td>
								<td align="left">The primary factor in factoring large numbers is the intensification of computational effort as the numbers grow, since polynomial computations and sieving become more prolonged with larger numbers. This study faced similar difficulties, highlighting the increase in computational effort, the need to calculate various polynomials and perform sieving, and the limitations regarding performance and portability of hardware and software platforms.</td>
							</tr>
							<tr>
								<td align="center">A16</td>
								<td align="left">In this study, challenges related to the unpredictability of data dependencies, irregular data access patterns, and variation in parameters in symbolic computations were identified, thus making it difficult to predict memory and processor usage patterns. Transitioning from shared-memory to distributed computing required redesigning the existing software. Synchronization between threads during the sieving stage introduced delays and communication overhead, and the choice between MPI (Message Passing Interface) with shared memory or multiple threads depended on the length of the number.</td>
							</tr>
							<tr>
								<td align="center">A17</td>
								<td align="left">The study presented difficulties during the implementation of the GNFS algorithm. Among these, the high memory demand for larger composite numbers was highlighted, thus posing a challenge in terms of memory usage, even for numbers with fewer than 116 digits. Additionally, synchronization issues were noted, as each processor performs sieving on different pairs and the master node waits for the slave nodes to finish, which can affect efficiency. Furthermore, the current difficulty in factoring integers larger than 116 digits was mentioned due to memory requirements and parameter selection that impact the efficiency of the GNFS algorithm.</td>
							</tr>
						</tbody>
					</table>
				</table-wrap>
			</p>
			<p>There are several challenges surrounding research on fast factorization of semi-prime numbers. One of the most significant is the increase in computational effort required as the numbers to be factored grow in bit length. This complexity is further intensified by the volume of operations and results that need to be stored in memory. One of the most relevant challenges in the context of parallel processing is synchronization between processors and memory management, as inadequate control or optimization can impact the factorization process.</p>
			<p>Finally, it is worth noting that despite recent advances in computing and mathematics, it is still not possible to factorize numbers as large as a 2048-bit RSA key within a reasonable time frame. The largest number factored to date is RSA-250 in February 2020 [<xref ref-type="bibr" rid="B24">24</xref>], an 829-bit number that would have taken about 2700 years to factorize with a single core. However, by utilizing parallel and distributed processing, it was factorized in a few months using multiple machines around the world. Given that this is an exponential problem, researchers in [<xref ref-type="bibr" rid="B24">24</xref>] estimate that a 1024-bit number would be 200 times harder to factor. Studies in quantum technology, such as [<xref ref-type="bibr" rid="B25">25</xref>] suggest that with a quantum computer, factorization could be achieved in polynomial time, leading to significantly shorter times compared to current algorithms, which have exponential complexity. This poses a challenge for current information security, prompting the development of quantum cryptographic systems [<xref ref-type="bibr" rid="B26">26</xref>].</p>
		</sec>
	</body>
	<back>
		<ack>
			<title>ACKNOWLEDGMENTS</title>
			<p>To the University of Cauca, especially to the SEC (Security, Encryption &amp; Cybersecurity) research group, the GTI research group, and the Altenua-Matdis research group for the support provided in the development of this work. Professors Siler Amador Donado and César Pardo are grateful for the contribution of the Universidad del Cauca, where they currently work as a full professors.</p>
		</ack>
		<ref-list>
			<title>REFERENCES</title>
			<ref id="B1">
				<label>[1]</label>
				<mixed-citation>Ponemon Institute, <italic>Global Encryption Trends Study: The data is in the cloud, but who's in control?</italic> 2022. Available: <ext-link ext-link-type="uri" xlink:href="https://www.entrust.com/es/resources/reports/global-encryption-trends-study">https://www.entrust.com/es/resources/reports/global-encryption-trends-study</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<collab>Ponemon Institute</collab>
					</person-group>
					<source>Global Encryption Trends Study: The data is in the cloud, but who's in control?</source>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://www.entrust.com/es/resources/reports/global-encryption-trends-study">https://www.entrust.com/es/resources/reports/global-encryption-trends-study</ext-link>
				</element-citation>
			</ref>
			<ref id="B2">
				<label>[2]</label>
				<mixed-citation>E. Suescún-Monsalve, J.-C. Sampaio-do-Prado-Leite, C.-J. Pardo-Calvache, &quot;Semi-Automatic Mapping Technique Using Snowballing to Support Massive Literature Searches in Software Engineering,&quot; <italic>Revista Facultad de Ingeniería</italic>, vol. 31, no. 60, e14189, May 2022, <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.19053/01211129.v31.n60.2022.14189">https://doi.org/10.19053/01211129.v31.n60.2022.14189</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Suescún-Monsalve</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>Sampaio-do-Prado-Leite</surname>
							<given-names>J.-C.</given-names>
						</name>
						<name>
							<surname>Pardo-Calvache</surname>
							<given-names>C.-J.</given-names>
						</name>
					</person-group>
					<article-title>Semi-Automatic Mapping Technique Using Snowballing to Support Massive Literature Searches in Software Engineering</article-title>
					<source>Revista Facultad de Ingeniería</source>
					<volume>31</volume>
					<issue>60</issue>
					<elocation-id>e14189</elocation-id>
					<year>2022</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.19053/01211129.v31.n60.2022.14189">https://doi.org/10.19053/01211129.v31.n60.2022.14189</ext-link>
				</element-citation>
			</ref>
			<ref id="B3">
				<label>[3]</label>
				<mixed-citation>K. Petersen, H. Flensburg, R. Feldt, M. Mattsson, S. Mujtaba, <italic>Systematic Mapping Studies in Software Engineering</italic>, 2008.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Petersen</surname>
							<given-names>K.</given-names>
						</name>
						<name>
							<surname>Flensburg</surname>
							<given-names>H.</given-names>
						</name>
						<name>
							<surname>Feldt</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Mattsson</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Mujtaba</surname>
							<given-names>S.</given-names>
						</name>
					</person-group>
					<source>Systematic Mapping Studies in Software Engineering</source>
					<year>2008</year>
				</element-citation>
			</ref>
			<ref id="B4">
				<label>[4]</label>
				<mixed-citation>B. Kitchenham, S. M. Charters, <italic>Guidelines for performing Systematic Literature Reviews in Software Engineering</italic>, 2007.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Kitchenham</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Charters</surname>
							<given-names>S. M.</given-names>
						</name>
					</person-group>
					<source>Guidelines for performing Systematic Literature Reviews in Software Engineering</source>
					<year>2007</year>
				</element-citation>
			</ref>
			<ref id="B5">
				<label>[5]</label>
				<mixed-citation>D. Budgen, M. Turner, P. Brereton, B. Kitchenham, <italic>Using Mapping Studies in Software Engineering</italic>&quot; 2008. <ext-link ext-link-type="uri" xlink:href="https://www.ebse.org.uk">https://www.ebse.org.uk</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Budgen</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Turner</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Brereton</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Kitchenham</surname>
							<given-names>B.</given-names>
						</name>
					</person-group>
					<source>Using Mapping Studies in Software Engineering</source>
					<year>2008</year>
					<ext-link ext-link-type="uri" xlink:href="https://www.ebse.org.uk">https://www.ebse.org.uk</ext-link>
				</element-citation>
			</ref>
			<ref id="B6">
				<label>[6]</label>
				<mixed-citation>E. Nicolás, P. Paredes, C. E. Orozco, C. Pardo, &quot;Análisis del estado del arte acerca de la (in)felicidad en las comunidades de desarrollo de software ágil,&quot; <italic>RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao</italic>, vol. 57, pp. 425-437, 2023.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Nicolás</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>Paredes</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Orozco</surname>
							<given-names>C. E.</given-names>
						</name>
						<name>
							<surname>Pardo</surname>
							<given-names>C.</given-names>
						</name>
					</person-group>
					<article-title>Análisis del estado del arte acerca de la (in)felicidad en las comunidades de desarrollo de software ágil</article-title>
					<source>RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao</source>
					<volume>57</volume>
					<fpage>425</fpage>
					<lpage>437</lpage>
					<year>2023</year>
				</element-citation>
			</ref>
			<ref id="B7">
				<label>[7]</label>
				<mixed-citation>Z. Li and W. Gasarch, <italic>An Empirical Comparison of the Quadratic Sieve Factoring Algorithm and the Pollard Rho Factoring Algorithm</italic>, 2021. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.48550/arXiv.2111.02967">https://doi.org/10.48550/arXiv.2111.02967</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Li</surname>
							<given-names>Z.</given-names>
						</name>
						<name>
							<surname>Gasarch</surname>
							<given-names>W.</given-names>
						</name>
					</person-group>
					<source>An Empirical Comparison of the Quadratic Sieve Factoring Algorithm and the Pollard Rho Factoring Algorithm</source>
					<year>2021</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.48550/arXiv.2111.02967">https://doi.org/10.48550/arXiv.2111.02967</ext-link>
				</element-citation>
			</ref>
			<ref id="B8">
				<label>[8]</label>
				<mixed-citation>C. Bouillaguet, P. Zimmermann, <italic>Parallel Structured Gaussian Elimination for the Number Field Sieve</italic>, 2021.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Bouillaguet</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Zimmermann</surname>
							<given-names>P.</given-names>
						</name>
					</person-group>
					<source>Parallel Structured Gaussian Elimination for the Number Field Sieve</source>
					<year>2021</year>
				</element-citation>
			</ref>
			<ref id="B9">
				<label>[9]</label>
				<mixed-citation>H. M. Bahig, H. M. Bahig, Y. Kotb, &quot;Fermat factorization using a multi-core system,&quot; <italic>International Journal of Advanced Computer Science and Applications</italic>, vol. 11, no. 4, pp. 323-330, 2020. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.14569/IJACSA.2020.0110444">https://doi.org/10.14569/IJACSA.2020.0110444</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Bahig</surname>
							<given-names>H. M.</given-names>
						</name>
						<name>
							<surname>Bahig</surname>
							<given-names>H. M.</given-names>
						</name>
						<name>
							<surname>Kotb</surname>
							<given-names>Y.</given-names>
						</name>
					</person-group>
					<article-title>Fermat factorization using a multi-core system</article-title>
					<source>International Journal of Advanced Computer Science and Applications</source>
					<volume>11</volume>
					<issue>4</issue>
					<fpage>323</fpage>
					<lpage>330</lpage>
					<year>2020</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.14569/IJACSA.2020.0110444">https://doi.org/10.14569/IJACSA.2020.0110444</ext-link>
				</element-citation>
			</ref>
			<ref id="B10">
				<label>[10]</label>
				<mixed-citation>J. V. Monaco, M. M. Vindiola, &quot;Factoring Integers with a Brain-Inspired Computer,&quot; <italic>IEEE Transactions on Circuits and Systems I: Regular Papers</italic>, vol. 65, no. 3, pp. 1051-1062, 2018. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/TCSI.2017.2771533">https://doi.org/10.1109/TCSI.2017.2771533</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Monaco</surname>
							<given-names>J. V.</given-names>
						</name>
						<name>
							<surname>Vindiola</surname>
							<given-names>M. M.</given-names>
						</name>
					</person-group>
					<article-title>Factoring Integers with a Brain-Inspired Computer</article-title>
					<source>IEEE Transactions on Circuits and Systems I: Regular Papers</source>
					<volume>65</volume>
					<issue>3</issue>
					<fpage>1051</fpage>
					<lpage>1062</lpage>
					<year>2018</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/TCSI.2017.2771533">https://doi.org/10.1109/TCSI.2017.2771533</ext-link>
				</element-citation>
			</ref>
			<ref id="B11">
				<label>[11]</label>
				<mixed-citation>L. T. Yang, Y. Huang, J. Feng, Q. Pan, C. Zhu, &quot;An improved parallel block Lanczos algorithm over GF(2) for integer factorization,&quot; <italic>Information Sciences</italic>, vol. 379, no. 2, pp. 257-273, 2017. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ins.2016.09.052">https://doi.org/10.1016/j.ins.2016.09.052</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Yang</surname>
							<given-names>L. T.</given-names>
						</name>
						<name>
							<surname>Huang</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>Feng</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Pan</surname>
							<given-names>Q.</given-names>
						</name>
						<name>
							<surname>Zhu</surname>
							<given-names>C.</given-names>
						</name>
					</person-group>
					<article-title>An improved parallel block Lanczos algorithm over GF(2) for integer factorization</article-title>
					<source>Information Sciences</source>
					<volume>379</volume>
					<issue>2</issue>
					<fpage>257</fpage>
					<lpage>273</lpage>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ins.2016.09.052">https://doi.org/10.1016/j.ins.2016.09.052</ext-link>
				</element-citation>
			</ref>
			<ref id="B12">
				<label>[12]</label>
				<mixed-citation>B. Sengupta, A. Das, &quot;Use of SIMD-based data parallelism to speed up sieving in integerfactoring algorithms,&quot; <italic>Appl Math Comput</italic>, vol. 293, pp. 204-217, 2017. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.amc.2016.08.019">https://doi.org/10.1016/j.amc.2016.08.019</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Sengupta</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Das</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<article-title>Use of SIMD-based data parallelism to speed up sieving in integerfactoring algorithms</article-title>
					<source>Appl Math Comput</source>
					<volume>293</volume>
					<fpage>204</fpage>
					<lpage>217</lpage>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.amc.2016.08.019">https://doi.org/10.1016/j.amc.2016.08.019</ext-link>
				</element-citation>
			</ref>
			<ref id="B13">
				<label>[13]</label>
				<mixed-citation>E. J. Vuicik, D. Sesok, S. Ramanauskaitè, &quot;Efficiency of RSA Key Factorization by Open-Source Libraries and Distributed System Architecture,&quot; <italic>Baltic Journal of Modern Computing</italic>, vol. 5, no. 3, pp. 269-274, 2017. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.22364/bjmc.2017.5.3.02">https://doi.org/10.22364/bjmc.2017.5.3.02</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Vuicik</surname>
							<given-names>E. J.</given-names>
						</name>
						<name>
							<surname>Sesok</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Ramanauskaitè</surname>
							<given-names>S.</given-names>
						</name>
					</person-group>
					<article-title>Efficiency of RSA Key Factorization by Open-Source Libraries and Distributed System Architecture</article-title>
					<source>Baltic Journal of Modern Computing</source>
					<volume>5</volume>
					<issue>3</issue>
					<fpage>269</fpage>
					<lpage>274</lpage>
					<year>2017</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.22364/bjmc.2017.5.3.02">https://doi.org/10.22364/bjmc.2017.5.3.02</ext-link>
				</element-citation>
			</ref>
			<ref id="B14">
				<label>[14]</label>
				<mixed-citation>V. Shende, G. Sudi, M. Kulkarni, &quot;Fast cryptanalysis of RSA encrypted data using a combination of mathematical and brute force attack in distributed computing environment,&quot; in <italic>IEEE</italic> 
 <italic>International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)</italic>, 2017, pp. 2446-2449. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICPCSI.2017.8392156">https://doi.org/10.1109/ICPCSI.2017.8392156</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Shende</surname>
							<given-names>V.</given-names>
						</name>
						<name>
							<surname>Sudi</surname>
							<given-names>G.</given-names>
						</name>
						<name>
							<surname>Kulkarni</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<source>Fast cryptanalysis of RSA encrypted data using a combination of mathematical and brute force attack in distributed computing environment</source>
					<conf-sponsor>IEEE</conf-sponsor>
					<conf-name>International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)</conf-name>
					<year>2017</year>
					<fpage>2446</fpage>
					<lpage>2449</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICPCSI.2017.8392156">https://doi.org/10.1109/ICPCSI.2017.8392156</ext-link>
				</element-citation>
			</ref>
			<ref id="B15">
				<label>[15]</label>
				<mixed-citation>D. Breitenbacher, I. Homoliak, J. Jaros, P. Hanacek, &quot;Impact of optimization and parallelism on factorization speed of SIQS,&quot; in <italic>20</italic>
 <italic>th</italic> 
 <italic>World Multi-Conference on Systemics, Cybernetics and Informatics</italic>, 2016, pp. 55-62.</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Breitenbacher</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Homoliak</surname>
							<given-names>I.</given-names>
						</name>
						<name>
							<surname>Jaros</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Hanacek</surname>
							<given-names>P.</given-names>
						</name>
					</person-group>
					<source>Impact of optimization and parallelism on factorization speed of SIQS</source><italic>th</italic><conf-name>20World Multi-Conference on Systemics, Cybernetics and Informatics</conf-name>
					<year>2016</year>
					<fpage>55</fpage>
					<lpage>62</lpage>
				</element-citation>
			</ref>
			<ref id="B16">
				<label>[16]</label>
				<mixed-citation>H. Yu, G. Bai, &quot;Strategy of Relations Collection in Factoring RSA Modulus,&quot; <italic>Lecture Notes in Computer Science</italic>, vol. 9543, pp. 199-211, 2016. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-319-29814-6_16">https://doi.org/10.1007/978-3-319-29814-6_16</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Yu</surname>
							<given-names>H.</given-names>
						</name>
						<name>
							<surname>Bai</surname>
							<given-names>G.</given-names>
						</name>
					</person-group>
					<article-title>Strategy of Relations Collection in Factoring RSA Modulus</article-title>
					<source>Lecture Notes in Computer Science</source>
					<volume>9543</volume>
					<fpage>199</fpage>
					<lpage>211</lpage>
					<year>2016</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-319-29814-6_16">https://doi.org/10.1007/978-3-319-29814-6_16</ext-link>
				</element-citation>
			</ref>
			<ref id="B17">
				<label>[17]</label>
				<mixed-citation>S. Daoud, I. Gad, &quot;A parallel line sieve for the GNFS Algorithm,&quot; <italic>International Journal of Advanced Computer Science and Applications</italic>, vol. 5, no. 7, pp. 178-185, 2014. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.14569/ijacsa.2014.050727">https://doi.org/10.14569/ijacsa.2014.050727</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Daoud</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Gad</surname>
							<given-names>I.</given-names>
						</name>
					</person-group>
					<article-title>A parallel line sieve for the GNFS Algorithm</article-title>
					<source>International Journal of Advanced Computer Science and Applications</source>
					<volume>5</volume>
					<issue>7</issue>
					<fpage>178</fpage>
					<lpage>185</lpage>
					<year>2014</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.14569/ijacsa.2014.050727">https://doi.org/10.14569/ijacsa.2014.050727</ext-link>
				</element-citation>
			</ref>
			<ref id="B18">
				<label>[18]</label>
				<mixed-citation>B. Sengupta, A. Das, &quot;SIMD-based implementations of sieving in integer-factoring algorithms,&quot; <italic>Lecture Notes in Computer Science</italic>, vol. 8204, pp. 40-55, 2013. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-642-41224-0_4">https://doi.org/10.1007/978-3-642-41224-0_4</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Sengupta</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Das</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<article-title>SIMD-based implementations of sieving in integer-factoring algorithms</article-title>
					<source>Lecture Notes in Computer Science</source>
					<volume>8204</volume>
					<fpage>40</fpage>
					<lpage>55</lpage>
					<year>2013</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-642-41224-0_4">https://doi.org/10.1007/978-3-642-41224-0_4</ext-link>
				</element-citation>
			</ref>
			<ref id="B19">
				<label>[19]</label>
				<mixed-citation>L. T. Yang, L. Xu, S. S. Yeo, S. Hussain, &quot;An integrated parallel GNFS algorithm for integer factorization based on Linbox Montgomery block Lanczos method over GF(2),&quot; <italic>Computers and Mathematics with Applications</italic>, vol. 60, no. 2, pp. 338-346, 2010. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.camwa.2010.01.020">https://doi.org/10.1016/j.camwa.2010.01.020</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Yang</surname>
							<given-names>L. T.</given-names>
						</name>
						<name>
							<surname>Xu</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Yeo</surname>
							<given-names>S. S.</given-names>
						</name>
						<name>
							<surname>Hussain</surname>
							<given-names>S.</given-names>
						</name>
					</person-group>
					<article-title>An integrated parallel GNFS algorithm for integer factorization based on Linbox Montgomery block Lanczos method over GF(2)</article-title>
					<source>Computers and Mathematics with Applications</source>
					<volume>60</volume>
					<issue>2</issue>
					<fpage>338</fpage>
					<lpage>346</lpage>
					<year>2010</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.camwa.2010.01.020">https://doi.org/10.1016/j.camwa.2010.01.020</ext-link>
				</element-citation>
			</ref>
			<ref id="B20">
				<label>[20]</label>
				<mixed-citation>U. Meyer-Bäse, G. Botella, E. Castillo, A. García, &quot;Nios II hardware acceleration of the epsilon quadratic sieve algorithm,&quot; <italic>Proceedings of SPIE - The International Society for Optical Engineering</italic>, vol. 7703, e77030M, 2010. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1117/12.849883">https://doi.org/10.1117/12.849883</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Meyer-Bäse</surname>
							<given-names>U.</given-names>
						</name>
						<name>
							<surname>Botella</surname>
							<given-names>G.</given-names>
						</name>
						<name>
							<surname>Castillo</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>García</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<article-title>Nios II hardware acceleration of the epsilon quadratic sieve algorithm</article-title>
					<source>Proceedings of SPIE - The International Society for Optical Engineering</source>
					<volume>7703</volume>
					<year>2010</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1117/12.849883">https://doi.org/10.1117/12.849883</ext-link>
				</element-citation>
			</ref>
			<ref id="B21">
				<label>[21]</label>
				<mixed-citation>R. V. Yampolskiy, &quot;Application of bio-inspired algorithm to the problem of integer factorization,&quot; <italic>International Journal of Bio-Inspired Computation</italic>, vol. 2, no. 2, pp. 115-123, 2010. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1504/IJBIC.2010.032127">https://doi.org/10.1504/IJBIC.2010.032127</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Yampolskiy</surname>
							<given-names>R. V.</given-names>
						</name>
					</person-group>
					<article-title>Application of bio-inspired algorithm to the problem of integer factorization</article-title>
					<source>International Journal of Bio-Inspired Computation</source>
					<volume>2</volume>
					<issue>2</issue>
					<fpage>115</fpage>
					<lpage>123</lpage>
					<year>2010</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1504/IJBIC.2010.032127">https://doi.org/10.1504/IJBIC.2010.032127</ext-link>
				</element-citation>
			</ref>
			<ref id="B22">
				<label>[22]</label>
				<mixed-citation>G. Macariu, D. Petcu, &quot;Parallel multiple polynomial quadratic sieves on multi-core architectures,&quot; in <italic>9th</italic> 
 <italic>International Symposium on Symbolic and Numeric Algorithms for Scientific Computing</italic>, pp. 59-65, 2007. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/SYNASC.2007.21">https://doi.org/10.1109/SYNASC.2007.21</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Macariu</surname>
							<given-names>G.</given-names>
						</name>
						<name>
							<surname>Petcu</surname>
							<given-names>D.</given-names>
						</name>
					</person-group>
					<source>Parallel multiple polynomial quadratic sieves on multi-core architectures</source>
					<conf-name>9thInternational Symposium on Symbolic and Numeric Algorithms for Scientific Computing</conf-name>
					<fpage>59</fpage>
					<lpage>65</lpage>
					<year>2007</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/SYNASC.2007.21">https://doi.org/10.1109/SYNASC.2007.21</ext-link>
				</element-citation>
			</ref>
			<ref id="B23">
				<label>[23]</label>
				<mixed-citation>L. T. Yang, L. Xu, M. Lin, &quot;Integer factorization by a parallel GNFS algorithm for public key cryptosystems,&quot; <italic>Lecture Notes in Computer Science</italic>, vol. 3820, pp. 683-695, 2005. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/11599555_65">https://doi.org/10.1007/11599555_65</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Yang</surname>
							<given-names>L. T.</given-names>
						</name>
						<name>
							<surname>Xu</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Lin</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<article-title>Integer factorization by a parallel GNFS algorithm for public key cryptosystems</article-title>
					<source>Lecture Notes in Computer Science</source>
					<volume>3820</volume>
					<fpage>683</fpage>
					<lpage>695</lpage>
					<year>2005</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/11599555_65">https://doi.org/10.1007/11599555_65</ext-link>
				</element-citation>
			</ref>
			<ref id="B24">
				<label>[24]</label>
				<mixed-citation>F. Boudot <italic>et al</italic>., &quot;State of the Art in Integer Factoring and Breaking Public-Key Cryptography,&quot; <italic>IEEE Security and Privacy Magazine</italic>, vol. 2022, no. 2, e314918. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/MSEC.2022.3141918Ï">https://doi.org/10.1109/MSEC.2022.3141918Ï</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Boudot</surname>
							<given-names>F.</given-names>
						</name>
						<etal/>
					</person-group>
					<article-title>State of the Art in Integer Factoring and Breaking Public-Key Cryptography</article-title>
					<source>IEEE Security and Privacy Magazine</source>
					<year>2022</year>
					<issue>2</issue>
					<elocation-id>e314918</elocation-id>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/MSEC.2022.3141918Ï">https://doi.org/10.1109/MSEC.2022.3141918Ï</ext-link>
				</element-citation>
			</ref>
			<ref id="B25">
				<label>[25]</label>
				<mixed-citation>R. Young, P. Birch, C. Chatwin, <italic>A simplification of the Shor quantum factorization algorithm employing a quantum Hadamard transform</italic>, 2018. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1117/12.2309468">https://doi.org/10.1117/12.2309468</ext-link>
				</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Young</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Birch</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Chatwin</surname>
							<given-names>C.</given-names>
						</name>
					</person-group>
					<source>A simplification of the Shor quantum factorization algorithm employing a quantum Hadamard transform</source>
					<year>2018</year>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1117/12.2309468">https://doi.org/10.1117/12.2309468</ext-link>
				</element-citation>
			</ref>
			<ref id="B26">
				<label>[26]</label>
				<mixed-citation>S. K. Sehgal, R. Gupta, &quot;Quantum Cryptography and Quantum Key,&quot; in <italic>International Conference on Industrial Electronics Research and Applications</italic>, 2021, pp. 1-5. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICIERA53202.2021.9726722">https://doi.org/10.1109/ICIERA53202.2021.9726722</ext-link>
				</mixed-citation>
				<element-citation publication-type="confproc">
					<person-group person-group-type="author">
						<name>
							<surname>Sehgal</surname>
							<given-names>S. K.</given-names>
						</name>
						<name>
							<surname>Gupta</surname>
							<given-names>R.</given-names>
						</name>
					</person-group>
					<source>Quantum Cryptography and Quantum Key</source>
					<conf-name>International Conference on Industrial Electronics Research and Applications</conf-name>
					<year>2021</year>
					<fpage>1</fpage>
					<lpage>5</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICIERA53202.2021.9726722">https://doi.org/10.1109/ICIERA53202.2021.9726722</ext-link>
				</element-citation>
			</ref>
		</ref-list>
		<fn-group>
			<fn fn-type="other" id="fn2">
				<label>How to cite:</label>
				<p> J-A. Melo, S. Amador-Donado, C-J. Pardo-Calvache, &quot;Systematic Mapping Study on Fast Factorization Using Parallel or Distributed Processing Applied to Cryptanalysis&quot;, <italic>Revista Facultad de Ingeniería,</italic> vol. 33, no. 69, e17935, 2024. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.19053/01211129.v33.n69.2024.17935">https://doi.org/10.19053/01211129.v33.n69.2024.17935</ext-link>
				</p>
			</fn>
			<fn fn-type="other" id="fn3">
				<label>AUTHOR CONTRIBUTIONS</label>
				<p><bold>Jhon-Alejandro Melo:</bold> Conceptualization, data curation, formal analysis, research, software, visualization and writing - original draft. <bold>Siler Amador-Donado:</bold> Conceptualization, project administration, methodology, supervision and writing - review and editing. <bold>César-Jesús Pardo-Calvache:</bold> Conceptualization, project administration and writing - review and editing.</p>
			</fn>
		</fn-group>
	</back>
</article>