Results 11 to 20 of about 10,250 (292)

Equidistribution from the Chinese Remainder Theorem [PDF]

open access: yesAdvances in Mathematics, 2021
ISSN:1090 ...
Kowalski, Emmanuel   +1 more
semanticscholar   +7 more sources

Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures

open access: yesIET Information Security, 2021
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea   +1 more
doaj   +2 more sources

A Note on Multiple Secret Sharing Using Chinese Remainder Theorem and Exclusive-OR

open access: yesIEEE Access, 2019
This paper reviews the former existing scheme on (n,n) -multiple secret sharing (MSS) for color images along with its slight limitation. This scheme generates a set of n shared images from a set of n secret images using the Chinese remainder theorem (CRT)
Heri Prasetyo, Jing-Ming Guo
doaj   +2 more sources

PDF steganography based on Chinese Remainder Theorem [PDF]

open access: yesJournal of Information Security and Applications, 2016
We propose different approaches of PDF files based steganography, essentially based on the Chinese Remainder Theorem. Here, after a cover PDF document has been released from unnecessary A0, a secret message is hidden in it using one of the proposed approaches, making it invisible to common PDF readers, and the file is then transmitted through a non ...
Ndoundam, Rene   +1 more
openaire   +4 more sources

The Chinese Remainder Theorem

open access: yesCertain Number-Theoretic Episodes in Algebra, 2019
The terminology and notation used in this paper are introduced in the following articles: [20], [16], [9], [14], [18], [1], [10], [13], [12], [15], [11], [17], [21], [6], [7], [2], [5], [3], [8], [4], and [19].
Andrzej Kondracki
openaire   +2 more sources

Secure Data Aggregation in Wireless Sensor Network using Chinese Remainder Theorem [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
A new method of lossless Secure Data Aggregation for Wireless Sensor Network is presented. Secure Data Aggregation is achieved using the popular Chinese Remainder theorem.
Sanu Thomas, Thomaskutty Mathew
doaj   +1 more source

Robust Multidimentional Chinese Remainder Theorem for Integer Vector Reconstruction [PDF]

open access: yesIEEE Transactions on Signal Processing, 2023
The problem of robustly reconstructing an integer vector from its erroneous remainders appears in many applications in the field of multidimensional (MD) signal processing. To address this problem, a robust MD Chinese remainder theorem (CRT) was recently
Li Xiao, Haiye Huo, Xianggen Xia
semanticscholar   +1 more source

A Chinese Remainder Theorem for partitions

open access: yesThe Ramanujan Journal, 2023
AbstractLet s, t be natural numbers and fix an s-core partition $$\sigma $$ σ and a t-core partition $$\tau $$ τ . Put $$d=\gcd (s,t)$$ d = gcd ( s
Kayanattath Seethalakshmi   +1 more
openaire   +3 more sources

The Optimal Equations with Chinese Remainder Theorem for RSA's Decryption Process

open access: yesJ. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2023
This research was designed to provide an idea for choosing the best two equations that can be used to finish the RSA decryption process. In general, the four strategies suggested to accelerate this procedure are competitors.
Kritsanapong Somsuk   +4 more
semanticscholar   +1 more source

Research and design of CRT-based homomorphic ciphertext database system

open access: yesHigh-Confidence Computing, 2022
The cloud’s storage and query of private information have the cryptographic scholar due to the proliferation of cloud computing. In the traditional query mode, the private information stored in the cloud is at risk of being leaked. In order to solve this
De Zhao   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy