Results 11 to 20 of about 31,786 (276)
PDF steganography based on Chinese Remainder Theorem [PDF]
We propose different approaches of PDF files based steganography, essentially based on the Chinese Remainder Theorem. Here, after a cover PDF document has been released from unnecessary A0, a secret message is hidden in it using one of the proposed approaches, making it invisible to common PDF readers, and the file is then transmitted through a non ...
Ndoundam, Rene +1 more
openaire +4 more sources
Chinese remainder theorem secret sharing in multivariate polynomials
This paper deals with a generalization of the secret sharing using Chinese remainder theorem over the integers to multivariate polynomials over a finite field. We work with the ideals and their Gröbner bases instead of integer moduli.
Gennadii V. Matveev
doaj +1 more source
On Solving a Generalized Chinese Remainder Theorem in the Presence of Remainder Errors [PDF]
In estimating frequencies given that the signal waveforms are undersampled multiple times, Xia et. al. proposed to use a generalized version of Chinese remainder Theorem (CRT), where the moduli are $M_1, M_2, \cdots, M_k$ which are not necessarily ...
D Striuk +5 more
core +1 more source
Taking a problem from a Chinese mathematical classic, the authors give a slightly generalised algorithm corresponding to what is known as the ``Chinese remainder theorem''. There are many historical inaccuracies in the paper, and no mathematical innovations.
Ku, Y. H., Sun, Xiaoguang
openaire +1 more source
Efficient Batch Fully Homomorphic Encryption with a Shorter Key from Ring-LWE
Fully homomorphic encryption allows users to use the computing resources of cloud servers for the computation of encrypted data without worrying about data leakage.
Yuyue Chen, Ruwei Huang, Bo Yang
doaj +1 more source
Computing Hilbert class polynomials with the Chinese Remainder Theorem [PDF]
We present a space-efficient algorithm to compute the Hilbert class polynomial H_D(X) modulo a positive integer P, based on an explicit form of the Chinese Remainder Theorem.
Sutherland, Andrew V.
core +5 more sources
What is special about the divisors of 24? [PDF]
What is an interesting number theoretic or a combinatorial characterization of the divisors of 24 amongst all positive integers? In this paper I will provide one characterization in terms of modular multiplication tables.
Chebolu, Sunil K.
core +1 more source
The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely heavily on the vehicle’s tamper-proof device (TPD) and roadside units (RSUs ...
Mahmood A. Al-Shareeda +3 more
doaj +1 more source
RESEARCH OF EFFECTIVE METHODS OF CONVERSION FROM RNS TO POSITIONAL NOTATION ON FPGA
In the article different methods of conversion numbers from the residue number system to the binary number system was investigated. The simulation on the FPGA is performed, which implies that the approximate method based on the Chinese remainder theorem ...
N. N. Chervyakov +3 more
doaj
Scaling function based on Chinese remainder theorem applied to a recursive filter design [PDF]
Implementation of IIR filters in residue number system (RNS) architecture is more complex in comparison to FIR filters, due to introduction of the scaling function.
Stamenković Negovan +2 more
doaj +1 more source

