Results 11 to 20 of about 31,786 (276)

PDF steganography based on Chinese Remainder Theorem [PDF]

open access: yesJournal of Information Security and Applications, 2016
We propose different approaches of PDF files based steganography, essentially based on the Chinese Remainder Theorem. Here, after a cover PDF document has been released from unnecessary A0, a secret message is hidden in it using one of the proposed approaches, making it invisible to common PDF readers, and the file is then transmitted through a non ...
Ndoundam, Rene   +1 more
openaire   +4 more sources

Chinese remainder theorem secret sharing in multivariate polynomials

open access: yesЖурнал Белорусского государственного университета: Математика, информатика, 2019
This paper deals with a generalization of the secret sharing using Chinese remainder theorem over the integers to multivariate polynomials over a finite field. We work with the ideals and their Gröbner bases instead of integer moduli.
Gennadii V. Matveev
doaj   +1 more source

On Solving a Generalized Chinese Remainder Theorem in the Presence of Remainder Errors [PDF]

open access: yes, 2017
In estimating frequencies given that the signal waveforms are undersampled multiple times, Xia et. al. proposed to use a generalized version of Chinese remainder Theorem (CRT), where the moduli are $M_1, M_2, \cdots, M_k$ which are not necessarily ...
D Striuk   +5 more
core   +1 more source

The chinese remainder theorem

open access: yesJournal of the Franklin Institute, 1992
Taking a problem from a Chinese mathematical classic, the authors give a slightly generalised algorithm corresponding to what is known as the ``Chinese remainder theorem''. There are many historical inaccuracies in the paper, and no mathematical innovations.
Ku, Y. H., Sun, Xiaoguang
openaire   +1 more source

Efficient Batch Fully Homomorphic Encryption with a Shorter Key from Ring-LWE

open access: yesApplied Sciences, 2022
Fully homomorphic encryption allows users to use the computing resources of cloud servers for the computation of encrypted data without worrying about data leakage.
Yuyue Chen, Ruwei Huang, Bo Yang
doaj   +1 more source

Computing Hilbert class polynomials with the Chinese Remainder Theorem [PDF]

open access: yes, 2009
We present a space-efficient algorithm to compute the Hilbert class polynomial H_D(X) modulo a positive integer P, based on an explicit form of the Chinese Remainder Theorem.
Sutherland, Andrew V.
core   +5 more sources

What is special about the divisors of 24? [PDF]

open access: yes, 2012
What is an interesting number theoretic or a combinatorial characterization of the divisors of 24 amongst all positive integers? In this paper I will provide one characterization in terms of modular multiplication tables.
Chebolu, Sunil K.
core   +1 more source

Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks

open access: yesApplied Sciences, 2022
The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely heavily on the vehicle’s tamper-proof device (TPD) and roadside units (RSUs ...
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

RESEARCH OF EFFECTIVE METHODS OF CONVERSION FROM RNS TO POSITIONAL NOTATION ON FPGA

open access: yesСовременная наука и инновации, 2022
In the article different methods of conversion numbers from the residue number system to the binary number system was investigated. The simulation on the FPGA is performed, which implies that the approximate method based on the Chinese remainder theorem ...
N. N. Chervyakov   +3 more
doaj  

Scaling function based on Chinese remainder theorem applied to a recursive filter design [PDF]

open access: yesSerbian Journal of Electrical Engineering, 2014
Implementation of IIR filters in residue number system (RNS) architecture is more complex in comparison to FIR filters, due to introduction of the scaling function.
Stamenković Negovan   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy