Results 241 to 250 of about 10,250 (292)
Some of the next articles are maybe not open access.

Sheaf representation and Chinese remainder theorems

Algebra Universalis, 1992
\textit{D. M. Clark} and \textit{P. H. Krauss} [``Global subdirect products'', Mem. Am. Math. Soc. 210 (1979; Zbl 0421.08001)] define an algebra to be globally (Boolean) representable by a class of algebras \({\mathcal M}\) if it is isomorphic to the algebra of the global sections of a subdirect sheaf whose index space is compact and \(T_ 0\) and whose
openaire   +2 more sources

Optimal estimates of common remainder for the robust Chinese Remainder Theorem

Communications in Nonlinear Science and Numerical Simulation, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Xiaoping   +4 more
openaire   +1 more source

Robustness in Chinese Remainder Theorem for Multiple Numbers and Remainder Coding

IEEE Transactions on Signal Processing, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hanshen Xiao   +3 more
openaire   +1 more source

Generalization of the Chinese remainder theorem

Vestnik St. Petersburg University: Mathematics, 2007
Let \(B\) denote an \(m \times (m+1)\) \textit{basis} matrix with integer entries, and let \(r\) denote a column vector with \(m\) integer components. This paper presents sufficient conditions for vector solutions \(x\) with integer components of the linear system \(Bx = r\) in the cases that \(B\) is \textit{marginal} as well as \textit{saturated.} In
Davydova, I. M., Fedoseeva, E. Ya.
openaire   +1 more source

Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem

IET Information Security, 2019
In this study, the authors propose a new protocol to share secret shadows for verifiable ( t , n ) secret sharing (VSS) schemes. Unlike traditional VSS schemes, whose communications between the dealer and the participants require a secure channel, the ...
Maryam Sheikhi-Garjan   +2 more
semanticscholar   +1 more source

A Generalized Chinese Remainder Theorem

The College Mathematics Journal, 2002
(2002). A Generalized Chinese Remainder Theorem. The College Mathematics Journal: Vol. 33, No. 4, pp. 279-282.
openaire   +1 more source

The Chinese Remainder Theorem

1979
The Chinese remainder theorem is so named because it was known to the ancient Chinese. In its original form, it is good for solving problems, as we’ll see in the exercises. But suitably reinterpreted, it is a powerful tool for helping us understand how numbers relate in different moduli.
openaire   +1 more source

Single Secret Sharing Scheme Using Chinese Remainder Theorem, Modified Shamir’s Scheme and XOR Operation

Wireless personal communications, 2023
Dinesh C. Pande   +3 more
semanticscholar   +1 more source

The General Chinese Remainder Theorem

The American Mathematical Monthly, 1952
(1952). The General Chinese Remainder Theorem. The American Mathematical Monthly: Vol. 59, No. 6, pp. 365-370.
openaire   +1 more source

Group Authorization Using Chinese Remainder Theorem

2020
The paper presents a new way of group authorization for a population of users of a given IT system. Group authorization is highly desirable in applications where the submission of individual rights is not sufficient: service support (service-owner relationship), anonymous verification of belonging to a particular group (e.g., disabled persons, city ...
Tomasz Krokosz, Jarogniew Rykowski
openaire   +1 more source

Home - About - Disclaimer - Privacy