Results 21 to 30 of about 10,250 (292)
Research and application of Chinese remainder theorem
The Chinese remainder theorem (denoted it as " the theorem" in this article) was originally an important theorem in number theory. It played a vital role in the integer solution of the congruence equation in ancient times. With the continuous development
Qinnan Luo
semanticscholar +1 more source
A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem [PDF]
Schemes of reversible data hiding in encrypted domain (RDH-ED) based on symmetric or public key encryption are mainly applied in the scenarios of end-to-end communication.
Yan Ke +5 more
semanticscholar +1 more source
Chinese remainder theorem secret sharing in multivariate polynomials
This paper deals with a generalization of the secret sharing using Chinese remainder theorem over the integers to multivariate polynomials over a finite field. We work with the ideals and their Gröbner bases instead of integer moduli.
Gennadii V. Matveev
doaj +1 more source
Taking a problem from a Chinese mathematical classic, the authors give a slightly generalised algorithm corresponding to what is known as the ``Chinese remainder theorem''. There are many historical inaccuracies in the paper, and no mathematical innovations.
Ku, Y. H., Sun, Xiaoguang
openaire +1 more source
Efficient Batch Fully Homomorphic Encryption with a Shorter Key from Ring-LWE
Fully homomorphic encryption allows users to use the computing resources of cloud servers for the computation of encrypted data without worrying about data leakage.
Yuyue Chen, Ruwei Huang, Bo Yang
doaj +1 more source
Solving selected problems on the Chinese remainder theorem
The Chinese remainder theorem provides the solvability conditions for the system of linear congruences. In section 2 we present the construction of the solution of such a system.
Viliam Ďuriš +2 more
semanticscholar +1 more source
RESEARCH OF EFFECTIVE METHODS OF CONVERSION FROM RNS TO POSITIONAL NOTATION ON FPGA
In the article different methods of conversion numbers from the residue number system to the binary number system was investigated. The simulation on the FPGA is performed, which implies that the approximate method based on the Chinese remainder theorem ...
N. N. Chervyakov +3 more
doaj
Scaling function based on Chinese remainder theorem applied to a recursive filter design [PDF]
Implementation of IIR filters in residue number system (RNS) architecture is more complex in comparison to FIR filters, due to introduction of the scaling function.
Stamenković Negovan +2 more
doaj +1 more source
Existing security and identity-based vehicular communication protocols used in Vehicular Ad-hoc Networks (VANETs) to achieve conditional privacy-preserving mostly rely on an ideal hardware device called tamper-proof device (TPD) equipped in vehicles ...
Jing Zhang +4 more
semanticscholar +1 more source
Analytical Comparison Of RSA And RSA With Chinese Remainder Theorem
RSA encryption algorithm is one of the most powerful public key encryption algorithm. The problem with RSA algorithm is that RSA decryption is relatively slow in comparison to RSA encryption.
Ankur Mantri +4 more
doaj +1 more source

