Results 21 to 30 of about 31,786 (276)
Modular exponentiation via the explicit Chinese remainder theorem [PDF]
In this paper we consider the problem of computing xe mod m for large integers x, e, and m. This is the bottleneck in Rabin’s algorithm for testing primality, the Diffie-Hellman algorithm for exchanging cryptographic keys, and many other common ...
Bernstein, Daniel J +1 more
core +2 more sources
Analytical Comparison Of RSA And RSA With Chinese Remainder Theorem
RSA encryption algorithm is one of the most powerful public key encryption algorithm. The problem with RSA algorithm is that RSA decryption is relatively slow in comparison to RSA encryption.
Ankur Mantri +4 more
doaj +1 more source
Adder Based Residue to Binary Number Converters for (2n - 1; 2n; 2n + 1) [PDF]
Copyright © 2002 IEEEBased on an algorithm derived from the new Chinese remainder theorem I, we present three new residue-to-binary converters for the residue number system (2n-1, 2n, 2n+1) designed using 2n-bit or n-bit adders with improvements on speed,
Aboulhamid, M. +3 more
core +2 more sources
In this study, digital signature application was performed on FPGA with classical RSA and Chinese Remainder Theorem (CRT). The power consumption of the system was observed when the digital signature process was performed on the FPGA.
Sönmez Burcu, Özer Ahmet Bedri
doaj +1 more source
To ensure private message exchange among the group members, it is desirable to construct secure and efficient group key management schemes. Moreover, these schemes are more versatile if they could support dynamic join or leave of group members.
Zhe Xia, Yu Yang, Fuyou Miao
doaj +1 more source
Key-lock pair mechanism for access control using tribes of Farey fractions. [PDF]
We propose a new single key-lock mechanism based on the concept of an access control matrix. In this system, each file is given a lock and each user is given a key and through simple operations on keys and locks the user access privilege can be revealed.
Chandrashekhar, H., Nagaraj, M.
core +1 more source
Skema Digital Watermarking Citra dengan Metode TLDCT dan Chinese Remainder Theorem
Currently, it is easy to access the wide variety of digital content on the internet, and therefore protection effort for digital content is an important problem that needs to solve.
Danang Aditya Nugraha +2 more
doaj +1 more source
LPCP: An efficient Privacy-Preserving Protocol for Polynomial Calculation Based on CRT
With the development of privacy-preserving techniques, the increasing demand for secure multiparty computation (MPC) of mobile devices has become a significant challenge.
Jiajian Tang +3 more
doaj +1 more source
Zero-Aware Low-Precision RNS Scaling Scheme
Scaling is one of the complex operations in the Residue Number System (RNS). This operation is necessary for RNS-based implementations of deep neural networks (DNNs) to prevent overflow.
Amir Sabbagh Molahosseini
doaj +1 more source
Robust Generalized Chinese-Remainder- Theorem-Based DOA Estimation for a Coprime Array
In this paper, we consider the problem of determining the direction of arrival (DOA) of two sources for a coprime array. The novelty of this paper is that we present an efficient algorithm to estimate two DOAs from their wrapped phases with errors.
Xiaoping Li +3 more
doaj +1 more source

