Results 31 to 40 of about 10,250 (292)
In this study, digital signature application was performed on FPGA with classical RSA and Chinese Remainder Theorem (CRT). The power consumption of the system was observed when the digital signature process was performed on the FPGA.
Sönmez Burcu, Özer Ahmet Bedri
doaj +1 more source
To ensure private message exchange among the group members, it is desirable to construct secure and efficient group key management schemes. Moreover, these schemes are more versatile if they could support dynamic join or leave of group members.
Zhe Xia, Yu Yang, Fuyou Miao
doaj +1 more source
Skema Digital Watermarking Citra dengan Metode TLDCT dan Chinese Remainder Theorem
Currently, it is easy to access the wide variety of digital content on the internet, and therefore protection effort for digital content is an important problem that needs to solve.
Danang Aditya Nugraha +2 more
doaj +1 more source
LPCP: An efficient Privacy-Preserving Protocol for Polynomial Calculation Based on CRT
With the development of privacy-preserving techniques, the increasing demand for secure multiparty computation (MPC) of mobile devices has become a significant challenge.
Jiajian Tang +3 more
doaj +1 more source
Robust and Efficient Frequency Estimator for Undersampled Waveforms Based on Frequency Offset Recognition. [PDF]
This paper proposes an efficient frequency estimator based on Chinese Remainder Theorem for undersampled waveforms. Due to the emphasis on frequency offset recognition (i.e., frequency shift and compensation) of small-point DFT remainders, compared to ...
Xiangdong Huang +3 more
doaj +1 more source
Zero-Aware Low-Precision RNS Scaling Scheme
Scaling is one of the complex operations in the Residue Number System (RNS). This operation is necessary for RNS-based implementations of deep neural networks (DNNs) to prevent overflow.
Amir Sabbagh Molahosseini
doaj +1 more source
Robust Generalized Chinese-Remainder- Theorem-Based DOA Estimation for a Coprime Array
In this paper, we consider the problem of determining the direction of arrival (DOA) of two sources for a coprime array. The novelty of this paper is that we present an efficient algorithm to estimate two DOAs from their wrapped phases with errors.
Xiaoping Li +3 more
doaj +1 more source
The article deals with the theoretical aspects of structural and group analysis. A mathematical model and software implementation of a multilevel disjunctive threshold scheme of the secret based on the Chinese remainder theorem is proposed.
Nikolay Ivanovich Chervyakov +4 more
doaj
IP Traceback through modified Probabilistic Packet Marking algorithm using Chinese Remainder Theorem
Probabilistic Packet Marking algorithm suggests a methodology to identify all the participated routers of the attack path by probabilistically marking the packets.
Y. Bhavani, V. Janaki, R. Sridevi
doaj +1 more source
Quantum secret sharing with graph states based on Chinese remainder theorem
Based on the topological features of quantum graph states,a quantum secret sharing scheme based on Chinese remainder theorem with a vivid graphic description was proposed.The dealer extracts sub-secrets according to Chinese remainder theorem over finite ...
Jianwu LIANG, Xiaoshu LIU, Zi CHENG
doaj +2 more sources

