Results 31 to 40 of about 10,250 (292)

Power Side Channel Analysis and Anomaly Detection of Modular Exponentiation Method in Digital Signature Algorithm Based Fpga

open access: yesITM Web of Conferences, 2018
In this study, digital signature application was performed on FPGA with classical RSA and Chinese Remainder Theorem (CRT). The power consumption of the system was observed when the digital signature process was performed on the FPGA.
Sönmez Burcu, Özer Ahmet Bedri
doaj   +1 more source

Comments on ‘Chinese Remainder Theorem‐based centralised group key management for secure multicast communication’

open access: yesIET Information Security, 2023
To ensure private message exchange among the group members, it is desirable to construct secure and efficient group key management schemes. Moreover, these schemes are more versatile if they could support dynamic join or leave of group members.
Zhe Xia, Yu Yang, Fuyou Miao
doaj   +1 more source

Skema Digital Watermarking Citra dengan Metode TLDCT dan Chinese Remainder Theorem

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2017
Currently, it is easy to access the wide variety of digital content on the internet, and therefore protection effort for digital content is an important problem that needs to solve.
Danang Aditya Nugraha   +2 more
doaj   +1 more source

LPCP: An efficient Privacy-Preserving Protocol for Polynomial Calculation Based on CRT

open access: yesApplied Sciences, 2022
With the development of privacy-preserving techniques, the increasing demand for secure multiparty computation (MPC) of mobile devices has become a significant challenge.
Jiajian Tang   +3 more
doaj   +1 more source

Robust and Efficient Frequency Estimator for Undersampled Waveforms Based on Frequency Offset Recognition. [PDF]

open access: yesPLoS ONE, 2016
This paper proposes an efficient frequency estimator based on Chinese Remainder Theorem for undersampled waveforms. Due to the emphasis on frequency offset recognition (i.e., frequency shift and compensation) of small-point DFT remainders, compared to ...
Xiangdong Huang   +3 more
doaj   +1 more source

Zero-Aware Low-Precision RNS Scaling Scheme

open access: yesAxioms, 2021
Scaling is one of the complex operations in the Residue Number System (RNS). This operation is necessary for RNS-based implementations of deep neural networks (DNNs) to prevent overflow.
Amir Sabbagh Molahosseini
doaj   +1 more source

Robust Generalized Chinese-Remainder- Theorem-Based DOA Estimation for a Coprime Array

open access: yesIEEE Access, 2018
In this paper, we consider the problem of determining the direction of arrival (DOA) of two sources for a coprime array. The novelty of this paper is that we present an efficient algorithm to estimate two DOAs from their wrapped phases with errors.
Xiaoping Li   +3 more
doaj   +1 more source

THE NEW SCHEME OF INFORMATION STORAGE IN CLOUD ENVIRONMENTS BASED ON A SYSTEM OF RESIDUAL CLASSES, SCHEMES SECRET SHARING

open access: yesСовременная наука и инновации, 2022
The article deals with the theoretical aspects of structural and group analysis. A mathematical model and software implementation of a multilevel disjunctive threshold scheme of the secret based on the Chinese remainder theorem is proposed.
Nikolay Ivanovich Chervyakov   +4 more
doaj  

IP Traceback through modified Probabilistic Packet Marking algorithm using Chinese Remainder Theorem

open access: yesAin Shams Engineering Journal, 2015
Probabilistic Packet Marking algorithm suggests a methodology to identify all the participated routers of the attack path by probabilistically marking the packets.
Y. Bhavani, V. Janaki, R. Sridevi
doaj   +1 more source

Quantum secret sharing with graph states based on Chinese remainder theorem

open access: yesTongxin xuebao, 2018
Based on the topological features of quantum graph states,a quantum secret sharing scheme based on Chinese remainder theorem with a vivid graphic description was proposed.The dealer extracts sub-secrets according to Chinese remainder theorem over finite ...
Jianwu LIANG, Xiaoshu LIU, Zi CHENG
doaj   +2 more sources

Home - About - Disclaimer - Privacy