نتایج جستجو برای: chinese remainder theorem crt

تعداد نتایج: 301262  

Journal: :Mathematics 2022

Compared with Shamir’s original secret image sharing (SIS), the Chinese-remainder-theorem-based SIS (CRTSIS) generally has advantages of a lower computation complexity, lossless recovery and no auxiliary encryption. However, general CRTSIS is neither perfect nor ideal, resulting in narrower range share pixels than that pixels. In this paper, we propose practical based on Asmuth Bloom’s threshol...

Journal: :Mathematical Notes 1930

Journal: :Future Internet 2017
J. L. Divya Shivani Ranjan K. Senapati

Abstract: This paper presents a DCT-based (DCT: discrete cosine transform) listless set partitioning in hierarchical trees (SPIHT) digital watermarking technique that is robust against several common attacks such as cropping, filtering, sharpening, noise, inversion, contrast manipulation, and compression. The proposed technique is made further robust by the incorporation of the Chinese remainde...

Journal: :IEEE Access 2023

In digital systems, the Residue Number System (RNS) represents an interesting alternative to traditional two’s complement representation. Its performance and low-power properties have attracted significant research interest over years. this paper, RNS is used estimate angular position of a multi-trace electrical encoder (EE), electro-mechanical device measure angles at high precision widely use...

Journal: :Wireless Networks 2023

Abstract Big data becomes the key for ubiquitous computing and intelligence, Distributed Storage Systems (DSS) are widely used in large-scale centers or cloud efficient management. However, on stored likely to be unavailable due hardware failures cyberattacks, e.g. DDoS. Maximum Distance Separable (MDS) codes commonly recovery of faulty storage nodes data. usually involves access multiple nodes...

Journal: :CoRR 2017
Li Xiao Xiang-Gen Xia

Based on unique decoding of the polynomial residue code with non-pairwise coprime moduli, a polynomial with degree less than that of the least common multiple (lcm) of all the moduli can be accurately reconstructed when the number of residue errors is less than half the minimum distance of the code. However, once the number of residue errors is beyond half the minimum distance of the code, the ...

2001
Amod Agashe Kristin Lauter Ramarathnam Venkatesan

Elliptic curves with a known number of points over a given prime field Fn are often needed for use in cryptography. In the context of primality proving, Atkin and Morain suggested the use of the theory of complex multiplication to construct such curves. One of the steps in this method is the calculation of a root modulo n of the Hilbert class polynomial HD(X) for a fundamental discriminant D. T...

Journal: :Math. Comput. 2012
Reinier Bröker Kristin E. Lauter Andrew V. Sutherland

We present a new algorithm to compute the classical modular polynomial Φl in the rings Z[X,Y ] and (Z/mZ)[X, Y ], for a prime l and any positive integer m. Our approach uses the graph of l-isogenies to efficiently compute Φl mod p for many primes p of a suitable form, and then applies the Chinese Remainder Theorem (CRT). Under the Generalized Riemann Hypothesis (GRH), we achieve an expected run...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید