نتایج جستجو برای: chinese remainder theorem crt

تعداد نتایج: 301262  

Journal: :I. J. Network Security 2016
Lein Harn Feng Wang

In a (t, n) secret sharing scheme (SS), the secret is shared among n shareholders in such a way that (a) with t or more than t shares can recover the secret, and (b) with fewer than t shares cannot obtain the secret. The threshold signature scheme is an application that extends the SS to a digital signature scheme. In a threshold signature scheme, any t or more than t group members can represen...

Journal: :IJNC 2012
Yasuaki Ito Koji Nakano Bo Song

One of the key points of success in high performance computation using an FPGA is the efficient usage of DSP slices and block RAMs in it. This paper presents a FDFM (Few DSP slices and Few block RAMs) processor core approach for implementing RSA encryption. In our approach, an efficient hardware algorithm for Chinese Remainder Theorem (CRT) based RSA decryption using Montgomery multiplication a...

2010
Mohamed Hamdy Eldefrawy Muhammad Khurram Khan Khaled Alghathbar Eun-suk Cho

Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verifi...

2013
Ming Li Haiping Wei Liping Xiao Zhiyong Suo

* This work is supported by NSFC under grant No. 41001282. Abstract A fast multi-baseline Interferometric synthetic aperture radar (InSAR) phase ambiguity resolving method is presented. The ambiguity solution vector of the shortest baseline is first computed and used as a reference, and then the ambiguity solutions of all the other baselines are selected with logical judgment of phase differenc...

Journal: :Journal of Ambient Intelligence and Humanized Computing 2022

Data is generated over time by each device in the Internet of Things (IoT) ecosphere. Recent years have seen a resurgence interest IoT due to its positive impact on society. However, automatic management devices, possibility disclosing sensitive information without user consent high. A situation which should not be unintentionally disclosed outside parties we do trust, i.e., privacy-preservatio...

2013
Edem Kwedzo Bankas Kazeem Alagbe Gbolagade Sorin Cotofana

In this paper, a novel 3-moduli set { 2 − 1, 2, 2 − 1 } , which has larger dynamic range when compared to other existing 3-moduli sets is proposed. After providing a proof that this moduli set always results in legitimate RNS, we subsequently propose an associated reverse converter based on the New Chinese Remainder Theorem. The proposed reverse converter has a delay of (4n + 6)tFA with an area...

Journal: :Formalized Mathematics 2012
Kenichi Arai Hiroyuki Okazaki Yasunari Shidama

In this article, we formalize that every finite cyclic group is isomorphic to a direct product of finite cyclic groups which orders are relative prime. This theorem is closely related to the Chinese Remainder theorem ([18]) and is a useful lemma to prove the basis theorem for finite abelian groups and the fundamental theorem of finite abelian groups. Moreover, we formalize some facts about the ...

Journal: :IEEE Trans. Computers 2007
Haining Fan M. Anwar Hasan

We show that multiplication complexities of n-term Karatsuba-Like formulae of GF (2)[x] (7 < n < 19) presented in the above paper can be further improved using the Chinese Remainder Theorem and the construction multiplication modulo (x−∞).

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید