نتایج جستجو برای: Chinese Remainder Theorem (CRT)

تعداد نتایج: 301262  

Journal: :CoRR 2007
Jean-Luc Beuchat

Abstract— Ananda Mohan suggested that the first New Chinese Remainder Theorem introduced by Wang can be derived from the constructive proof of the well-known Chinese Remainder Theorem (CRT) and claimed that Wang’s approach is the same as the one proposed earlier by Huang. Ananda Mohan’s proof is however erroneous and we show here that Wang’s New CRT I is a rewriting of an algorithm previously s...

2008
Kamer Kaya Ali Aydin Selçuk

Recently, Chinese Remainder Theorem (CRT) based function sharing schemes are proposed in the literature. In this paper, we investigate how a CRT-based threshold scheme can be enhanced with the robustness property. To the best of our knowledge, these are the first robust threshold cryptosystems based on a CRT-based secret sharing.

2014
Rajesh Kumar

The 4-moduli{ } set has been recently proposed for large dynamic range of 6n-bits .for this 4moduli set reverse converter design based on New CRT-1 and MRC has already been proposed. In this paper we propose reverse converter design for 4-moduli set{ }based on New CRT-II theorem to achieve more efficient residue number system(RNS) than the former one. The design is achieved using carry save add...

Journal: : 2022

The methods of conversion from the residual number system to decimal based on classical Chinese remainder theorem (CRT) and its improvements CRT I, II are considered in this paper. Analytical dependences time complexity specified analyzed constructed. As result carried out investigation, it is established that characterized by greater efficiency compared other mentioned above. Examples implemen...

Journal: :Computers & Mathematics with Applications 2003

2009
Thomas Plantard Mike Rose Willy Susilo

In this paper, we first critically analyze two existing latticebased cryptosystems, namely GGH and Micciancio, and identify their drawbacks. Then, we introduce a method for improving the implementation of GGH using the Chinese Remainder Theorem (CRT). Furthermore, we also propose another cryptosystem optimized for CRT, drawing on the strengths of both cryptosystems. We provide a fair comparison...

2003
Adam Murakami

The purpose of this paper is to investigate the calculation of Fibonacci numbers using the Chinese Remainder Theorem (CRT). This paper begins by laying down some general conclusions that can be made about the Fibonacci sequence. It will then go into specific cases of the CRT and how to calculate Fibonacci numbers with reduced forms of the CRT equations. For each of the cases, algorithms and ana...

2014
Bhumi J. Patel Nitin J. Janwe

The most active subjects in the security related communities are the necessary protection against the data thieves. This gives an importance and the value of exchanged data over the Internet or other media types. In many RSA cryptosystems, we usually select a small value for the public key e. This kind of choice can only speed up the encryption operation but do not forget that by this way, the ...

Journal: :JCS 2015
M. Sayee Kumar T. Purusothaman

Corresponding Author: Sayee Kumar, M., Muthayammal Engineering College, Rasipuram, Tamilnadu, India Email: [email protected] Abstract: In hasty growth of communication, security plays a central role in maintaining confidentiality of data in group communication. Keeping the data intended for the group in confidential manner is the most important security feature need to be sustained for t...

2013
B.Arutselvan R.Maheswari

Broadcast authentication is a critical security service in wireless sensor networks (WSNs). However, due to resource constrained of sensor nodes, providing an authentication mechanism for broadcast message is difficult. This paper deals with the forwarding scheme for wireless sensor networks aimed at combining low computational complexity and high performance in terms of energy efficiency with ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید