Works matching DE "CHINESE remainder theorem"
Results: 284
Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework.
- Published in:
- Multimedia Systems, 2023, v. 29, n. 2, p. 831, doi. 10.1007/s00530-022-00999-3
- By:
- Publication type:
- Article
Local Dynamic Key Management Scheme Based on Layer-Cluster Topology in WSN.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 1, p. 699, doi. 10.1007/s11277-018-5471-5
- By:
- Publication type:
- Article
A New Gradual Secret Sharing Scheme with Diverse Access Structure.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 3, p. 1329, doi. 10.1007/s11277-017-5187-y
- By:
- Publication type:
- Article
Enhanced Security Using Cluster Based Certificate Management and ECC-CRT Key Agreement Schemes in Mobile Ad hoc Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 4, p. 6131, doi. 10.1007/s11277-017-4830-y
- By:
- Publication type:
- Article
( t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 1495, doi. 10.1007/s11277-016-3862-z
- By:
- Publication type:
- Article
A New Construction Method for Large Girth Quasi-Cyclic LDPC Codes with Optimized Lower Bound using Chinese Remainder Theorem.
- Published in:
- Wireless Personal Communications, 2016, v. 91, n. 1, p. 369, doi. 10.1007/s11277-016-3465-8
- By:
- Publication type:
- Article
Multipartite Secret Sharing Based on CRT.
- Published in:
- Wireless Personal Communications, 2014, v. 78, n. 1, p. 271, doi. 10.1007/s11277-014-1751-x
- By:
- Publication type:
- Article
On the weak key of post-quantum key agreement SAA-5.
- Published in:
- JSIAM Letters (Online), 2024, v. 16, p. 97, doi. 10.14495/jsiaml.16.97
- By:
- Publication type:
- Article
On isolated gaps in numerical semigroups.
- Published in:
- Turkish Journal of Mathematics, 2022, v. 46, n. 1, p. 123, doi. 10.3906/mat-2107-54
- By:
- Publication type:
- Article
Solving selected problems on the Chinese remainder theorem.
- Published in:
- Annales Mathematicae et Informaticae, 2022, v. 55, p. 196, doi. 10.33039/ami.2022.02.002
- By:
- Publication type:
- Article
A combinatorial generalization of the gcd-sum function using a generalized Möbius function.
- Published in:
- Annales Mathematicae et Informaticae, 2017, v. 47, p. 141
- By:
- Publication type:
- Article
p-adic analysis of the p-adic Maass-Shimura operators.
- Published in:
- Princeton Annals of Mathematics Studies, 2021, n. 212, p. 162
- By:
- Publication type:
- Article
Some results on free Euclidean self-dual codes over F<sub>2</sub> + vF<sub>2</sub>.
- Published in:
- Sakarya University Journal of Science (SAUJS) / Sakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2019, v. 23, n. 6, p. 1131, doi. 10.16984/saufenbilder.525606
- By:
- Publication type:
- Article
An Efficient Implementation of the CRT Algorithm Based on an Interval-Index Characteristic and Minimum-Redundancy Residue Code.
- Published in:
- International Journal of Computational Methods, 2020, v. 17, n. 10, p. 1, doi. 10.1142/S0219876220500048
- By:
- Publication type:
- Article
New Adder-Based RNS-to-Binary Converters for the {2<sup>n+1</sup> + 1,2<sup>n+1</sup> - 1,2<sup>n</sup>} Moduli Set.
- Published in:
- ISRN Signal Processing, 2011, p. 1, doi. 10.5402/2011/272768
- By:
- Publication type:
- Article
Efficient Information Hiding Based on Theory of Numbers.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 1, p. 19, doi. 10.3390/sym10010019
- By:
- Publication type:
- Article
Block combination–based asynchronous wake-up schedule in wireless sensor networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2017, v. 13, n. 10, p. 1, doi. 10.1177/1550147717736026
- By:
- Publication type:
- Article
SYLOW p-PSEUDOPRIMES TO SEVERAL BASES FOR SEVERAL PRIMES p.
- Published in:
- Bulletin of the Australian Mathematical Society, 2010, v. 81, n. 1, p. 165, doi. 10.1017/S0004972709000744
- By:
- Publication type:
- Article
A Hybrid-Based Verifiable Secret Sharing Scheme Using Chinese Remainder Theorem.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2020, v. 45, n. 4, p. 2395, doi. 10.1007/s13369-019-03992-7
- By:
- Publication type:
- Article
Computationally Efficient Approach to Implementation of the Chinese Remainder Theorem Algorithm in Minimally Redundant Residue Number System.
- Published in:
- Theory of Computing Systems, 2021, v. 65, n. 7, p. 1117, doi. 10.1007/s00224-021-10035-y
- By:
- Publication type:
- Article
The Feline Josephus Problem.
- Published in:
- Theory of Computing Systems, 2012, v. 50, n. 1, p. 20, doi. 10.1007/s00224-011-9343-6
- By:
- Publication type:
- Article
Clustering Collision Power Attack on RSA-CRT.
- Published in:
- Computer Systems Science & Engineering, 2021, v. 36, n. 2, p. 417, doi. 10.32604/csse.2021.014460
- By:
- Publication type:
- Article
SECRET IMAGE SHARING BASED ON CHAOTIC MAP AND CHINESE REMAINDER THEOREM.
- Published in:
- International Journal of Wavelets, Multiresolution & Information Processing, 2012, v. 10, n. 3, p. 1250023-1, doi. 10.1142/S0219691312500233
- By:
- Publication type:
- Article
On the number of weakly prime-additive numbers.
- Published in:
- Acta Mathematica Hungarica, 2020, v. 160, n. 2, p. 444, doi. 10.1007/s10474-019-01001-9
- By:
- Publication type:
- Article
Lifting of solutions of an exponential congruence.
- Published in:
- Mathematical Notes, 2006, v. 80, n. 1/2, p. 72, doi. 10.1007/s11006-006-0110-y
- By:
- Publication type:
- Article
Polynomial Congruences and Density.
- Published in:
- Mathematics Magazine, 2007, v. 80, n. 4, p. 299, doi. 10.1080/0025570X.2007.11953498
- By:
- Publication type:
- Article
Seeing Dots: Visibility of Lattice Points.
- Published in:
- Mathematics Magazine, 2007, v. 80, n. 4, p. 274, doi. 10.1080/0025570X.2007.11953494
- By:
- Publication type:
- Article
Faro Shuffles and the Chinese Reminder Theorem.
- Published in:
- Mathematics Magazine, 2007, v. 80, n. 4, p. 283, doi. 10.1080/0025570X.2007.11953495
- By:
- Publication type:
- Article
ON DIOPHANTINE SINGLEFOLD SPECIFICATIONS.
- Published in:
- Le Matematiche, 2024, v. 79, n. 2, p. 585, doi. 10.4418/2024.79.2.18
- By:
- Publication type:
- Article
THE REPRESENTATION OF THE REMAINDER IN CLASSICAL BERNSTEIN APPROXIMATION FORMULA.
- Published in:
- Global Journal of Advance Research on Classical & Modern Geometries, 2017, v. 6, n. 2, p. 119
- By:
- Publication type:
- Article
Enhancing data protection with a distributed storage system based on the redundant residue number system.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 6, p. 5601, doi. 10.1007/s11276-023-03287-8
- By:
- Publication type:
- Article
Neighbor discovery latency in bluetooth low energy networks.
- Published in:
- Wireless Networks (10220038), 2020, v. 26, n. 3, p. 1773, doi. 10.1007/s11276-018-1864-3
- By:
- Publication type:
- Article
The essential ideal graph of a commutative ring.
- Published in:
- Asian-European Journal of Mathematics, 2018, v. 11, n. 4, p. N.PAG, doi. 10.1142/S1793557118500584
- By:
- Publication type:
- Article
Protected Fair Secret Sharing Based Bivariate Asymmetric Polynomials in Satellite Network.
- Published in:
- Computers, Materials & Continua, 2022, v. 72, n. 3, p. 4789, doi. 10.32604/cmc.2022.027496
- By:
- Publication type:
- Article
A Weighted Threshold Secret Sharing Scheme for Remote Sensing Images Based on Chinese Remainder Theorem.
- Published in:
- Computers, Materials & Continua, 2019, v. 58, n. 2, p. 349, doi. 10.32604/cmc.2019.03703
- By:
- Publication type:
- Article
Non-existence of Positive Integer Solutions of the Diophantine Equation p<sup>x</sup> + (p + 2q)<sup>y</sup> = z², where p, q and p + 2q are Prime Numbers.
- Published in:
- European Journal of Pure & Applied Mathematics, 2023, v. 16, n. 2, p. 724, doi. 10.29020/nybg.ejpam.v16i2.4702
- By:
- Publication type:
- Article
Multivariable Chinese remainder theorem.
- Published in:
- Resonance: Journal of Science Education, 2015, v. 20, n. 3, p. 206, doi. 10.1007/s12045-015-0171-x
- By:
- Publication type:
- Article
Identification of proteins by the use of Chinese remainder theorem codes over finite commutative rings.
- Published in:
- Computational & Applied Mathematics, 2022, v. 41, n. 6, p. 1, doi. 10.1007/s40314-022-01767-9
- By:
- Publication type:
- Article
Quasi-cyclic codes: algebraic properties and applications.
- Published in:
- Computational & Applied Mathematics, 2020, v. 39, n. 2, p. 1, doi. 10.1007/s40314-020-1120-1
- By:
- Publication type:
- Article
q-supercongruences from Watson's <sub>8</sub>φ<sub>7</sub> transformation.
- Published in:
- Forum Mathematicum, 2025, v. 37, n. 1, p. 111, doi. 10.1515/forum-2023-0409
- By:
- Publication type:
- Article
Deterministic Rabin Cryptosystem Using Cubic Congruence and Chinese Remainder Theorem.
- Published in:
- Wireless Personal Communications, 2024, v. 137, n. 3, p. 1663, doi. 10.1007/s11277-024-11416-5
- By:
- Publication type:
- Article
Proving the (In)Security of CRT Based Key Management Schemes Under SAOA Model.
- Published in:
- Wireless Personal Communications, 2024, v. 134, n. 3, p. 1299, doi. 10.1007/s11277-024-10925-7
- By:
- Publication type:
- Article
Single Secret Sharing Scheme Using Chinese Remainder Theorem, Modified Shamir's Scheme and XOR Operation.
- Published in:
- Wireless Personal Communications, 2023, v. 130, n. 2, p. 957, doi. 10.1007/s11277-023-10315-5
- By:
- Publication type:
- Article
ECC-CRT: An Elliptical Curve Cryptographic Encryption and Chinese Remainder Theorem based Deduplication in Cloud.
- Published in:
- Wireless Personal Communications, 2021, v. 116, n. 3, p. 1683, doi. 10.1007/s11277-020-07756-7
- By:
- Publication type:
- Article
A Cohen-type theorem for w-Artinian modules.
- Published in:
- Journal of Algebra & Its Applications, 2021, v. 20, n. 6, p. N.PAG, doi. 10.1142/S0219498821501061
- By:
- Publication type:
- Article
Cotype dimension and cotype chain conditions.
- Published in:
- Journal of Algebra & Its Applications, 2019, v. 18, n. 1, p. N.PAG, doi. 10.1142/S0219498819500051
- By:
- Publication type:
- Article
Rings in which elements are sums of nilpotents, idempotents and tripotents.
- Published in:
- Journal of Algebra & Its Applications, 2018, v. 17, n. 1, p. -1, doi. 10.1142/S0219498818500093
- By:
- Publication type:
- Article
A BRIEF SUMMARY OF THE FULL RNS VARIANT OF SOME HOMOMORPHIC ENCRYPTIONS.
- Published in:
- Journal of Modern Technology & Engineering, 2023, v. 8, n. 2, p. 112
- By:
- Publication type:
- Article
Doppler frequencies estimation algorithm of multiple targets based on Chinese remainder theorem with amplitude aid.
- Published in:
- Systems Engineering & Electronics, 2020, v. 42, n. 6, p. 1261, doi. 10.3969/j.issn.1001-506X.2020.06.08
- By:
- Publication type:
- Article
基于中国余数定理的目标距离估计算法.
- Published in:
- Systems Engineering & Electronics, 2019, v. 41, n. 12, p. 2717, doi. 10.3969/j.issn.1001-506X.2019.12.08
- By:
- Publication type:
- Article