Works matching DE "CHINESE remainder theorem"
Results: 283
Review Article: A Manual for One User.
- Published in:
- Min-Ad: Israel Studies in Musicology Online, 2024, v. 22, p. 1
- By:
- Publication type:
- Article
Figuring Fibers.
- Published in:
- UMAP Journal, 2020, v. 41, n. 1, p. 83
- By:
- Publication type:
- Article
An efficient key distribution Scheme for WSN with Mutual Healing Capability.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 25, p. 36735, doi. 10.1007/s11042-022-13501-y
- By:
- Publication type:
- Article
Machine vision theory and applications for cyber-physical systems.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 16, p. 21995, doi. 10.1007/s11042-022-13261-9
- By:
- Publication type:
- Article
CBRC: a novel approach for cancelable biometric template generation using random permutation and Chinese Remainder Theorem.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 16, p. 22027, doi. 10.1007/s11042-021-11284-2
- By:
- Publication type:
- Article
Towards a fully homomorphic symmetric cipher scheme resistant to plain-text/cipher-text attacks.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 10, p. 14403, doi. 10.1007/s11042-022-12043-7
- By:
- Publication type:
- Article
Solving selected problems on the Chinese remainder theorem.
- Published in:
- Annales Mathematicae et Informaticae, 2022, v. 55, p. 196, doi. 10.33039/ami.2022.02.002
- By:
- Publication type:
- Article
A combinatorial generalization of the gcd-sum function using a generalized Möbius function.
- Published in:
- Annales Mathematicae et Informaticae, 2017, v. 47, p. 141
- By:
- Publication type:
- Article
An Efficient Lightweight Authentication Scheme for Smart Meter.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 8, p. 1264, doi. 10.3390/math12081264
- By:
- Publication type:
- Article
An Anonymous Authentication Scheme Based on Chinese Residue Theorem in Wireless Body Area Networks.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 13, p. 2951, doi. 10.3390/math11132951
- By:
- Publication type:
- Article
Lower Bound on the Minimum Distance of Single-Generator Quasi-Twisted Codes.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 11, p. 2539, doi. 10.3390/math11112539
- By:
- Publication type:
- Article
Revisiting the Polynomial-Time Equivalence of Computing the CRT-RSA Secret Key and Factoring.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 13, p. 2238, doi. 10.3390/math10132238
- By:
- Publication type:
- Article
Practical Secret Image Sharing Based on the Chinese Remainder Theorem.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 12, p. 1959, doi. 10.3390/math10121959
- By:
- Publication type:
- Article
Some results on free Euclidean self-dual codes over F<sub>2</sub> + vF<sub>2</sub>.
- Published in:
- Sakarya University Journal of Science (SAUJS) / Sakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2019, v. 23, n. 6, p. 1131, doi. 10.16984/saufenbilder.525606
- By:
- Publication type:
- Article
New q-analogues of Van Hamme's (F.2) supercongruence and of some related supercongruences.
- Published in:
- Mathematica Slovaca, 2024, v. 74, n. 3, p. 629, doi. 10.1515/ms-2024-0048
- By:
- Publication type:
- Article
Design of Rabin-Like Cryptosystem without Decryption Failure.
- Published in:
- Malaysian Journal of Mathematical Sciences, 2016, v. 10, p. 1
- By:
- Publication type:
- Article
ROBUST AND FRAGILE WATERMARKING FOR MEDICAL IMAGES USING REDUNDANT RESIDUE NUMBER SYSTEM AND CHAOS.
- Published in:
- Neural Network World, 2020, n. 3, p. 177, doi. 10.14311/NNW.2020.30.013
- By:
- Publication type:
- Article
Adaptive Sub-Nyquist Spectrum Sensing for Ultra-Wideband Communication Systems †.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 3, p. 342, doi. 10.3390/sym11030342
- By:
- Publication type:
- Article
Chinese Remainder Theorem-Based Secret Image Sharing with Small-Sized Shadow Images.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 8, p. 340, doi. 10.3390/sym10080340
- By:
- Publication type:
- Article
Efficient Information Hiding Based on Theory of Numbers.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 1, p. 19, doi. 10.3390/sym10010019
- By:
- Publication type:
- Article
COUNTING FIXED POINTS, TWO-CYCLES, AND COLLISIONS OF THE DISCRETE EXPONENTIAL FUNCTION USING p-ADIC METHODS.
- Published in:
- Journal of the Australian Mathematical Society, 2012, v. 92, n. 2, p. 163, doi. 10.1017/S1446788712000262
- By:
- Publication type:
- Article
ICMAACS, QIN-JIU-SHAO PRIZE AND YANG-HUI AWARD.
- Published in:
- Thermal Science, 2024, v. 28, n. 4B, p. 3165, doi. 10.2298/TSCI2404165Y
- By:
- Publication type:
- Article
Proof of three divisibilities of Franel numbers and binomial coefficients.
- Published in:
- International Journal of Number Theory, 2020, v. 16, n. 7, p. 1535, doi. 10.1142/S1793042120500797
- By:
- Publication type:
- Article
An alternative transformation formula for the Dedekind -function via the Chinese Remainder Theorem.
- Published in:
- International Journal of Number Theory, 2016, v. 12, n. 2, p. 513, doi. 10.1142/S1793042116500329
- By:
- Publication type:
- Article
THE DIGRAPH OF THE SQUARE MAPPING ON QUOTIENT RINGS OVER THE GAUSSIAN INTEGERS.
- Published in:
- International Journal of Number Theory, 2011, v. 7, n. 3, p. 835, doi. 10.1142/S1793042111004459
- By:
- Publication type:
- Article
HIGH-SPEED AND SECURE ENCRYPTION SCHEMES BASED ON CHINESE REMAINDER THEOREM FOR STORAGE AND TRANSMISSION OF MEDICAL INFORMATION.
- Published in:
- Journal of Mechanics in Medicine & Biology, 2010, v. 10, n. 1, p. 167, doi. 10.1142/S0219519410003307
- By:
- Publication type:
- Article
Reversible data hiding based on histogram and prediction error for sharing secret data.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00147-y
- By:
- Publication type:
- Article
Doppler frequencies estimation algorithm of multiple targets based on Chinese remainder theorem with amplitude aid.
- Published in:
- Systems Engineering & Electronics, 2020, v. 42, n. 6, p. 1261, doi. 10.3969/j.issn.1001-506X.2020.06.08
- By:
- Publication type:
- Article
基于中国余数定理的目标距离估计算法.
- Published in:
- Systems Engineering & Electronics, 2019, v. 41, n. 12, p. 2717, doi. 10.3969/j.issn.1001-506X.2019.12.08
- By:
- Publication type:
- Article
基于 SAW RFID 系统的标签距离估计.
- Published in:
- Systems Engineering & Electronics, 2019, v. 41, n. 11, p. 2439, doi. 10.3969/j.issn.1001-506X.2019.11.06
- By:
- Publication type:
- Article
WHICH (SUB)DIRECT DECOMPOSITIONS ARE USEFUL?
- Published in:
- Palestine Journal of Mathematics, 2024, v. 13, p. 1
- By:
- Publication type:
- Article
ВИЯВЛЕННЯ ТА ВИПРАВЛЕННЯ ПОМИЛОК У ЗАХИЩЕНИХ СИСТЕМАХ ЗБЕРІГАННЯ ДАНИХ НА ОСНОВІ ОБЧИСЛЕННЯ ПРОЕКЦІЙ ЧИСЛА.
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2022, v. 12, n. 4, p. 337, doi. 10.15276/imms.v12.no4.337
- By:
- Publication type:
- Article
РОЗРОБКА ТРЬОХМОДУЛЬНОЇ КРИПТОСИСТЕМИ РАБІНА НА ОСНОВІ ОПЕРАЦІЇ ДОДАВАННЯ
- Published in:
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2021, v. 11, n. 1/2, p. 47, doi. 10.15276/imms.v11.no1-2.47
- By:
- Publication type:
- Article
Enhancing data protection with a distributed storage system based on the redundant residue number system.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 6, p. 5601, doi. 10.1007/s11276-023-03287-8
- By:
- Publication type:
- Article
A Remark on Algorithm AS 183. An Efficient and Portable Pseudo-random Number Generator.
- Published in:
- Journal of the Royal Statistical Society: Series C (Applied Statistics), 1986, v. 35, n. 1, p. 89, doi. 10.1111/j.1467-9876.1986.tb01945.x
- By:
- Publication type:
- Article
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem.
- Published in:
- ISeCure, 2023, v. 15, n. 1, p. 125, doi. 10.22042/isecure.2022.293948.689
- By:
- Publication type:
- Article
Enforcing RBAC Policies over Data Stored on Untrusted Server.
- Published in:
- ISeCure, 2018, v. 10, n. 2, p. 129
- By:
- Publication type:
- Article
Editorial.
- Published in:
- ISeCure, 2018, v. 10, n. 2, p. 77
- By:
- Publication type:
- Article
RNS arithmetic in <sub> p<sup>k</sup></sub> and application to fast pairing computation.
- Published in:
- Journal of Mathematical Cryptology, 2011, v. 5, n. 1, p. 51, doi. 10.1515/JMC.2011.006
- By:
- Publication type:
- Article
Another look at some fast modular arithmetic methods.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 2, p. 165, doi. 10.1515/JMC.2009.008
- By:
- Publication type:
- Article
Block combination–based asynchronous wake-up schedule in wireless sensor networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2017, v. 13, n. 10, p. 1, doi. 10.1177/1550147717736026
- By:
- Publication type:
- Article
A computational problem involving Dickson conjecture.
- Published in:
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2021, v. 32, n. 8, p. N.PAG, doi. 10.1142/S0129183121501096
- By:
- Publication type:
- Article
Position Estimation Based on Grid Cells and Self-Growing Self-Organizing Map.
- Published in:
- Computational Intelligence & Neuroscience, 2019, p. 1, doi. 10.1155/2019/3606397
- By:
- Publication type:
- Article
A Semi-Blind Neighbor Discovery Algorithm Based on the Chinese Remainder Theorem.
- Published in:
- International Journal of Simulation: Systems, Science & Technology, 2023, v. 24, n. 1, p. 1, doi. 10.5013/IJSSST.a.24.01.01
- By:
- Publication type:
- Article
q-supercongruences from Watson's <sub>8</sub>φ<sub>7</sub> transformation.
- Published in:
- Forum Mathematicum, 2025, v. 37, n. 1, p. 111, doi. 10.1515/forum-2023-0409
- By:
- Publication type:
- Article
ASIC implementation of distributed arithmetic based FIR filter using RNS for high speed DSP systems.
- Published in:
- International Journal of Speech Technology, 2020, v. 23, n. 2, p. 259, doi. 10.1007/s10772-020-09683-1
- By:
- Publication type:
- Article
Two Matrix Theorems Arising from Nilpotent Groups.
- Published in:
- Algebra Colloquium, 2024, v. 31, n. 3, p. 499, doi. 10.1142/S1005386724000373
- By:
- Publication type:
- Article
Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures.
- Published in:
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 4, p. 282, doi. 10.1049/ise2.12014
- By:
- Publication type:
- Article
Efficient Non-Malleable Commitment Schemes.
- Published in:
- Journal of Cryptology, 2011, v. 24, n. 1, p. 203, doi. 10.1007/s00145-009-9043-4
- By:
- Publication type:
- Article
WALKING TO INFINITY ALONG GAUSSIAN LINES.
- Published in:
- Integers: Electronic Journal of Combinatorial Number Theory, 2021, v. 21, p. 1
- By:
- Publication type:
- Article