نتایج جستجو برای: chinese remainder theorem

تعداد نتایج: 294222  

Journal: :Proceedings of the American Mathematical Society 1963

Journal: :Journal of the Belarusian State University. Mathematics and Informatics 2019

2007
L.-C. Wuu T.-J. Liu J.-Y. Yang

IP traceback is a defense method to help a victim to identifying the sources of attacking packets. In this paper, we propose an IP traceback method based on the Chinese Remainder Theorem to require routers to probabilistically mark packets with partial path information when packets traverse routers through the Internet. The routers with the proposed IP traceback method can interoperate seamless...

Journal: :IACR Cryptology ePrint Archive 2008
Kamer Kaya Ali Aydin Selçuk

A new threshold scheme for the Digital Signature Standard is proposed using Asmuth-Bloom secret sharing based on the Chinese Remainder Theorem. The proposed scheme is simple and can be used practically in real life.

2006
Andrew Granville Pär Kurlberg

We consider the distribution of spacings between consecutive elements in subsets of Z/qZ, where q is highly composite and the subsets are defined via the Chinese Remainder Theorem. We give a sufficient criterion for the spacing distribution to be Poissonian as the number of prime factors of q tends to infinity, and as an application we show that the value set of a generic polynomial modulo q ha...

Journal: : 2022

The Chinese remainder theorem provides the solvability conditions for system of linear congruences. In section 2 we present construction solution such a system. Focusing on usage in field number theory, looked some problems. main contribution is 3, consisting Problems 3.1, 3.2 and 3.3 from theory leading to theorem. Finally, different view congruences by its geometric interpretation, applying l...

Journal: :J. Inf. Sec. Appl. 2016
René Ndoundam Stephane Gael Raymond Ekodeck

We propose different approaches of PDF files based steganography, essentially based on the Chinese Remainder Theorem. Here, after a cover PDF document has been released from unnecessary characters of ASCII code A0, a secret message is hidden in it using one of the proposed approaches, making it invisible to common PDF readers, and the file is then transmitted through a non-secure communication ...

Journal: :CoRR 2012
Zhifang Zhang

Random linear network code has to sacrifice part of bandwidth to transfer the coding vectors, thus a head of size k log |T | is appended to each packet. We present a distributed random network coding approach based on the Chinese remainder theorem for general multicast networks. It uses a couple of modulus as the head, thus reduces the size of head to O(log k). This makes it more suitable for s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید