نتایج جستجو برای: chinese remainder theorem

تعداد نتایج: 294222  

Journal: :Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI) 2017

Journal: :Proceeding of the Electrical Engineering Computer Science and Informatics 2017

Journal: :IEICE Transactions 2005
Yuuki Tomoeda Hideyuki Miyake Atsushi Shimbo Shin-ichi Kawamura

At CHES 2000, Schindler introduced a timing attack that enables the factorization of an RSA-modulus if RSA implementations use the Chinese Remainder Theorem and Montgomery multiplication. In this paper we introduce another approach for deriving the secret prime factor by focusing on the conditional branch Schindler used in his attack. One of the countermeasures against Schindler’s attack is the...

Journal: :CoRR 2011
Hongyang Chen Wentao Robin Ouyang Chen Wang

Node localization plays an important role in many practical applications of wireless underground sensor networks (WUSNs), such as finding the locations of earthquake epicenters, underground explosions, and microseismic events in mines. It is more difficult to obtain the time-difference-of-arrival (TDOA) measurements in WUSNs than in terrestrial wireless sensor networks because of the unfavorabl...

Journal: :IACR Cryptology ePrint Archive 2005
Sorin Iftene

A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) which are distributed to users. The secret may be recovered only by certain predetermined groups. In case of compartmented secret sharing, the set of users is partitioned into compartments and the secret can be recovered only if the number of participants from any compartment is greater than a fixe...

2003
Adam Murakami

The purpose of this paper is to investigate the calculation of Fibonacci numbers using the Chinese Remainder Theorem (CRT). This paper begins by laying down some general conclusions that can be made about the Fibonacci sequence. It will then go into specific cases of the CRT and how to calculate Fibonacci numbers with reduced forms of the CRT equations. For each of the cases, algorithms and ana...

2007
Xinliang Zheng Manton M. Matthews Chin-Tser Huang

In this paper, we present a new group key management protocol based on the Chinese Remainder Theorem (CRT), which is developed based on our previous paper [29]. By shifting more computing load onto the key server we optimized the number of re-key broadcast message, user-side key computation and number of key storages. Our protocol, Hierarchical Chinese Remaindering Group Key (HCRGK) Protocol, o...

2010
JOHN GALLAGHER

This paper explores basic number theory including the groups, the rings and the units of modulo classes. It concludes with the Chinese Remainder Theorem. The goal is to examine these objects, their properties and to gain insight into their relationship with other sets.

2013
Srinath Doss Janet Jeyaraj

Recent days, research in wireless network becomes major area for the past few decades. In wireless routing many routing methods such as table driven, source driven; many characteristics such as reactive routing, proactive routing; many routing algorithms such as dijikstra’s shortest path, distributed bell-man ford algorithm are proposed in the literature. For effective wireless routing, the rec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید