نتایج جستجو برای: chinese remainder theorem

تعداد نتایج: 294222  

2013
Yi-Sheng Su Chang Jung Ozan K. Tonguz

In this paper, we propose a novel scheme for the design of grouping of radio-frequency identification (RFID) tags, based on the Chinese remainder theorem (CRT). Grouping allows verifying the integrity of a collection of objects without the requirement for accessing external systems, and can be extended to identify missing objects. Motivated by the redundancy property of the Chinese remainder re...

Journal: :IACR Cryptology ePrint Archive 2009
Andrew V. Sutherland

We present a space-efficient algorithm to compute the Hilbert class polynomial HD(X) modulo a positive integer P , based on an explicit form of the Chinese Remainder Theorem. Under the Generalized Riemann Hypothesis, the algorithm uses O(|D|1/2+ log P ) space and has an expected running time of O(|D|1+ ). We describe practical optimizations that allow us to handle larger discriminants than othe...

2012
Yongnan Li Limin Xiao Aihua Liang Yao Zheng Li Ruan

This paper presents a fast parallel garner algorithm for Chinese remainder theorem. The variables in garner algorithm are divided into public parameters that are constants for fixed module and private parameters that represent random input integers. We design the parallel garner algorithm by analyzing the data dependencies of these arithmetic operations for computing public variables and privat...

Journal: :IACR Cryptology ePrint Archive 2007
Yasuyuki Murakami Takeshi Nasako

The realization of the quantum computer will enable to break publickey cryptosystems based on factoring problem and discrete logarithm problem. It is considered that even the quantum computer can not solve NP -hard problem in a polynomial time. The subset sum problem is known to be NP -hard. Merkle and Hellman proposed a knapsack cryptosystem using the subset sum problem. However, it was broken...

Journal: :I. J. Network Security 2014
Lein Harn Fuyou Miao

In a ) , ( n t secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (a) the secret can be recovered successfully with t or more than t shares, and (b) the secret cannot be recovered with fewer than t shares. In a weighted secret sharing scheme (WSS), each share of a shareholder has a positive weight. The secret can be recovered if the overall weight of shares i...

Journal: :Computers & Electrical Engineering 2003
Yeu-Pong Lai Chin-Chen Chang

Recently, the residue number system (RNS) has been intensively studied. The Chinese remainder theorem (CRT) is a solution to the conversion problem of a number to RNS with a general moduli set. This paper introduces the generalized CRT (GCRT) with parallel algorithms used for the conversion. The GCRT differs from the CRT because it has the advantage of having more applications than does the CRT...

Journal: :رادار 0
محسن عسکری بیژن عباسی آرند

because of having good performance in cancelling the clutter echoes, pulsed-doppler radar is the best solution in some applications. in this paper a new algorithm for signal design and signal processing in high prf radar is developed. the robust chinese remainder theorem is the basis for estimating the unambiguous ranges in the proposed algorithm. two high prf pulsed-doppler radars are designed...

Journal: :Sci. Ann. Cuza Univ. 2005
Sorin Iftene Ioana Boureanu

A secret sharing scheme derives from a given secret certain shares (or shadows) which are distributed to users. The secret can be recovered only by certain predetermined groups. In the first secret sharing schemes only the number of the participants in the reconstruction phase was important for recovering the secret. Such schemes have been referred to as threshold secret sharing schemes. In the...

Journal: :IACR Cryptology ePrint Archive 2006
Sorin Iftene

In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem in order to deal with more general access structures. Aspects like verifiability, secret sharing homomorphisms and multiplicative properties are also discussed. AMS Subject Classification: 94A62, 11A07

Journal: :Math. Comput. 2007
Daniel J. Bernstein Jonathan P. Sorenson

Fix pairwise coprime positive integers p1, p2, . . . , ps. We propose representing integers u modulo m, where m is any positive integer up to roughly √ p1p2 · · · ps, as vectors (u mod p1, u mod p2, . . . , u mod ps). We use this representation to obtain a new result on the parallel complexity of modular exponentiation: there is an algorithm for the Common CRCW PRAM that, given positive integer...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید