We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,129 results
  1. Single Secret Sharing Scheme Using Chinese Remainder Theorem, Modified Shamir’s Scheme and XOR Operation

    The existing scheme uses lightweight modular arithmetic and Boolean operations for the secret sharing scheme by compromising minor degradation in...

    Dinesh Pande, Arjun Singh Rawat, ... Maheep Singh in Wireless Personal Communications
    Article 31 March 2023
  2. Evaluation and performance analysis of Chinese remainder theorem and its application to lossless image compression

    Chinese remainder theorem (CRT) is widely utilized in many cryptographic applications and additionally the reversible nature of CRT is employed in...

    Article 10 October 2021
  3. Multitiered Dynamic Threshold-Based Mobile Agents Secure Migration Using Lagrange Polynomial and Chinese Remainder Theorem

    A mobile agent is a software process that works repeatedly on the behalf of its owner. Mobile agents are an emerging computing area that replaces...
    Niraj Singhal, Pradeep Kumar in Electronic Systems and Intelligent Computing
    Conference paper 2022
  4. Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem

    To formulate a secure and efficient user authentication scheme for wireless sensor networks(WSNs) is a complicated task, because sensors are placed...

    Gaurav Tyagi, Rahul Kumar in Peer-to-Peer Networking and Applications
    Article 17 October 2022
  5. ECC-CRT: An Elliptical Curve Cryptographic Encryption and Chinese Remainder Theorem based Deduplication in Cloud

    Cloud computing provides the data storage facility for the maintenance, management and remote backup of the data. The storage cost and data...

    B. Rasina Begum, P. Chitra in Wireless Personal Communications
    Article 07 September 2020
  6. Determination of Common Remainder from Its Redundancy Residual Set

    In this paper, we give two methods to estimate common remainder from its residue set with errors. Two types of redundancy schemes are considered...
    Conference paper 2024
  7. Group Authorization Using Chinese Remainder Theorem

    The paper presents a new way of group authorization for a population of users of a given IT system. Group authorization is highly desirable in...
    Tomasz Krokosz, Jarogniew Rykowski in Theory and Applications of Dependable Computer Systems
    Conference paper 2020
  8. Strongly-resilient, well connected, non-interactive and gateway-free hierarchical deterministic key agreement schemes using Chinese remainder theorem

    Efficient key agreement schemes (KAS) that manage symmetric key cryptographic (SKC) secrets (or keys) are essential for lightweight security...

    Article 16 April 2020
  9. Proving the (In)Security of CRT Based Key Management Schemes Under SAOA Model

    There have been several proposed methods in the literature for securely distributing group keys and managing group dynamics for secure group...

    Payal Sharma, B. R. Purushothama in Wireless Personal Communications
    Article 01 February 2024
  10. The Periodic Task Synchronized Scheduling Strategy of Electromagnetic Compatibility

    Considering that electromagnetic interference inevitably occurs between concurrent tasks of combat platform, this paper is concerned with periodic...
    Conference paper 2023
  11. Efficient RNS Realization of High-Speed Arithmetic Multiplier with Respect to Cryptographic Computation

    As in the digital era, there will always be a demand for high-speed algorithms and techniques that can accelerate computations. Arithmetic...
    Gunda Sowmya, Sulguti Sai Sowmya, J. V. R. Ravindra in Inventive Communication and Computational Technologies
    Conference paper 2023
  12. A Hybrid-Based Verifiable Secret Sharing Scheme Using Chinese Remainder Theorem

    It is not always in the best interests to rely on an individual to have control of entire sensitive information. This has led to the need for secret...

    Om Prakash Verma, Nitin Jain, S. K. Pal in Arabian Journal for Science and Engineering
    Article 25 July 2019
  13. Enhanced AES for Securing Hand Written Signature Using Residue Number System

    The uncertainty and vulnerability of symmetric algorithm, Advanced Encryption Standard (AES), which uses a shared public secret key, however, timing...
    Ifedotun Roseline Idowu, Bamidele Samson Alobalorun, Abubakar Abdulsalam in ITNG 2024: 21st International Conference on Information Technology-New Generations
    Conference paper 2024
  14. PPDMIT: a lightweight architecture for privacy-preserving data aggregation in the Internet of Things

    Data is generated over time by each device in the Internet of Things (IoT) ecosphere. Recent years have seen a resurgence in interest in the IoT due...

    Mehdi Gheisari, Amir Javadpour, ... Yang Liu in Journal of Ambient Intelligence and Humanized Computing
    Article 17 June 2022
  15. Enhancing data protection with a distributed storage system based on the redundant residue number system

    Big data becomes the key for ubiquitous computing and intelligence, and Distributed Storage Systems (DSS) are widely used in large-scale data centers...

    Zhen Gao, Lu Shi, Pedro Reviriego in Wireless Networks
    Article Open access 25 March 2023
  16. A Chebyshev polynomial-based conditional privacy-preserving authentication and group-key agreement scheme for VANET

    Vehicle ad hoc network (VANET) is an open communication environment. Any user can broadcast messages, which means that it can be easily attacked by...

    Jiyun Yang, Jiamin Deng, ... Bo Tang in Nonlinear Dynamics
    Article 25 October 2021
  17. Authenticated key agreement for IoT network using HECC and CRT four co-primes

    Internet of Things (IoT) is an integral part of our daily lives and the security of these devices is paramount. However, IoT devices are often...

    Chandan Goswami, Avishek Adhikari, ... Pinaki Sarkar in Peer-to-Peer Networking and Applications
    Article 13 May 2024
  18. Euler Totient Function and Fermat-Eulller Theorem Based on Optimized Key Management Scheme for Securing Mobile Agents Migration

    As mobile agents move automatically on distributed networks, the security of agents and platforms is of prime concern. Over the years, mobile...
    Niraj Singhal, Pradeep Kumar, Dhiraj Pandey in Electronic Systems and Intelligent Computing
    Conference paper 2022
  19. An Enhancement in Crypto Key Generation Using Image Features with CRT

    Strong cryptographic algorithms are the main sources for building security systems. However, providing security depends on the secret information...
    Kalyanapu Srinivas, Noothi Sravan Kumar, ... K. Rama Devi in Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing
    Conference paper 2023
  20. Secure Information Migration Using Mignotte Sequence with Integral Transform

    This paper describes enhancing secure communication-based on secret sharing using Chinese remainder theorem and integral transform. Some of the...
    Priyanka Rawat, Dhajvir Singh Rai, Pradeep Kumar in Proceedings of Integrated Intelligence Enable Networks and Computing
    Conference paper 2021
Did you find what you were looking for? Share feedback.