共 50 条
[41]
A proactive secret sharing scheme based on Chinese remainder theorem
[J].
Frontiers of Computer Science,
2021, 15
[42]
Method based on Chinese remainder theorem for range estimation of the target
[J].
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics,
2019, 41 (12)
:2717-2722
[43]
Digital Audio Watermark Sharing Based on the Chinese Remainder Theorem
[J].
2012 5TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP),
2012,
:572-576
[44]
A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem
[J].
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008,
2008, 5365
:414-425
[45]
An Improved Method for Database Encryption Based on the Chinese Remainder Theorem
[J].
ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION,
2008,
:588-590
[46]
Chinese Remainder Theorem Based DTN Group Key Management
[J].
PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY,
2012,
:779-783
[49]
A New Efficient RNS-to-Binary Conversion for the Three-Moduli Sets
[J].
2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II,
2009,
:1000-1005
[50]
Group-oriented signature schemes based on Chinese remainder theorem
[J].
2009 WORLD CONGRESS ON NATURE & BIOLOGICALLY INSPIRED COMPUTING (NABIC 2009),
2009,
:1660-1663