The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for remainder with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1959-1976 (16) 1977-1987 (22) 1988-1991 (18) 1992-1993 (16) 1994-1995 (27) 1996 (15) 1997 (15) 1998-1999 (29) 2000 (23) 2001 (31) 2002 (26) 2003 (39) 2004 (37) 2005 (44) 2006 (37) 2007 (52) 2008 (70) 2009 (44) 2010 (17) 2011 (17) 2012 (18) 2013 (23) 2014 (31) 2015 (27) 2016 (18) 2017 (16) 2018 (24) 2019 (26) 2020 (16) 2021 (21) 2022 (19) 2023 (40) 2024 (4)
Publication types (Num. hits)
article(407) incollection(4) inproceedings(464) phdthesis(3)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 685 occurrences of 482 keywords

Results
Found 878 publication records. Showing 878 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
85Behrooz Parhami Tight Upper Bounds on the Minimum Precision Required of the Divisor and the Partial Remainder in High-Radix Division. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF digit-selector PLA, high-radix division, p-d plot, quotient digit selection, SRT division, Digit-recurrence division
67Christopher Thorpe, David C. Parkes Cryptographic Combinatorial Securities Exchanges. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
67Xiaohong Jiang 0001, Susumu Horiguchi, Yue Hao Predicting the Yield Efficacy of a Defect-Tolerant Embedded Core. Search on Bibsonomy DFT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
64Werner Schindler A Timing Attack against RSA with the Chinese Remainder Theorem. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA, Chinese Remainder Theorem, Montgomery multiplication, Timing attack
54Jie Zhou, Yong-hao Ou Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Group Key Distribution Scheme, Key tree, Group member subtree, root ID algorithm, Chinese Remainder Theorem
54Bonseok Koo, Dongwook Lee, Gwonho Ryu, Taejoo Chang, Sangjin Lee 0002 High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Booth’s algorithm, RSA, Chinese Remainder Theorem, Montgomery multiplication, Carry Save Adder
53Jen-Ho Yang, Chin-Chen Chang 0001 Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Aryabhata Remainder Theorem, Information Protection Systems, Chinese Remainder Theorem
48Peter Kornerup Digit Selection for SRT Division and Square Root. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Digit selection, division, square root
48Peter Kornerup Revisiting SRT Quotient Digit Selection. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
45Kamer Kaya, Ali Aydin Selçuk A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF joint random secret sharing, Asmuth-Bloom secret sharing scheme, Chinese Remainder Theorem, Verifiability
45Kamer Kaya, Ali Aydin Selçuk Robust Threshold Schemes Based on the Chinese Remainder Theorem. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Paillier, robustness, RSA, Chinese Remainder Theorem, Threshold cryptography, ElGamal
45Xinliang Zheng, Chin-Tser Huang, Manton M. Matthews Chinese remainder theorem based group key management. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chinese remaindering group key (CRGK), congruence system, fast Chinese remaindering group key (FCRGK), protocol, Chinese remainder theorem (CRT), group key management
45Johann Großschädl The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA/spl gamma/ crypto-chip, RSA encryption scheme, hardware performance, long-integer modular arithmetic, private key operations, multiplier architecture, high-speed hardware accelerator, reconfigurable multiplier datapath, word-serial multiplier, modular reduction method, multiplier core, decryption rate, 200 MHz, 560 kbit/s, 2 Mbit/s, parallelism, pipelining, public key cryptography, reconfigurable architectures, clocks, Chinese Remainder Theorem, microprocessor chips, multiplying circuits, modular multiplications, modular exponentiations, pipeline arithmetic, clock frequency
38Fumiaki Sato, Sumito Iijima Battery and Power Aware Routing in Mobile Ad Hoc Networks. Search on Bibsonomy NBiS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF battery aware routing, Ad hoc networks, dynamic source routing, power aware routing
38Xin Liu, Qionghai Dai, Qiufeng Wu An Improved Resource Reservation Algorithm for IEEE 802.15.3. Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38David W. Matula, Alex Fit-Florea Prescaled Integer Division. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Yu-Chen Kuo, Chih-Nung Chen CRT-MAC: A Power-Saving Multicast Protocol in the Asynchronous Ad Hoc Networks. Search on Bibsonomy SUTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ad hoc network, Multicast, Chinese Remainder Theorem, Power-Saving
37Sung-Ming Yen, Dongryeol Kim, Sang-Jae Moon Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Factorization attack, Fault infective CRT, Cryptography, Chinese remainder theorem (CRT), Residue number system, Hardware fault cryptanalysis
37Katsuyuki Okeya, Tsuyoshi Takagi Security Analysis of CRT-Based Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem
37Evelyne Hubert Improvements to a triangulation-decomposition algorithm for ordinary differential systems in higher degree cases. Search on Bibsonomy ISSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF differential elimination, differential ideal theory, subresultant polynomial remainder sequence, systems of differential equations, triangular sets
37Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha Permanent Fault Attack on the Parameters of RSA with CRT. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Computational fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis
37Wieland Fischer, Jean-Pierre Seifert Note on Fast Computation of Secret RSA Exponents. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Carmichael's $lambda$-function, Secret exponent, Short public key, RSA, Chinese Remainder Theorem, Key generation
37Yuh-Shyan Chen, Yun-Wei Lin C-MAC: An Energy-Efficient MAC Scheme Using Chinese-Remainder-Theorem for Wireless Sensor Networks. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Chuan-Kun Wu, Vijay Varadharajan Modified Chinese Remainder Theorem and Its Application to Proxy Signatures. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
37Chih-Ming Su, Shian-Shyong Tseng, Mon-Fong Jiang, Joe C. S. Chen A Fast Clustering Process for Outliers and Remainder Clusters. Search on Bibsonomy PAKDD The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
37Martin Berz, Georg Hoffstätter Computation and Application of Taylor Polynomials with Interval Remainder Bounds. Search on Bibsonomy Reliab. Comput. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
35Xuting Wan, Jianping Cai, Qifan Yang Remainder Sign Analysis in Fixed-point Division. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF true code, addition and subtraction alternating, remainder sign, division, complement
35Hung-Min Sun, Shih-Ying Chang, Yu-Hsiang Hung, Yu-Kai Tseng, Hsin-Ta Chiao Decomposable Forward Error Correction Codes Based on Chinese Remainder Theorem. Search on Bibsonomy ISPAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF forward error correction, Chinese remainder theorem, reliable multicast
35Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF fault infective CRT, fault tolerance, cryptography, fault detection, side channel attack, factorization, Chinese Remainder Theorem (CRT), residue number system, physical cryptanalysis, hardware fault cryptanalysis, denial of service attack
35Venkatesan Guruswami, Amit Sahai, Madhu Sudan 0001 "Soft-decision" Decoding of Chinese Remainder Codes. Search on Bibsonomy FOCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Chinese remainder codes, prime integers, message space, agreement parameter, error-correcting algorithms, encoding, encoding, decoding, list decoding, soft-decision decoding
35Hanshen Xiao, Yufeng Huang, Yu Ye 0001, Guoqiang Xiao 0001 Robustness in Chinese Remainder Theorem for Multiple Numbers and Remainder Coding. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
35Cheng Chen 0010, Sian-Jheng Lin, Yunghsiang S. Han Extended Versions of Polynomial Remainder Codes and Chinese Remainder Codes. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
35Li Xiao 0002, Xiang-Gen Xia 0001 Error Correction in Polynomial Remainder Codes with Non-Pairwise Coprime Moduli and Robust Chinese Remainder Theorem for Polynomials. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
35Li Xiao 0002, Xiang-Gen Xia 0001 Error Correction in Polynomial Remainder Codes With Non-Pairwise Coprime Moduli and Robust Chinese Remainder Theorem for Polynomials. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
35Guangwu Xu On Solving a Generalized Chinese Remainder Theorem in the Presence of Remainder Errors. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
35Xiaoping Li 0002, Wenjie Wang 0001, Wei Wang 0052, Xiao-Li Ding, Qinye Yin 0001 Optimal estimates of common remainder for the robust Chinese Remainder Theorem. Search on Bibsonomy Commun. Nonlinear Sci. Numer. Simul. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Daniel Piso Fernandez, Javier D. Bruguera A New Rounding Algorithm for Variable Latency Division and Square Root Implementations. Search on Bibsonomy DSD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Abdelhamid S. Abdelhamid, Ahmed A. Belal Secure transmission of sensitive data using multiple channels. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Bert den Boer, Kerstin Lemke, Guntram Wicke A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction
29Marc Girault, Jean-François Misarsky Selective Forgery of RSA Signatures Using Redundancy. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
29J. Arjun Prabhu, Gregory B. Zyner 167 MHz Radix-8 Divide and Square Root Using Overlapped Radix-2 Stages. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
29W. Neuhaus, S. Schottlaender Die Weiterentwicklung der Aireyschen Konvergenzfaktoren für das Exponentialintegral zu einer Darstellung mit Restglied. Search on Bibsonomy Computing The full citation details ... 1975 DBLP  DOI  BibTeX  RDF
29E. M. Boehm, Thomas B. Steel Jr. The Share 709 System: Machine Implementation of Symbolic Programming. Search on Bibsonomy J. ACM The full citation details ... 1959 DBLP  DOI  BibTeX  RDF
27Shyong Jian Shyu, Chun-Chieh Chuang, Ying-Ru Chen, Ah-Fur Lai Weighted Threshold Secret Image Sharing. Search on Bibsonomy PSIVT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Weighted shadow size, Chinese remainder theorem, Threshold secret sharing, Secret image sharing
27Baodong Qin, Ming Li, Fanyu Kong Cryptanalysis of a Type of CRT-Based RSA Algorithms. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF BOS scheme, cryptanalysis, RSA, Chinese remainder theorem, fault attack, LLL
27Tiancheng Lou, Christophe Tartary Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Threshold Changeability, Security Rate, Dealer Free Update, Chinese Remainder Theorem, Secret Sharing Scheme, Information Rate
27Murat Cenk, Ferruh Özbudak Efficient Multiplication in F3kn, m>=1 and 5<=l<=18. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Chinese Remainder Theorem, pairing based cryptography, finite field multiplication
27Arnaud Boscher, Robert Naciri, Emmanuel Prouff CRT RSA Algorithm Protected Against Fault Attacks. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Smart Card, RSA, Chinese Remainder Theorem, Fault Attacks, Simple Power Analysis, Modular Exponentiation
27Katsuyuki Okeya, Tsuyoshi Takagi Security analysis of CRT-based cryptosystems. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem
27Xukai Zou, Amandeep Thukral, Byrav Ramamurthy An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Mobile ad hoc networks, Network security, Key management, Chinese remainder theorem, Secure group communication
27Sining Liu, Brian King, Wei Wang 0003 A CRT-RSA Algorithm Secure against Hardware Fault Attacks. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF algorithm, smart card, RSA, Chinese Remainder Theorem
27David A. Wagner 0001 Cryptanalysis of a provably secure CRT-RSA algorithm. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptanalysis, RSA, chinese remainder theorem, fault attacks
27Alec Chi-Wah Wong, Yu-Kwong Kwok On a Region-of-Interest Based Approach to Robust Wireless Video Transmission. Search on Bibsonomy ISPAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF remainder (RM), channel adaptation, real-time video compression, JPEG2000 (wavelet), simulations, network measurements, region of interest (ROI), PSNR, H.263 (DCT)
27Jiann-Cherng Shieh An efficient accessing technique for Taiwanese phonetic transcriptions. Search on Bibsonomy ACM Trans. Asian Lang. Inf. Process. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Hashing function design, Taiwanese phonetic transcriptions, minimal perfect hashing function, Chinese remainder theorem
27Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert A new CRT-RSA algorithm secure against bellcore attacks. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, RSA, smartcards, Chinese remainder theorem, faults attacks, Bellcore attack
27Vyacheslav M. Abramov Asymptotic Analysis of the GI/M/1/n Loss System as n Increases to Infinity. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF loss system, GI/M/1/n queue, Tauberian theorems with remainder, asymptotic analysis
27Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha Hardware Fault Attackon RSA with CRT Revisited. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis
27Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Spike attacks, Software countermeasures, Transient fault model, RSA, Chinese Remainder Theorem, Fault attacks, Hardware security, Bellcore attack
27Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis
27Lejla Batina, Geeke Muurling Another Way of Doing RSA Cryptography in Hardware. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF MultiPrime, scalability, performance model, systolic array, Chinese Remainder Theorem, Montgomery multiplication, modular exponentiation
27Hirofumi Muratani A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience. Search on Bibsonomy Information Hiding The full citation details ... 2001 DBLP  DOI  BibTeX  RDF c-secure code, digital watermarking, fingerprinting, error correction, Chinese Remainder Theorem, collusion attack
27Chin-Chen Chang 0001, Tung-Shou Chen, Yi Lin An efficient accessing technique of Chinese characters using Boshiamy Chinese input system. Search on Bibsonomy IRAL The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Boshiamy, Chinese input, Chinese remainder theorem, perfect hashing
27Maria Luisa Bonet, Toniann Pitassi, Ran Raz No Feasible Interpolation for TC0-Frege Proofs. Search on Bibsonomy FOCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF TC/sup 0/-Frege proofs, feasible interpolation, complexity-theoretic assumption, hardness assumption, lower bounds, theorem proving, Chinese Remainder Theorem, proof systems
27Vassilis Paliouras, Thanos Stouraitis Area-time performance of VLSI FIR filter architectures based on residue arithmetic. Search on Bibsonomy EUROMICRO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF area-time performance optimization, VLSI FIR filter architectures, FIR processors, moduli bases, binary-to-residue conversion complexity, residue-to-binary conversion complexity, multiply-by-constant units, binary structures, performance models, Chinese remainder theorem, residue number system, FIR filters, residue arithmetic
27Patrick Fitzpatrick, Graham H. Norton The Berlekamp-Massey algorithm and linear recurring sequences over a factorial domain. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Polynomial remainder sequence, linear recurring sequence, factorial domain, Berlekamp-Massey algorithm
27Tzonelih Hwang Cryptosystem for Group Oriented Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF Diffie-Hellman Key Distribution Scheme, Chinese Remainder Theorem, Threshold Scheme, Lagrange Interpolating Polynomial, Group Oriented Cryptography
27Guang-Huei Chiou, Wen-Tsuen Chen Secure Broadcasting Using the Secure Lock. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF secure broadcasting protocols, secret key minimization, secure broadcasting, secure lock, deciphering operation, private-key cryptosystem, cryptography, protocols, broadcasting, public-key cryptosystem, Chinese Remainder theorem, satellite, telecommunication channels, session key, radio, broadcast channels, secret keys, ciphertext
27Murat Cenk, Ferruh Özbudak Improved Polynomial Multiplication Formulas over $IF2$ Using Chinese Remainder Theorem. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Shaoqiang Bi, Warren J. Gross The Mixed-Radix Chinese Remainder Theorem and Its Applications to Residue Comparison. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Shreyas Sundaram, Christoforos N. Hadjicostis Fault-Tolerant Convolution Via Chinese Remainder Codes Constructed From Non-Coprime Moduli. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Wen Tao Zhu General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Giuseppe Campobello, Alessandro Leonardi, Sergio Palazzo On the Use of Chinese Remainder Theorem for Energy Saving in Wireless Sensor Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Shyong Jian Shyu, Ying-Ru Chen Threshold Secret Image Sharing by Chinese Remainder Theorem. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Huiyong Liao, Xiang-Gen Xia 0001 A Sharpened Dynamic Range of a Generalized Chinese Remainder Theorem for Multiple Integers. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Sorin Iftene, Manuela Grindei Weighted Threshold RSA Based on the Chinese Remainder Theorem. Search on Bibsonomy SYNASC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Akira Terui Recursive Polynomial Remainder Sequence and the Nested Subresultants. Search on Bibsonomy CASC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Michaël Quisquater, Bart Preneel, Joos Vandewalle On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Chung-Hsien Wu, Jin-Hua Hong, Cheng-Wen Wu RSA cryptosystem design based on the Chinese remainder theorem. Search on Bibsonomy ASP-DAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
27Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
27Yuke Wang, Xiaoyu Song, El Mostapha Aboulhamid A New Algorithm for RNS Magnitude Comparison Based on New Chinese Remainder Theorem II. Search on Bibsonomy Great Lakes Symposium on VLSI The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27Hantao Zhang 0001, Xin Hua Proving the Chinese Remainder Theorem by the Cover Set Induction. Search on Bibsonomy CADE The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
27Victor Y. Pan, Elliott Landowne, Akimou Sadikou Univariate polynomial division with a remainder by means of evaluation and interpolation. Search on Bibsonomy SPDP The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
27Michael Kalkbrener Solving Systems of Bivariate Algebraic Equations by Using Primitive Polynomial Remainder Sequences. Search on Bibsonomy ISSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
27James R. Pinkert Very fast computation of polynomial remainder sequence coefficient signs. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1976 DBLP  DOI  BibTeX  RDF
27George E. Collins Subresultants and Reduced Polynomial Remainder Sequences. Search on Bibsonomy J. ACM The full citation details ... 1967 DBLP  DOI  BibTeX  RDF
19Tuan-Che Chen, Jyh-Cheng Chen, Ying-Yu Chen Maximizing Unavailability Interval for Energy Saving in IEEE 802.16e Wireless MANs. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF low-end device, double-size technique, RSA, modular multiplication, efficient implementation, crypto-coprocessors, arithmetic unit
19Tuan-Che Chen, Ying-Yu Chen, Jyh-Cheng Chen An efficient energy saving mechanism for IEEE 802.16e wireless MANs. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Oleg Kiselyov, William E. Byrd, Daniel P. Friedman, Chung-chieh Shan Pure, Declarative, and Constructive Arithmetic Relations (Declarative Pearl). Search on Bibsonomy FLOPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Jeong-Chun Joo, Hae-Yeoun Lee, Cong Nguyen Bui, Won-Young Yoo, Heung-Kyu Lee Steganalytic Measures for the Steganography Using Pixel-Value Differencing and Modulus Function. Search on Bibsonomy PCM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pixel-value differencing, Modulus function, Steganography, Steganalysis
19Xiaofeng Mi, Douglas DeCarlo Separating Parts from 2D Shapes using Relatability. Search on Bibsonomy ICCV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Xiao Yan Deng, Greg Michaelson, Philip W. Trinder Automatically Costed Autonomous Mobility. Search on Bibsonomy IAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Álvaro Vázquez, Elisardo Antelo, Paolo Montuschi A radix-10 SRT divider based on alternative BCD codings. Search on Bibsonomy ICCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Young-Bin Kwon, Jeong-Hoon Kim Verification of the Document Components from Dual Extraction of MRTD Information. Search on Bibsonomy GREC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MRTD(Machine Readable Travel Document), cross-check, auto-correlation, verification, passport
19Shuliang Wang, Xinzhou Wang A Fuzzy Comprehensive Clustering Method. Search on Bibsonomy ADMA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Mehdi Hakimi, Seyyed Masoud Moghaddas Tafreshi, M. R. Rajati Unit Sizing of a Stand-Alone Hybrid Power System Using Model-Free Optimization. Search on Bibsonomy GrC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reformer, hybrid power system, optimal sizing, particle swarm optimization I. NOMENCLATURE P conv wg - Power delivered from wind turbines to converter (kw) P el wg - Power delivered from wind turbines to electrolyzer (kw) P k el tan - Power delive, K. N. Toosi University of Technology, Tehran-Iran (e-mail: sm_hakimi@yahoo.com). S.M.M.Tafreshi is with the Department of Electrical Engineering, K. N. Toosi University of Technology, Tehran-Iran (e-mail: tafreshi@eetd.kntu.ac.ir). M. R. Rajati is with the Department of Electrical Engineering, K. N. Toosi University of Technology, Tehran-Iran (e-mail: mohammadreza.rajati@gmail.com). P wt Power generated by wind turbines (kw) Pload Load power (kw) E k tan Stored energy in the hydrogen tank (kwh) fc, el, conv Efficiency of fuel cell, electrolyzer, converter NPCindex Net present cost (the index shows the corresponding component) ($) S Single-payment present worth factor R Life time of project (year) L Life time of each components (year) Ir Inter, fuel cell, wind turbine
19Hooman Nikmehr, Braden Phillips, Cheng-Chew Lim Fast Decimal Floating-Point Division. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Jean-Claude Bajard, Laurent Imbert, Graham A. Jullien Parallel Montgomery Multiplication in GF(2k) Using Trinomial Residue Arithmetic. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Tae Jong Kim, Young-Bin Kwon Crosscheck of Passport Information for Personal Identification. Search on Bibsonomy GREC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Hans-Jürgen Dobner Kernel-Splitting Technique for Enclosing the Solution of Fredholm Equations of the First Kind. Search on Bibsonomy Reliab. Comput. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 878 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license