Combined random number generator via the generalized Chinese remainder theorem
Journal of Computational and Applied Mathematics
Constructions of Cheating Immune Secret Sharing
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Chinese Remaindering for Algebraic Numbers in a Hidden Field
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
On Non-Polynomial Latin Squares
Designs, Codes and Cryptography
General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting
Electronic Notes in Theoretical Computer Science (ENTCS)
Threshold cryptography based on Asmuth-Bloom secret sharing
Information Sciences: an International Journal
Binary Sequences with Three and Four Level Autocorrelation
Computational Intelligence and Security
IEEE Transactions on Signal Processing
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Robust threshold schemes based on the Chinese remainder theorem
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
A closed-form robust chinese remainder theorem and its performance analysis
IEEE Transactions on Signal Processing
The linear complexity of binary sequences with optimal autocorrelation
IEEE Transactions on Information Theory
On decidability within the arithmetic of addition and divisibility
FOSSACS'05 Proceedings of the 8th international conference on Foundations of Software Science and Computation Structures
Lattice-based threshold-changeability for standard CRT secret-sharing schemes
Finite Fields and Their Applications
Construction and Enumeration of All Binary Duadic Codes of Length p m
Fundamenta Informaticae
Lossless secret image sharing based on generalized: LSB replacement
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Compact sequences of co-primes and their applications to the security of CRT-based threshold schemes
Information Sciences: an International Journal
Nested block designs: Flexible and efficient schedule-based asynchronous duty cycling
Computer Networks: The International Journal of Computer and Telecommunications Networking
Information Processing Letters
Hi-index | 0.07 |