Geometry.Net - the online learning center
Home  - Theorems_And_Conjectures - Chinese Remainder Theorem
e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-90 of 90    Back | 1  | 2  | 3  | 4  | 5 

         Chinese Remainder Theorem:     more detail
  1. Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography by C. Ding, D. Pei, et all 1999-06
  2. Secret Sharing Using the Chinese Remainder Theorem: Secret Sharing, Chinese Remainder Theorem, Threshold Cryptosystem, Cardinality, Access Structure, Shamir's ... Polynomial Interpolation, George Blakley
  3. Remainder: Natural Number, Real Number Modulo Operation, Chinese Remainder Theorem, Division Algorithm, Euclidean Algorithm
  4. A hierarchical single-key-lock access control using the Chinese remainder theorem (OSU-CS-TR) by Kim Sin Lee, 1994
  5. Fundamental Number Theory with Applications (Discrete Mathematics and Its Applications) by Richard A. Mollin, 1998-01-31
  6. Fundamental Number Theory with Applications, Second Edition (Discrete Mathematics and Its Applications) by Richard A. Mollin, 2008-02-21

81. Error Analysis Of Approximate Chinese-remainder-theorem Decoding
File Format PDF/Adobe Acrobat Quick View
http://www.ece.ucsb.edu/~parhami/pubs_folder/parh95-ieeetc-error-anal-crt.pdf

82. COMPUTING HILBERT CLASS POLYNOMIALS WITH THE CHINESE REMAINDER
Your browser may not have a PDF reader available. Google recommends visiting our text version of this document.
http://www.ams.org/journals/mcom/2011-80-273/S0025-5718-2010-02373-7/S0025-5718-

83. Modular Exponentiation Via The Explicit Chinese Remainder Theorem
File Format PDF/Adobe Acrobat
http://digitalcommons.butler.edu/cgi/viewcontent.cgi?article=1096&context=fa

84. The Laws Of Cryptography: Public Key Cryptography
This can be sped up using the Chinese Remainder Theorem, as is shown in the next Faster RSA Implementation Using the Chinese Remainder Theorem.
http://www.cs.utsa.edu/~wagner/laws/RSA.html
The Laws of Cryptography:
The RSA Cryptosystem by Neal R. Wagner NOTE: This site is obsolete. See book draft (in PDF):
    The Laws of Cryptography with Java Code History of the RSA Cryptosystem. The history of RSA is still fascinating to me because I watched it unfold. In 1976, as discussed in the previous section, Diffie and Hellman introduced the idea of a public key cryptosystem. (Actually, the concept had been discovered earlier in classified work by British and American military researchers, but no one knew this at the time.) Then a 1977 Scientific American article by Martin Gardener talked about a new public key implementation by MIT researchers Rivest, Shamir, and Adelman. This article caught my attention (along with many others), but did not contain the details needed to fully understand the system. A year later the details were finally published and the revolution in cryptography was in full motion. After more than twenty years of research, RSA remains secure and has become the most popular public key cryptosystem.
Law RSA1: The RSA cryptosystem is the de facto world-wide standard for public key encryption.

85. Notes For Lecture 8 1 Chinese Remainder Theorem 2 Squares And
File Format PDF/Adobe Acrobat Quick View
http://www.cs.bu.edu/~reyzin/teaching/f04cs538/oldnotes/notes8.pdf

86. The Chinese Remainder Theorem And Its Application In A High-Speed
File Format PDF/Adobe Acrobat Quick View
http://www.acsac.org/2000/papers/48.pdf

87. Mathematical Programming Glossary
Chinese Remainder Theorem. Let m1, , mk be relatively prime positive integers , and let b1, , bk be any integers. Then, there exists x such that
http://glossary.computing.society.informs.org/index.php?page=C.html

88. Generalized Chinese Remainder Theorem - MathOverflow
generalization of the Chinese Remainder Theorem and the proof is very easy. But I m interested what happens when we take finitely many submodules $U_1,
http://mathoverflow.net/questions/21782/generalized-chinese-remainder-theorem
login faq how to ask meta ...
Generalized Chinese Remainder Theorem
Remember to vote up questions/answers you find interesting or helpful (requires 15 reputation points
Let $U,V$ be submodules of a $R$-module $M$. Then the diagonal induces an isomorphism For $M=R$, this question asks for a sort of sheaf condition for sections on closed subschemes. ac.commutative-algebra flag edited Apr 18 at 23:59 Harry Gindi
asked Apr 18 at 22:26 Martin Brandenburg
Perhaps springerlink.com/content/q2184g8975054112 Gjergji Zaimi Apr 18 at 23:10 Martin Brandenburg Apr 19 at 7:42
3 Answers
oldest newest votes
So this is what's in Kleinert's paper "Some remarks on the Chinese Remainder Theorem" that I mentioned in the comments. link flag answered Apr 19 at 10:31 Gjergji Zaimi
Martin Brandenburg
Apr 19 at 11:07 Martin Brandenburg Apr 19 at 11:12
You can accept an answer to one of your own questions by clicking the check mark next to it. This awards 15 reputation points to the person who answered and 2 reputation points to you.
link flag answered Apr 19 at 1:23 wzzx
Martin Brandenburg
Apr 19 at 6:31 wzzx Apr 19 at 6:48 Martin Brandenburg Apr 19 at 7:33
Sorry if I misunderstood anything or said something completely ridiculous...

89. Chinese Remainder Theorem Coprime Simultaneous Congruences
The Chinese remainder theorem is any of a number of related results in abstract For a principal ideal domain R the Chinese remainder theorem takes the
http://www.economicexpert.com/a/Chinese:remainder:theorem.html

90. RSA Speedup With Chinese Remainder Theorem Immune Against Hardware Fault Cryptan
This article considers the problem of how to prevent the fast RSA signature and decryption computation with residue number system (or called the CRTbased
http://doi.ieeecomputersociety.org/10.1109/TC.2003.1190587

Page 5     81-90 of 90    Back | 1  | 2  | 3  | 4  | 5 

free hit counter