M Deryabin, M Babenko, A Nazarov… - … on Engineering and …, 2019 - ieeexplore.ieee.org
… Note that, according to the Chineseremainder theorem, the number ܺ should be in the interval ሾͲǡ ܯሻ , where the number ܯ ൌ ݉ଵ ή ݉ଶ ǥ ή ݉ is called the representation range of the …
… proposed ChineseRemainder Theorem, which is depends on RSAThreshold cryptography16 in MANETusing the scheme of Verifiablesecret sharing. It develops Threshold …
NN Shenets - Journal of Computer Virology and Hacking Techniques, 2024 - Springer
… in secret sharing. They used congruence classes and the Chineseremainder theorem. … considered security problems in MANET and proposed CRT-based Threshold RSA using …
D Roy, P Das - Proceedings of the International Conference on …, 2018 - Springer
… [9] proposed a mechanism, RSAthresholdcryptography by usingverifiablesecret sharing (VSS) which is based on Chineseremainder theorem for MANET. Asmuth bloom secret …
I Kaur, A Rao - Int J Comput Appl, 2017 - academia.edu
… based on Chineseremainder … RSAthreshold secure MANET based on Chineseremainder theorem. CK.Kaya et all[6] has proposed a secret scheme for secure data transmission using …
P Kumar, N Singhal, D Pandey - International Journal of Information …, 2022 - Springer
… The cryptographic condition is hiddenthrough number of threshold and secret key divided among number of shares. For the security of mobile agent an approach based on Euler totient …
K Somsuk - 2017 21st International Computer Science and …, 2017 - ieeexplore.ieee.org
… Cryptography is the important science used to secure the secret message by usingencryption and decryption … There are two different techniques for cryptography. One is symmetric key …