[PDF][PDF] Multilevel threshold secret image sharing based on the Chinese remainder theorem

R Koikara, A Paul, KY Yoo - … on Security and Management (SAM'16), 2016 - academia.edu
use Chinese remainder theorem based on Asmuth-Bloom’s scheme to perform MTSS in which
the secretRSA-threshold cryptography for MANETs using VSS. in 2009. In 2012, Lu et al. …

Protocol for secure and reliable data transmission in MANET based on modular arithmetic

M Deryabin, M Babenko, A Nazarov… - … on Engineering and …, 2019 - ieeexplore.ieee.org
… Note that, according to the Chinese remainder theorem, the number ܺ should be in the interval
ሾͲǡ ܯሻ , where the number ܯ ൌ ݉ଵ ή ݉ଶ ǥ ή ݉௡ is called the representation range of the …

[PDF][PDF] Code based secret sharing scheme for MANET

P Guddeti, PVS Kumar, AN Tentu - Indian Journal of Science and …, 2016 - researchgate.net
… proposed Chinese Remainder Theorem, which is depends on RSA Threshold
cryptography16 in MANET using the scheme of Verifiable secret sharing. It develops Threshold …

On modular (CRT-based) secret sharing

NN Shenets - Journal of Computer Virology and Hacking Techniques, 2024 - Springer
… in secret sharing. They used congruence classes and the Chinese remainder theorem. …
considered security problems in MANET and proposed CRT-based Threshold RSA using

A modified RSA cryptography algorithm for security enhancement in vehicular ad hoc networks

D Roy, P Das - Proceedings of the International Conference on …, 2018 - Springer
… [9] proposed a mechanism, RSA threshold cryptography by using verifiable secret sharing
(VSS) which is based on Chinese remainder theorem for MANET. Asmuth bloom secret

[PDF][PDF] A framework to improve the network security with less mobility in MANET

I Kaur, A Rao - Int J Comput Appl, 2017 - academia.edu
… based on Chinese remainderRSA threshold secure MANET based on Chinese remainder
theorem. CK.Kaya et all[6] has proposed a secret scheme for secure data transmission using

Euler totient function and fermat Euler theorem based an optimized key management scheme for securing mobile agents migration

P Kumar, N Singhal, D Pandey - International Journal of Information …, 2022 - Springer
… The cryptographic condition is hidden through number of threshold and secret key divided
among number of shares. For the security of mobile agent an approach based on Euler totient …

The New Equation for RSA's Decryption Process Appropriate with High Private Key Exponent

K Somsuk - 2017 21st International Computer Science and …, 2017 - ieeexplore.ieee.org
Cryptography is the important science used to secure the secret message by using encryption
and decryption … There are two different techniques for cryptography. One is symmetric key …

Euler Totient Function and Fermat-Eulller Theorem Based on Optimized Key Management Scheme for Securing Mobile Agents Migration

N Singhal, P Kumar, D Pandey - Electronic Systems and Intelligent …, 2022 - Springer
… Sarkar S, Kisku B, Misra S, Obaidat MS (2009) Chinese remainder theorem-based RSA-threshold
cryptography in MANET using verifiable secret sharing scheme. In: WiMob 2009—5th …

An approach for optimal-secure multi-path routing and intrusion detection in MANET

N Veeraiah, BT Krishna - Evolutionary Intelligence, 2022 - Springer
… Sarkar S, Kisku B, Misra S, Obaidat MS (2009) Chinese remainder theorem based RSA-threshold
cryptography in mobile ad hoc networks using verifiable secret sharing. In: …