CryptoDL: Predicting dyslexia biomarkers from encrypted neuroimaging dataset using energy-efficient residue number system and deep convolutional neural network

OL Usman, RC Muniyandi - Symmetry, 2020 - mdpi.com
The increasing availability of medical images generated via different imaging techniques
necessitates the need for their remote analysis and diagnosis, especially when such …

Improved cloud-based N-primes model for symmetric-based fully homomorphic encryption using residue number system

KJ Muhammed, RM Isiaka… - Machine Learning and …, 2021 - Springer
Encryption schemes that allow computation to be performed on an encrypted data are
required in modern real-world applications. This technology is a necessity for cloud …

Enhanced MORE algorithm for fully homomorphic encryption based on secret information moduli set

KJ Muhammed, KA Gbolagade - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Cloud Computing has offers incredible benefits in terms of data storage and data
processing. However, data protection and privacy issues when it comes to data processing …

[PDF][PDF] An improved RNS reverse converter in three-moduli set

N Habibi, MR Salehnamadi - Journal of Computer & Robotics, 2016 - jcr.qazvin.iau.ir
Abstract Residue Number System (RNS) is a carry-free and non-weighed integer system. In
this paper an improved three-moduli set {2− 1, 2+ 1, 2− 1} in reverse converter based on …

Area Efficient Memoryless Reverse Converter for New Four Moduli Set

RK Jaiswal, R Kumar, RA Mishra - Journal of Circuits, Systems and …, 2018 - World Scientific
The efficiency of residue number system depends on the reverse converter due to several
modulo operations like addition, subtraction and multiplication. In this paper, a design of …

[PDF][PDF] Rivest Shamir Adleman Encryption Scheme Based on the Chinese Remainder Theorem

S Abdul-Mumin, KA Gbolagade - Advances in Networks, 2018 - academia.edu
Sensitive information is transmitted across the internet every day and keeping such
information as sacred is an important adventure. This is because malicious activities are on …

[PDF][PDF] Mixed Radix Conversion based RSA Encryption System

S Abdul-Mumin, KA Gbolagade - International Journal of …, 2016 - researchgate.net
Information security is a critical issue in data communication networks. This is more
important in wireless communications due to the fact that the transmitted signal could go …

Improved Meta-Heuristic Based RNS Techniques for Intrusion Detection in Wireless Sensor Network Using Stack Ensemble Learning Approach

IR Idowu - 2024 - search.proquest.com
It is of great necessity to tackle the issue of security in Wireless Sensor Networks (WSNs)
which are most times situated in harsh environment and with limited resources causing the …

An Efficient Biometric Template Transformation Protection Technique Using Residue Number System

SF Omotosho - 2024 - search.proquest.com
Biometric technology was introduced into applications and smart devices to provide a
dependable approach to the problem of user authentication. However, studies have …

[PDF][PDF] New Efficient Reverse Converters for 8n-bit Dynamic Range Moduli Set

S Abdul-Mumin, PA Agbedemnab… - International Journal of …, 2017 - academia.edu
This paper proposes two efficient residue to binary converters on a new three-moduli set
using the Chinese Remainder Theorem. The proposed reverse converters are adder based …