An efficient multi-secret image sharing system based on Chinese remainder theorem and its FPGA realization

BK Sharobim, MA Fetteha, SK Abd-El-Hafiz… - IEEE …, 2023 - ieeexplore.ieee.org
Multi-Secret Image Sharing (MSIS) is important in information security when multiple images
are shared in an unintelligible form to different participants, where the images can only be …

Security analysis of homomorphic encryption scheme for cloud computing: Known-plaintext attack

M Babenko, N Chervyakov, A Tchernykh… - … IEEE Conference of …, 2018 - ieeexplore.ieee.org
We consider cryptosystems for homomorphic encryption schemes based on the Residue
Number System (RNS) and Secret Sharing Schemes. One of their disadvantages is that they …

[PDF][PDF] Development of a control system for computations in BOINC with homomorphic encryption in residue number system

M Babenko, N Kucherov, A Tchernykh, N Chervyakov… - BOINC: FAST, 2017 - academia.edu
In this paper, we propose approaches to constructing reliable schemes using the Residue
Number System (RNS) for the BOINC volunteer computing systems. We show that …

A high-speed residue-to-binary converter based on approximate Chinese Remainder Theorem

NN Kucherov, VA Kuchukov… - … IEEE Conference of …, 2018 - ieeexplore.ieee.org
Modular arithmetic, used in solving tasks related to increasing the productivity, reliability and
safety of stand-alone devices. The limited computing resources of devices imposes …

Adaptive encrypted cloud storage model

E Lopez-Falcon, A Tchernykh… - … IEEE Conference of …, 2018 - ieeexplore.ieee.org
In this paper, we propose an adaptive model of data storage in a heterogeneous distributed
cloud environment. Our system utilizes the methods of secret sharing schemes and error …

[PDF][PDF] Основы робототехники

ИВ Дворянинова - Новости науки в АПК, 2019 - scholar.archive.org
В данной статье рассматривается современная робототехника, строение роботов, их
виды и то, как роботы могут значительно упростить жизнь обычному человеку …

Analysis of secured distributed cloud data storage based on multilevel RNS

A Tchernykh, M Babenko, N Chervyakov… - … IEEE Conference of …, 2018 - ieeexplore.ieee.org
Cloud data storages are functioning in the presence of the risks of confidentiality, integrity,
and availability related with the loss of information, denial of access for a long time …

The ec sequences on points of an elliptic curve realization using neural networks

NI Chervyakov, MG Babenko, MA Deryabin… - Proceedings of the …, 2016 - Springer
This paper shows that pseudorandom number generator based on EC-sequence doesn't
satisfy the condition of Knuth k-distribution. A modified pseudorandom number generator on …

The Data Transfer Development in MANET Networks on the Base of Chinese Remainder Theorem

NI Chervyakov, MG Babenko, NN Kucherov… - Proceedings of the First …, 2016 - Springer
In the paper the data transmission scheme in MANET networks constructed on the threshold
secret sharing scheme (SSS) possessing the computation capability similar to Asmuth-Blum …

Development Parallel Distributed Numerical Approach for Securing Cryptocurrency Wallets

MM Moghaddam, H Albakri, K Parand - 2022 - researchsquare.com
Today, with the growth of cryptocurrencies, the importance of keeping them has increased.
Wallets are one of the ways to keep cryptocurrencies safe. One of the techniques for …