Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem

C Li, Y Liu, LY Zhang, KW Wong - Signal Processing: Image …, 2014 - Elsevier
As a fundamental theorem in number theory, the Chinese Reminder Theorem (CRT) is
widely used to construct cryptographic primitives. This paper investigates the security of a …

Generation of maximum length non-binary key sequence and its application for stream cipher based on residue number system

KB Sudeepa, G Aithal - Journal of computational science, 2017 - Elsevier
A cipher system in which the data is sequence of binary digits from data source and secrete
key is also a random sequence of binary digits is called Stream cipher system. The stream …

EFFICIENT METHOD FOR DESIGNING MODULO {2n ± k} MULTIPLIERS

H Pettenghi, S Cotofana, L Sousa - Journal of Circuits, Systems …, 2014 - World Scientific
In this paper, an efficient method for designing memoryless modulo {2n±k} multipliers is
proposed, which can be used to compose larger residue number system (RNS) moduli sets …

High performance point-multiplication for conic curves cryptosystem based on standard NAF algorithm and Chinese remainder theorem

Y Li, L Xiao, Z Wang, H Tian - 2011 International Conference …, 2011 - ieeexplore.ieee.org
This paper presents parallel point-multiplication on conic curves based on standard NAF
algorithm and Chinese Remainder Theorem. All analysis of parallel methodologies should …

Exponential Cipher Based on Residue Number System for the Security of Text Document

SG Aithal, SN Pai - Advances in Control Instrumentation Systems: Select …, 2020 - Springer
Residue number system which was inspired by the Chinese remainder theorem provides a
method for using groups of smaller numbers to represent large integers. Although …

[引用][C] EFFICIENT METHOD FOR DESIGNING