Sciweavers

ECCC
1998
118views more  ECCC 1998»
13 years 4 months ago
Chinese Remaindering with Errors
The Chinese Remainder Theorem states that a positive integer m is uniquely speci ed by its remainder modulo k relatively prime integers p1;:::;pk, provided m < Qk i=1 pi. Thus ...
Oded Goldreich, Dana Ron, Madhu Sudan
RTSS
2000
IEEE
13 years 9 months ago
Enhanced Fixed-Priority Scheduling with (m, k)-Firm Guarantee
In this paper, we study the problem of scheduling task sets with (m,k) constraints. In our approach, jobs of each task are partitioned into two sets: mandatory and optional. Manda...
Gang Quan, Xiaobo Sharon Hu
CCS
2004
ACM
13 years 10 months ago
Cryptanalysis of a provably secure CRT-RSA algorithm
We study a countermeasure proposed to protect Chinese remainder theorem (CRT) computations for RSA against fault attacks. The scheme was claimed to be provably secure. However, we...
David Wagner
AICCSA
2005
IEEE
91views Hardware» more  AICCSA 2005»
13 years 10 months ago
Secure transmission of sensitive data using multiple channels
A new scheme for transmitting sensitive data is proposed, the proposed scheme depends on partitioning the output of a block encryption module using the Chinese Remainder Theorem a...
Abdelhamid S. Abdelhamid, Ahmed A. Belal
QUANTUMCOMM
2009
Springer
13 years 11 months ago
Improvement of Lattice-Based Cryptography Using CRT
Abstract. In this paper, we first critically analyze two existing latticebased cryptosystems, namely GGH and Micciancio, and identify their drawbacks. Then, we introduce a method ...
Thomas Plantard, Mike Rose, Willy Susilo