Two multi-party private comparison protocols based on GHZ state without pre-shared key ResearchGate - 10 May 2025 Two multi-party private comparison protocols based on GHZ state without pre-shared key ... More
Multiparty weighted threshold quantum secret sharing based on the Chinese remainder theorem to share quantum information Nature - 17 Mar 2021 Multiparty weighted threshold quantum secret sharing based on the Chinese remainder theorem to share quantum information ... More
A group key agreement protocol for Vanet based on Chinese remainder theorem and blockchain Wiley Online Library - 16 May 2024 A group key agreement protocol for Vanet based on Chinese remainder theorem and blockchain ... More
What Hot Dogs Can Teach Us About Number Theory Quanta Magazine - 18 Nov 2021 What Hot Dogs Can Teach Us About Number Theory ... More
Overview of the Chinese remainder theorem‐based extended supersingular... ResearchGate - 07 Sep 2022 Overview of the Chinese remainder theorem‐based extended supersingular... ... More
An Abstract Kind Of Clock: The Chinese Remainder Clock Hackaday - 27 Aug 2018 An Abstract Kind Of Clock: The Chinese Remainder Clock ... More
An efficient and privacy protection group authentication scheme in the industrial internet of things Frontiers - 27 Apr 2025 An efficient and privacy protection group authentication scheme in the industrial internet of things ... More
Figure 3.29: The mapping of indices using Good's algorithm and Chinese... ResearchGate - 02 Nov 2021 Figure 3.29: The mapping of indices using Good's algorithm and Chinese... ... More
Integrity Protection for Data Aggregation in Smart Grid - Zhu - 2022 - Security and Communication Networks Wiley Online Library - 22 Oct 2022 Integrity Protection for Data Aggregation in Smart Grid - Zhu - 2022 - Security and Communication Networks ... More
Figure 1 Diagrammatic illustration of the East China Sea Air Defense... ResearchGate - 05 Mar 2021 Figure 1 Diagrammatic illustration of the East China Sea Air Defense... ... More
A secure and robust group key distribution and authentication protocol with efficient rekey mechanism for dynamic access control in secure group communications Wiley Online Library - 22 Jul 2020 A secure and robust group key distribution and authentication protocol with efficient rekey mechanism for dynamic access control in secure group communications ... More
Fig. 2 The 6-input β-bit CSA tree. ResearchGate - 06 Sep 2018 Fig. 2 The 6-input β-bit CSA tree. ... More
Research on Online Education Curriculum Resources Sharing Based on 5G and Internet of Things Wiley Online Library - 05 Jan 2022 Research on Online Education Curriculum Resources Sharing Based on 5G and Internet of Things ... More
Architecture of the proposed blockchain-based spectrum sensing in CRN. ResearchGate - 22 Dec 2023 Architecture of the proposed blockchain-based spectrum sensing in CRN. ... More
Fig. 2. Architecture for DIT-based butterfly with merging the weighted... ResearchGate - 09 Mar 2023 Fig. 2. Architecture for DIT-based butterfly with merging the weighted... ... More
Fig. 4. Architecture for the modular polynomial multiplier using... ResearchGate - 09 Mar 2023 Fig. 4. Architecture for the modular polynomial multiplier using... ... More
Key function diagram for asymmetric Rivest–Shamir–Adleman (RSA)... ResearchGate - 17 Nov 2022 Key function diagram for asymmetric Rivest–Shamir–Adleman (RSA)... ... More
Figure 2. Our architecture for verifying the Collatz conjecture ResearchGate - 09 Feb 2018 Figure 2. Our architecture for verifying the Collatz conjecture ... More
Fig. 2 Block diagram of four-to-two CSA ResearchGate - 10 Feb 2018 Fig. 2 Block diagram of four-to-two CSA ... More