Sciweavers

10 search results - page 2 / 2
» Chinese Remaindering with Multiplicative Noise
Sort
View
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
13 years 9 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary
COLING
2010
13 years 2 months ago
Build Chinese Emotion Lexicons Using A Graph-based Algorithm and Multiple Resources
For sentiment analysis, lexicons play an important role in many related tasks. In this paper, aiming to build Chinese emotion lexicons for public use, we adopted a graph-based alg...
Ge Xu, Xinfan Meng, Houfeng Wang
JSC
2010
155views more  JSC 2010»
13 years 5 months ago
Algorithms for solving linear systems over cyclotomic fields
We consider the problem of solving a linear system Ax = b over a cyclotomic field. What makes cyclotomic fields of special interest is that we can easily find a prime p that sp...
Liang Chen, Michael B. Monagan
NOSSDAV
2009
Springer
14 years 7 hour ago
Secure multimedia content delivery with multiparty multilevel DRM architecture
For scalability of business, multiparty multilevel digital rights management (DRM) architecture, where a multimedia content is delivered by an owner to a consumer through several ...
Tony Thomas, Sabu Emmanuel, Amitabha Das, Mohan S....
ARITH
1993
IEEE
13 years 11 months ago
Fast implementations of RSA cryptography
We detail and analyse the critical techniques which may be combined in the design of fast hardware for RSA cryptography: chinese remainders, star chains, Hensel's odd divisio...
Mark Shand, Jean Vuillemin