Restricted linear congruences and an authenticated encryption scheme (original) (raw)
Related papers
Journal of Number Theory, 2017
An algorithmic approach to Ramanujan’s congruences
Ramanujan Journal, 2009
A Modular-Arithmetic-Based Encryption Scheme
International Journal of Security and Its Applications, 2015
Some applications of linear congruence from number theory
International Research Journal of Science, Technology, Education, and Management, 2023
Enumeration Problems for a Linear Congruence Equation
Taiwanese Journal of Mathematics, 2014
New solvability conditions for congruence ax≡b (mod n)
Tatra Mountains Mathematical Publications, 2015
Non-negative integer linear congruences
Indagationes Mathematicae, 2006
On the Number of Representations of an Integer by a Linear Form
2005
Algebraic Algorithm for Solving Linear Congruences: Its Application To Cryptography
Asia Pacific Journal of Education Perspective
Asia Pacific Journal of Education, Arts and Sciences, 2014
Frontiers of Mathematics in China
A system of simultaneous congruences arising from trinomial exponential sums
Todd Cochrane, Christopher Pinner
Journal de Théorie des Nombres de Bordeaux, 2006
An analogue of Ramanujan’s sum with respect to regular integers (modr)
The Ramanujan Journal, 2011
Character Sums and Congruences with n
2004
The General Chinese Remainder Theorem
The American Mathematical Monthly, 1952
On congruences with products of variables from short intervals and applications
Proceedings of the Steklov Institute of Mathematics, 2013
WARSE The World Academy of Research in Science and Engineering
International Journal of Multidisciplinary in Cryptology and Information Security, 2023
Ramanujan-type congruences for overpartitions modulo 5
Journal of Number Theory, 2015
Randomization of Arithmetic Over Polynomial Modular Number System
2019 IEEE 26th Symposium on Computer Arithmetic (ARITH), 2019
Cryptographic Applications of Analytic Number Theory
Cryptographic Applications of Analytic Number Theory, 2003
Number Theory and Their Application in Computer Science and Cryptography
Journal of Mathematical Sciences & Computational Mathematics, 2020
Efficient and secure modular operations using the Adapted Modular Number System
ArXiv, 2019
IACR Cryptology ePrint Archive, 2019
A homomorphic encryption scheme over integers based on Carmichael's theorem
2016 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT), 2016
A pr 2 02 2 Schwartz-Zippel for multilinear polynomials mod N
2022
An algorithm for a modified computation of Dedekind sums
Journal of Al-Qadisiyah for Computer Science and Mathematics
Combinatorial Designs and Cryptography, Revisited
2019
Using linear congruential generators for cryptographic purposes
Proceedings of the 20th International Conference on …, 2005
Lattice basis reduction, Jacobi sums and hyperelliptic cryptosystems
Bulletin of the Australian Mathematical Society, 1998
A Computational Introduction to Number Theory and Algebra (Version 2
Encryption with Generalised Balancing Sequences and Generalised Lucas Balancing Sequences
Journal of Advances in Mathematics and Computer Science
Linear Congruential Pseudo-Random Numbers
A survey on pure and mixed exponential sums modulo prime powers
2002