Author of the publication

Comparison of modular numbers based on the chinese remainder theorem with fractional values.

, , , , , and . Autom. Control. Comput. Sci., 49 (6): 354-365 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities., , , , , , and . Peer-to-Peer Netw. Appl., 14 (3): 1666-1691 (2021)SNS-Based Secret Sharing Scheme for Security of Smart City Communication Systems., , , , , , and . ICSC-Cities, volume 1706 of Communications in Computer and Information Science, page 248-263. Springer, (2022)Comparison of modular numbers based on the chinese remainder theorem with fractional values., , , , , and . Autom. Control. Comput. Sci., 49 (6): 354-365 (2015)Modified Error Detection and Localization in the Residue Number System., , , , , and . Program. Comput. Softw., 48 (8): 598-605 (2022)Weighted Two-Levels Secret Sharing Scheme for Multi-Clouds Data Storage with Increased Reliability., , , , , , , , , and 1 other author(s). HPCS, page 915-922. IEEE, (2019)Privacy-Preserving Logistic Regression as a Cloud Service Based on Residue Number System., , , , , , , and . RuSCDays, volume 1331 of Communications in Computer and Information Science, page 598-610. Springer, (2020)Neural network method for base extension in residue number system., , , and . ICCS-DE, volume 2638 of CEUR Workshop Proceedings, page 9-22. CEUR-WS.org, (2020)Increasing reliability and fault tolerance of a secure distributed cloud storage., , , , and . ICCS-DE, volume 2638 of CEUR Workshop Proceedings, page 166-180. CEUR-WS.org, (2020)Comparative analysis of the scalar point multiplication algorithms in the NIST FIPS 186 elliptic curve cryptography., , , and . ICCS-DE, volume 2913 of CEUR Workshop Proceedings, page 21-31. CEUR-WS.org, (2021)A Survey on Privacy-Preserving Machine Learning with Fully Homomorphic Encryption., , , , and . CARLA, volume 1327 of Communications in Computer and Information Science, page 115-129. Springer, (2020)