
| index | Title |
| 1 | Applying two channels to vector space secret sharing based multi-signature scheme Author(s):XIAO Qing-hua, PING Ling-di, CHEN ... Clicked:8649 Download:4137 Cited:0 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.1 P.56-62 DOI:10.1631/jzus.2005.A0056 |
| 2 | Range estimation based on symmetry polynomial aided Chinese remainder theorem for multiple targets in a pul... Author(s):Chenghu CAO, Yongbo ZHAO Clicked:9617 Download:9805 Cited:0 <Full Text> <PPT> 1273 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.2 P.304-316 DOI:10.1631/FITEE.2000418 |
| 3 | Reversible data hiding in encrypted domain based on NTRU and Chinese remainder theorem Author(s):Xinyue ZHANG, Kunyi LAI, Xin TANG Clicked:272 Download:146 Cited:0 <Full Text> Journal of Zhejiang University Science 2026 Vol.27 No.4 P.1-10 DOI:10.1631/ENG.ITEE.2025.0138 |