• No results found

General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting

N/A
N/A
Protected

Academic year: 2021

Share "General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting"

Copied!
18
0
0

Loading.... (view fulltext now)

Full text

Loading

References

Related documents

In this paper, frequency response of an analytically derived transfer function model of a rotary cement kiln is used as an example for better demonstrating the procedures

نآ دورو و نارﺎﻤﯿﺑ بﺎﺨﺘﻧا كﻼﻣ ناور ﺺﯿﺨﺸﺗ ،ﻪﻧﻮﻤﻧ ﻪﺑ ﺎﻫ ﯽﻨﯿﻟﺎﺑ ﻪﺒﺣﺎﺼﻣ زا هدﺎﻔﺘﺳا ﺎﺑ ﯽﺼﯿﺨﺸﺗ ﻪﺒﺣﺎﺼﻣ مﺎﺠﻧا ،ﮏﺷﺰﭘ ﮏﯾ رﻮﺤﻣ تﻻﻼﺘﺧا ياﺮﺑ ﻪﺘﻓﺎﯾ رﺎﺘﺧﺎﺳ (SCID-I)

If the instruction is not used in pulse execution mode, the content in the designated device D will minus “1” in every scan whenever the instruction is executed. This instruction

All had plaques with fewer rows, a higher frequency of plaques missing altogether (except teaA) and a higher frequency of missing particles than wild type.. These

Die reduzierten Werke Demands verweisen auf die „Unmöglichkeit jeder verallgemeinernden, einzig wahren Geschichtserfahrung [...], Demands Bild macht deutlich, dass die Geschichte

1.2 The four Centres currently provide an information service to visitors and local residents about the Snowdonia National Park area, house exhibitions and provide a retail

“I wanted to go to war and I did go”: an investigation of Civil War primary sources and United States history textbooks.. https://hdl.handle.net/2144/40936

Although these accidents are preventable, invariably, they happen. It is therefore helpful to know how to protect your body if you slip, trip or fall. Protect your head. It is the