Krishna B, Krishna H C, and Lin K Y. ComputationalNumber Theory and Digital Signal Processing: FastAlgorithms and Error Control Techniques[M]. CRC Press,Boca Raton, FL, USA, 1994: 1-5.[2]Grossschadl J. The Chinese Remainder Theorem and itsapplication in a high-speed RSA crypto chip[C]. 16th AnnualConference on Computer Security Applications, New Orleans,USA, 2000: 384-393.[3]Ding C, Pei D, and Salomaa A. Chinese Remainder Theorem:Applications in Computing, Coding, Cryptography[M].Singapore, World Scientific, 1996: 2-10.[4]Goldreich O, Ron D, and Sudan M. Chinese remainderingwith errors[J].IEEE Transactions on Information Theory.2000, 46(7):1330-1338[5]Guruswami V, Sahai A, and Sudan M. Soft-decisiondecoding of Chinese remainder codes. in Proc[C]. 41st IEEESymp. Foundations Computer Science, Redondo Beach, CA,2000: 159-168.[6]Xia X G and Liu K. A generalized Chinese remaindertheorem for residue sets with errors and its application infrequency determination from multiple sensors with lowsampling rates[J].IEEE Signal Processing Letters.2005,12(11):768-771[7]Xia X G and Wang G. Phase unwrapping and a robustChinese remainder theorem[J].IEEE Signal ProcessingLetters.2007, 14(4):247-250[8]Li G, Xu J, Peng Y N, and Xia X G. An efficientimplementation of robust phase- unwrapping algorithm[J].IEEE Signal Processing Letters.2007, 14(6):393-396[9]Li X and Xia X G. A fast robust Chinese remainder theorembased phased unwrapping algorithm[J].IEEE SignalProcessing Letters.2008, 15(10):665-668
|