Chinese remainder theorem#Statement for principal ideal domains
{{Short description|About simultaneous modular congruences}}
In mathematics, the Chinese remainder theorem states that if one knows the remainders of the Euclidean division of an integer n by several integers, then one can determine uniquely the remainder of the division of n by the product of these integers, under the condition that the divisors are pairwise coprime (no two divisors share a common factor other than 1).{{Cite web |title=DLMF: §27.15 Chinese Remainder Theorem ‣ Applications ‣ Chapter 27 Functions of Number Theory |url=https://dlmf.nist.gov/27.15 |access-date=2025-01-31 |website=dlmf.nist.gov}}
File:Sun_Tzu_Chinese_remainder_theorem.svg
The theorem is sometimes called Sunzi's theorem. Both names of the theorem refer to its earliest known statement that appeared in Sunzi Suanjing, a Chinese manuscript written during the 3rd to 5th century CE. This first statement was restricted to the following example:
If one knows that the remainder of n divided by 3 is 2, the remainder of n divided by 5 is 3, and the remainder of n divided by 7 is 2, then with no other information, one can determine the remainder of n divided by 105 (the product of 3, 5, and 7) without knowing the value of n. In this example, the remainder is 23. Moreover, this remainder is the only possible positive value of n that is less than 105.
The Chinese remainder theorem is widely used for computing with large integers, as it allows replacing a computation for which one knows a bound on the size of the result by several similar computations on small integers.
The Chinese remainder theorem (expressed in terms of congruences) is true over every principal ideal domain. It has been generalized to any ring, with a formulation involving two-sided ideals.
History
The earliest known statement of the problem appears in the 5th-century book Sunzi Suanjing by the Chinese mathematician Sunzi:{{harvnb|Katz|1998|page=197}}
{{blockquote|There are certain things whose number is unknown. If we count them by threes, we have two left over; by fives, we have three left over; and by sevens, two are left over. How many things are there?{{harvnb|Dence|Dence|1999|page=156}}}}
Sunzi's work would not be considered a theorem by modern standards; it only gives one particular problem, without showing how to solve it, much less any proof about the general case or a general algorithm for solving it.{{harvnb|Dauben|2007|page=302}} An algorithm for solving this problem was described by Aryabhata (6th century).{{harvnb|Kak|1986}} Special cases of the Chinese remainder theorem were also known to Brahmagupta (7th century) and appear in Fibonacci's Liber Abaci (1202).{{harvnb|Pisano|2002|pages=402–403}} The result was later generalized with a complete solution called Da-yan-shu ({{lang|zh|大衍術}}) in Qin Jiushao's 1247 Mathematical Treatise in Nine Sections {{harvnb|Dauben|2007|page=310}} which was translated into English in early 19th century by British missionary Alexander Wylie.{{harvnb|Libbrecht|1973}}
File:Disqvisitiones-800.jpg's 1801 book Disquisitiones Arithmeticae.{{Harvnb|Gauss|1986|loc=Art. 32–36}}]]
The notion of congruences was first introduced and used by Carl Friedrich Gauss in his Disquisitiones Arithmeticae of 1801.{{harvnb|Ireland|Rosen|1990|page=36}} Gauss illustrates the Chinese remainder theorem on a problem involving calendars, namely, "to find the years that have a certain period number with respect to the solar and lunar cycle and the Roman indiction."{{harvnb|Ore|1988|page=247}} Gauss introduces a procedure for solving the problem that had already been used by Leonhard Euler but was in fact an ancient method that had appeared several times.{{harvnb|Ore|1988|page=245}}
Statement
Let n1, ..., nk be integers greater than 1, which are often called moduli or divisors. Let us denote by N the product of the ni.
The Chinese remainder theorem asserts that if the ni are pairwise coprime, and if a1, ..., ak are integers such that 0 ≤ ai < ni for every i, then there is one and only one integer x, such that 0 ≤ x < N and the remainder of the Euclidean division of x by ni is ai for every i.
This may be restated as follows in terms of congruences:
If the are pairwise coprime, and if a1, ..., ak are any integers, then the system
:
x &\equiv a_1 \pmod{n_1} \\
&\,\,\,\vdots \\
x &\equiv a_k \pmod{n_k},
\end{align}
has a solution, and any two solutions, say x1 and x2, are congruent modulo N, that is, {{math|x1 ≡ x2 (mod N{{hairsp}})}}.{{harvnb|Ireland|Rosen|1990|page=34}}
In abstract algebra, the theorem is often restated as: if the ni are pairwise coprime, the map
:
defines a ring isomorphism{{harvnb|Ireland|Rosen|1990|page=35}}
:
between the ring of integers modulo N and the direct product of the rings of integers modulo the ni. This means that for doing a sequence of arithmetic operations in one may do the same computation independently in each and then get the result by applying the isomorphism (from the right to the left). This may be much faster than the direct computation if N and the number of operations are large. This is widely used, under the name multi-modular computation, for linear algebra over the integers or the rational numbers.
The theorem can also be restated in the language of combinatorics as the fact that the infinite arithmetic progressions of integers form a Helly family.{{harvnb|Duchet|1995}}
Proof
The existence and the uniqueness of the solution may be proven independently. However, the first proof of existence, given below, uses this uniqueness.
=Uniqueness=
Suppose that {{mvar|x}} and {{mvar|y}} are both solutions to all the congruences. As {{mvar|x}} and {{mvar|y}} give the same remainder, when divided by {{math|ni}}, their difference {{math|x − y}} is a multiple of each {{math|ni}}. As the {{math|ni}} are pairwise coprime, their product {{math|N}} also divides {{math|x − y}}, and thus {{mvar|x}} and {{mvar|y}} are congruent modulo {{math|N}}. If {{mvar|x}} and {{mvar|y}} are supposed to be non-negative and less than {{math|N}} (as in the first statement of the theorem), then their difference may be a multiple of {{math|N}} only if {{math|1=x = y}}.
=Existence (first proof)=
The map
:
maps congruence classes modulo {{math|N}} to sequences of congruence classes modulo {{math|ni}}. The proof of uniqueness shows that this map is injective. As the domain and the codomain of this map have the same number of elements, the map is also surjective, which proves the existence of the solution.
This proof is very simple but does not provide any direct way for computing a solution. Moreover, it cannot be generalized to other situations where the following proof can.
=Existence (constructive proof)=
Existence may be established by an explicit construction of {{mvar|x}}.{{harvnb|Rosen|1993|page=136}} This construction may be split into two steps, first solving the problem in the case of two moduli, and then extending this solution to the general case by induction on the number of moduli.
==Case of two moduli==
We want to solve the system:
:
\begin{align}
x &\equiv a_1 \pmod {n_1}\\
x &\equiv a_2 \pmod {n_2},
\end{align}
where and are coprime.
Bézout's identity asserts the existence of two integers and such that
:
The integers and may be computed by the extended Euclidean algorithm.
A solution is given by
:
Indeed,
:
x&=a_1m_2n_2+a_2m_1n_1\\
&=a_1(1 - m_1n_1) + a_2m_1n_1 \\
&=a_1 + (a_2 - a_1)m_1n_1,
\end{align}
implying that The second congruence is proved similarly, by exchanging the subscripts 1 and 2.
==General case==
Consider a sequence of congruence equations:
:
\begin{align}
x &\equiv a_1 \pmod{n_1} \\
&\vdots \\
x &\equiv a_k \pmod{n_k},
\end{align}
where the are pairwise coprime. The two first equations have a solution provided by the method of the previous section. The set of the solutions of these two first equations is the set of all solutions of the equation
:
As the other are coprime with this reduces solving the initial problem of {{mvar|k}} equations to a similar problem with equations. Iterating the process, one gets eventually the solutions of the initial problem.
=Existence (direct construction)=
For constructing a solution, it is not necessary to make an induction on the number of moduli. However, such a direct construction involves more computation with large numbers, which makes it less efficient and less used. Nevertheless, Lagrange interpolation is a special case of this construction, applied to polynomials instead of integers.
Let be the product of all moduli but one. As the are pairwise coprime, and are coprime. Thus Bézout's identity applies, and there exist integers and such that
:
A solution of the system of congruences is
:
In fact, as is a multiple of for
we have
:
for every
Computation
Consider a system of congruences:
:
x &\equiv a_1 \pmod{n_1} \\
&\vdots \\
x &\equiv a_k \pmod{n_k}, \\
\end{align}
where the are pairwise coprime, and let In this section several methods are described for computing the unique solution for , such that
:
\begin{align}
x &\equiv 0 \pmod 3 \\
x &\equiv 3 \pmod 4 \\
x &\equiv 4 \pmod 5.
\end{align}
Several methods of computation are presented. The two first ones are useful for small examples, but become very inefficient when the product is large. The third one uses the existence proof given in {{slink||Existence (constructive proof)}}. It is the most convenient when the product is large, or for computer computation.
=Systematic search=
It is easy to check whether a value of {{mvar|x}} is a solution: it suffices to compute the remainder of the Euclidean division of {{mvar|x}} by each {{math|ni}}. Thus, to find the solution, it suffices to check successively the integers from {{math|0}} to {{mvar|N}} until finding the solution.
Although very simple, this method is very inefficient. For the simple example considered here, {{math|40}} integers (including {{math|0}}) have to be checked for finding the solution, which is {{math|39}}. This is an exponential time algorithm, as the size of the input is, up to a constant factor, the number of digits of {{mvar|N}}, and the average number of operations is of the order of {{mvar|N}}.
Therefore, this method is rarely used, neither for hand-written computation nor on computers.
=Search by sieving=
File:Chinese_remainder_theorem_sieve.svg
The search of the solution may be made dramatically faster by sieving. For this method, we suppose, without loss of generality, that
:
By testing the values of these numbers modulo
:
Testing the values of these numbers modulo
This method is faster if the moduli have been ordered by decreasing value, that is if
:4 mod 4 → 0. Continue
:4 + 5 = 9 mod 4 →1. Continue
:9 + 5 = 14 mod 4 → 2. Continue
:14 + 5 = 19 mod 4 → 3. OK, continue by considering remainders modulo 3 and adding 5 × 4 = 20 each time
:19 mod 3 → 1. Continue
:19 + 20 = 39 mod 3 → 0. OK, this is the result.
This method works well for hand-written computation with a product of moduli that is not too big. However, it is much slower than other methods, for very large products of moduli. Although dramatically faster than the systematic search, this method also has an exponential time complexity and is therefore not used on computers.
=Using the existence construction=
The constructive existence proof shows that, in the case of two moduli, the solution may be obtained by the computation of the Bézout coefficients of the moduli, followed by a few multiplications, additions and reductions modulo
For more than two moduli, the method for two moduli allows the replacement of any two congruences by a single congruence modulo the product of the moduli. Iterating this process provides eventually the solution with a complexity, which is quadratic in the number of digits of the product of all moduli. This quadratic time complexity does not depend on the order in which the moduli are regrouped. One may regroup the two first moduli, then regroup the resulting modulus with the next one, and so on. This strategy is the easiest to implement, but it also requires more computation involving large numbers.
Another strategy consists in partitioning the moduli in pairs whose product have comparable sizes (as much as possible), applying, in parallel, the method of two moduli to each pair, and iterating with a number of moduli approximatively divided by two. This method allows an easy parallelization of the algorithm. Also, if fast algorithms (that is, algorithms working in quasilinear time) are used for the basic operations, this method provides an algorithm for the whole computation that works in quasilinear time.
On the current example (which has only three moduli), both strategies are identical and work as follows.
Bézout's identity for 3 and 4 is
:
Putting this in the formula given for proving the existence gives
:
for a solution of the two first congruences, the other solutions being obtained by adding to −9 any multiple of {{nowrap|1=3 × 4 = 12}}. One may continue with any of these solutions, but the solution {{nowrap|1=3 = −9 +12}} is smaller (in absolute value) and thus leads probably to an easier computation
Bézout identity for 5 and 3 × 4 = 12 is
:
Applying the same formula again, we get a solution of the problem:
:
The other solutions are obtained by adding any multiple of {{nowrap|1=3 × 4 × 5 = 60}}, and the smallest positive solution is {{nowrap|1=−21 + 60 = 39}}.
=As a linear Diophantine system=
The system of congruences solved by the Chinese remainder theorem may be rewritten as a system of linear Diophantine equations:
:
x &= a_1 +x_1n_1\\
&\vdots \\
x &=a_k+x_kn_k,
\end{align}
where the unknown integers are
Over principal ideal domains
In {{section link||Statement}}, the Chinese remainder theorem has been stated in three different ways: in terms of remainders, of congruences, and of a ring isomorphism. The statement in terms of remainders does not apply, in general, to principal ideal domains, as remainders are not defined in such rings. However, the two other versions make sense over a principal ideal domain {{math|R}}: it suffices to replace "integer" by "element of the domain" and
However, in general, the theorem is only an existence theorem and does not provide any way for computing the solution, unless one has an algorithm for computing the coefficients of Bézout's identity.
Over univariate polynomial rings and Euclidean domains
The statement in terms of remainders given in {{slink||Theorem statement}} cannot be generalized to any principal ideal domain, but its generalization to Euclidean domains is straightforward. The univariate polynomials over a field is the typical example of a Euclidean domain which is not the integers. Therefore, we state the theorem for the case of the ring
The Chinese remainder theorem for polynomials is thus: Let
If
The construction of the solution may be done as in {{slink||Existence (constructive proof)}} or {{slink||Existence (direct proof)}}. However, the latter construction may be simplified by using, as follows, partial fraction decomposition instead of the extended Euclidean algorithm.
Thus, we want to find a polynomial
:
for
Consider the polynomials
:
Q(X) &= \prod_{i=1}^{k}P_i(X) \\
Q_i(X) &= \frac{Q(X)}{P_i(X)}.
\end{align}
The partial fraction decomposition of
:
and thus
:
Then a solution of the simultaneous congruence system is given by the polynomial
:
In fact, we have
:
for
This solution may have a degree larger than
:
=Lagrange interpolation=
A special case of Chinese remainder theorem for polynomials is Lagrange interpolation. For this, consider {{mvar|k}} monic polynomials of degree one:
:
They are pairwise coprime if the
Now, let
:
for every
Lagrange interpolation formula is exactly the result, in this case, of the above construction of the solution. More precisely, let
:
Q(X) &= \prod_{i=1}^{k}(X-x_i) \\[6pt]
Q_i(X) &= \frac{Q(X)}{X-x_i}.
\end{align}
The partial fraction decomposition of
:
In fact, reducing the right-hand side to a common denominator one gets
:
and the numerator is equal to one, as being a polynomial of degree less than
Using the above general formula, we get the Lagrange interpolation formula:
:
=Hermite interpolation=
Hermite interpolation is an application of the Chinese remainder theorem for univariate polynomials, which may involve moduli of arbitrary degrees (Lagrange interpolation involves only moduli of degree one).
The problem consists of finding a polynomial of the least possible degree, such that the polynomial and its first derivatives take given values at some fixed points.
More precisely, let
Consider the polynomial
:
This is the Taylor polynomial of order
:
Conversely, any polynomial
:
therefore
The Chinese remainder theorem asserts that there exists exactly one polynomial of degree less than the sum of the
There are several ways for computing the solution
Generalization to non-coprime moduli
The Chinese remainder theorem can be generalized to non-coprime moduli. Let
:
\begin{align}
x &\equiv a \pmod m \\
x &\equiv b \pmod n,
\end{align}
If
If one uses Bézout's identity to write
:
This defines an integer, as {{mvar|g}} divides both {{mvar|m}} and {{mvar|n}}. Otherwise, the proof is very similar to that for coprime moduli.{{sfn|Ore|1952}}
Generalization to arbitrary rings
The Chinese remainder theorem can be generalized to any ring, by using coprime ideals (also called comaximal ideals). Two ideals {{mvar|I}} and {{mvar|J}} are coprime if there are elements
Let {{math|I1, ..., Ik}} be two-sided ideals of a ring
:
R/I &\to (R/I_1) \times \cdots \times (R/I_k) \\
x \bmod I &\mapsto (x \bmod I_1,\, \ldots,\, x \bmod I_k),
\end{align}
between the quotient ring
where "
Moreover, if
:
I= I_1\cap I_2 \cap\cdots\cap I_k= I_1I_2\cdots I_k,
if {{mvar|I{{sub|i}}}} and {{mvar|I{{sub|j}}}} are coprime for all {{math|i ≠ j}}.
=Interpretation in terms of idempotents=
Let
:
be the isomorphism defined above. Let
The
In summary, this generalized Chinese remainder theorem is the equivalence between giving pairwise coprime two-sided ideals with a zero intersection, and giving central and pairwise orthogonal idempotents that sum to {{math|1}}.{{harvnb|Bourbaki, N.|1989|page=110}}
Applications
=Sequence numbering=
The Chinese remainder theorem has been used to construct a Gödel numbering for sequences, which is involved in the proof of Gödel's incompleteness theorems.
=Fast Fourier transform=
The prime-factor FFT algorithm (also called Good-Thomas algorithm) uses the Chinese remainder theorem for reducing the computation of a fast Fourier transform of size
=Encryption=
Most implementations of RSA use the Chinese remainder theorem during signing of HTTPS certificates and during decryption.
The Chinese remainder theorem can also be used in secret sharing, which consists of distributing a set of shares among a group of people who, all together (but no one alone), can recover a certain secret from the given set of shares. Each of the shares is represented in a congruence, and the solution of the system of congruences using the Chinese remainder theorem is the secret to be recovered. Secret sharing using the Chinese remainder theorem uses, along with the Chinese remainder theorem, special sequences of integers that guarantee the impossibility of recovering the secret from a set of shares with less than a certain cardinality.
=Range ambiguity resolution=
{{main article | Range ambiguity resolution }}
The range ambiguity resolution techniques used with medium pulse repetition frequency radar can be seen as a special case of the Chinese remainder theorem.
= Decomposition of surjections of finite abelian groups =
Given a surjection
:
\mathbb{Z}/n &\cong \mathbb{Z}/p_{n_1}^{a_1} \times \cdots \times \mathbb{Z}/p_{n_i}^{a_i} \\
\mathbb{Z}/m &\cong \mathbb{Z}/p_{m_1}^{b_1} \times \cdots \times \mathbb{Z}/p_{m_j}^{b_j}
\end{align}
where
:
from the original surjection, we have
:
can be defined if
These observations are pivotal for constructing the ring of profinite integers, which is given as an inverse limit of all such maps.
=Dedekind's theorem=
Dedekind's theorem on the linear independence of characters. Let {{mvar|M}} be a monoid and {{mvar|k}} an integral domain, viewed as a monoid by considering the multiplication on {{mvar|k}}. Then any finite family {{math|( fi )i∈I}} of distinct monoid homomorphisms {{math| fi : M → k}} is linearly independent. In other words, every family {{math|(αi)i∈I}} of elements {{math|αi ∈ k}} satisfying
:
must be equal to the family {{math|(0)i∈I}}.
Proof. First assume that {{mvar|k}} is a field, otherwise, replace the integral domain {{mvar|k}} by its quotient field, and nothing will change. We can linearly extend the monoid homomorphisms {{math| fi : M → k}} to {{mvar|k}}-algebra homomorphisms {{math|Fi : k[M] → k}}, where {{math|k[M]}} is the monoid ring of {{mvar|M}} over {{mvar|k}}. Then, by linearity, the condition
:
yields
:
Next, for {{math|i, j ∈ I; i ≠ j}} the two {{mvar|k}}-linear maps {{math|Fi : k[M] → k}} and {{math|Fj : k[M] → k}} are not proportional to each other. Otherwise {{math| fi }} and {{math| fj }} would also be proportional, and thus equal since as monoid homomorphisms they satisfy: {{math| fi{{hairsp}}(1) {{=}} 1 {{=}} fj{{hairsp}}(1)}}, which contradicts the assumption that they are distinct.
Therefore, the kernels {{math|Ker Fi}} and {{math|Ker Fj}} are distinct. Since {{math|k[M]/Ker Fi ≅ Fi{{hairsp}}(k[M]) {{=}} k}} is a field, {{math|Ker Fi}} is a maximal ideal of {{math|k[M]}} for every {{mvar|i}} in {{mvar|I}}. Because they are distinct and maximal the ideals {{math|Ker Fi}} and {{math|Ker Fj}} are coprime whenever {{math|i ≠ j}}. The Chinese Remainder Theorem (for general rings) yields an isomorphism:
:
\phi: k[M] / K &\to \prod_{i \in I}k[M] / \mathrm{Ker} F_i \\
\phi(x + K) &= \left(x + \mathrm{Ker} F_i\right)_{i \in I}
\end{align}
where
:
Consequently, the map
:
\Phi: k[M] &\to \prod_{i \in I}k[M]/ \mathrm{Ker} F_i \\
\Phi(x) &= \left(x + \mathrm{Ker} F_i\right)_{i \in I}
\end{align}
is surjective. Under the isomorphisms {{math|k[M]/Ker Fi → Fi{{hairsp}}(k[M]) {{=}} k,}} the map {{math|Φ}} corresponds to:
:
\psi: k[M] &\to \prod_{i \in I}k \\
\psi(x) &= \left[F_i(x)\right]_{i \in I}
\end{align}
Now,
:
yields
:
for every vector {{math|(ui)i∈I}} in the image of the map {{mvar|ψ}}. Since {{mvar|ψ}} is surjective, this means that
:
for every vector
:
Consequently, {{math|(αi)i∈I {{=}} (0)i∈I}}. QED.
See also
Notes
{{Reflist}}
References
- {{citation|first=Joseph W.|last=Dauben|editor-last=Katz|editor-first=Victor J.|contribution=Chapter 3: Chinese Mathematics|pages=187–384|publisher=Princeton University Press|year=2007|title=The Mathematics of Egypt, Mesopotamia, China, India and Islam : A Sourcebook|isbn=978-0-691-11485-9}}
- {{citation |title=Elements of the Theory of Numbers |first1=Joseph B. |last1=Dence |first2=Thomas P. |last2=Dence |publisher=Academic Press |date=1999 |url=https://books.google.com/books?id=YiYHw7evhjkC&pg=PA156 |isbn=9780122091308}}
- {{citation
| last = Duchet
| first = Pierre
| editor1-last = Graham | editor1-first = R. L.
| editor2-last = Grötschel | editor2-first = M. | editor2-link = Martin Grötschel
| editor3-last = Lovász | editor3-first = L.
| contribution = Hypergraphs
| location = Amsterdam
| mr = 1373663
| pages = 381–432
| publisher = Elsevier
| title = Handbook of combinatorics, Vol. 1, 2
| year = 1995
}}. See in particular Section 2.5, "Helly Property", [https://books.google.com/books?id=5Y9NCwlx63IC&pg=PA393 pp. 393–394].
- {{citation
| last1 = Gauss | first1 = Carl Friedrich
| translator-last = Clarke | translator-first = Arthur A.
| title = Disquisitiones Arithemeticae
| edition = Second, corrected
| publisher = Springer
| location = New York
| year = 1986
| isbn = 978-0-387-96254-2
| url = https://www.springer.com/mathematics/algebra/book/978-0-387-96254-2
}}
- {{citation|first1=Kenneth|last1=Ireland|first2=Michael|last2=Rosen|title=A Classical Introduction to Modern Number Theory|edition=2nd|publisher=Springer-Verlag|year=1990|isbn=0-387-97329-X}}
- {{citation
| last = Kak
| first = Subhash
| author-link = Subhash Kak
| issue = 1
| journal = Indian Journal of History of Science
| pages = 62–71
| title = Computational aspects of the Aryabhata algorithm
| url = http://www.ece.lsu.edu/kak/AryabhataAlgorithm.pdf
| volume = 21
| year = 1986
}}
- {{citation|first=Victor J.|last=Katz|title=A History of Mathematics / An Introduction|edition=2nd|year=1998|publisher=Addison Wesley Longman|isbn=978-0-321-01618-8|url-access=registration|url=https://archive.org/details/historyofmathema00katz}}
- {{citation |first=Ulrich |last=Libbrecht |title=Chinese Mathematics in the Thirteenth Century: the "Shu-shu Chiu-chang" of Ch'in Chiu-shao |publisher=Dover Publications Inc |isbn=978-0-486-44619-6 |date=1973}}
- {{citation
| last = Ore | first = Øystein | author-link = Øystein Ore
| doi = 10.2307/2306804
| journal = The American Mathematical Monthly
| mr = 48481
| pages = 365–370
| title = The general Chinese remainder theorem
| volume = 59
| year = 1952| issue = 6 | jstor = 2306804 }}
- {{citation|first=Oystein|last=Ore|title=Number Theory and Its History|year=1988|orig-year=1948|publisher=Dover|isbn=978-0-486-65620-5|url-access=registration|url=https://archive.org/details/numbertheoryitsh0000orey}}
- {{citation |title=Fibonacci's Liber Abaci |last1=Pisano |first1=Leonardo |author-link1 = Leonardo Pisano |translator-last=Sigler |translator-first=Laurence E. |publisher=Springer-Verlag |year=2002 |isbn=0-387-95419-8 |url=https://www.springer.com/mathematics/book/978-0-387-40737-1 |pages=402–403}}
- {{citation|first=Kenneth H.|last=Rosen|title=Elementary Number Theory and its Applications|edition=3rd|year=1993|publisher=Addison-Wesley|isbn=978-0201-57889-8}}
- {{Citation|title= Representing Finite Groups, A Semisimple Introduction |last=Sengupta |first=Ambar N.|year= 2012 |publisher=Springer |isbn=978-1-4614-1232-8}}
- {{citation|author=Bourbaki, N.|title=Algebra I|publisher=Springer|year=1989|isbn=3-540-64243-9|url=https://books.google.com/books?id=STS9aZ6F204C&q=%22associative+algebra%22}}
Further reading
- {{citation
| last1 = Cormen
| first1 = Thomas H.
| author-link1 = Thomas H. Cormen
| last2 = Leiserson
| first2 = Charles E.
| author-link2 = Charles E. Leiserson
| last3 = Rivest
| first3 = Ronald L.
| author-link3 = Ronald L. Rivest
| last4 = Stein
| first4 = Clifford
| author-link4 = Clifford Stein
| year = 2001
| title = Introduction to Algorithms
| edition = Second
| publisher = MIT Press and McGraw-Hill
| isbn = 0-262-03293-7
| title-link = Introduction to Algorithms
}}. See Section 31.5: The Chinese remainder theorem, pp. 873–876.
- {{citation
| title = Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography
| last1 = Ding
| first1 = Cunsheng
| last2 = Pei
| first2 = Dingyi
| last3 = Salomaa
| first3 = Arto
| publisher = World Scientific Publishing
| year = 1996
| isbn = 981-02-2827-9
| url = https://archive.org/details/chineseremainder0000ding/page/1
| pages = [https://archive.org/details/chineseremainder0000ding/page/1 1–213]
}}
- {{citation
| title = Algebra
| last = Hungerford
| first = Thomas W.
| author-link = Thomas W. Hungerford
| publisher = Springer-Verlag
| series = Graduate Texts in Mathematics, Vol. 73
| year = 1974
| isbn = 978-1-4612-6101-8
| url = https://www.springer.com/mathematics/algebra/book/978-0-387-90518-1
| pages = 131–132
}}
- {{citation
| last = Knuth
| first = Donald
| author-link = Donald Knuth
| year = 1997
| title = The Art of Computer Programming
| volume = 2: Seminumerical Algorithms
| edition = Third
| publisher = Addison-Wesley
| isbn = 0-201-89684-2
| title-link = The Art of Computer Programming
}}. See Section 4.3.2 (pp. 286–291), exercise 4.6.2–3 (page 456).
External links
- {{springer |title = Chinese remainder theorem |id = p/c022120}}
- {{MathWorld |urlname = ChineseRemainderTheorem |title = Chinese Remainder Theorem|mode=cs2}}
- {{planetmath |urlname = ChineseRemainderTheorem |title = Chinese Remainder Theorem}}
- [http://ctext.org/sunzi-suan-jing Full text of the Sun-tzu Suan-ching] (Chinese){{snd}} Chinese Text Project
{{Number theory}}
{{authority control}}