• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Cryptanalysis of a Key Authentication Scheme Based on the Chinese Remainder Theorem and Discrete Logarithms.

Alberto Peinado
Published in: SOCO-CISIS-ICEUTE (2016)
Keyphrases
  • authentication scheme
  • secret key
  • chinese remainder theorem
  • smart card
  • user authentication
  • low cost
  • signature scheme
  • public key
  • image authentication