Login / Signup
Cryptanalysis of a Key Authentication Scheme Based on the Chinese Remainder Theorem and Discrete Logarithms.
Alberto Peinado
Published in:
SOCO-CISIS-ICEUTE (2016)
Keyphrases
</>
authentication scheme
secret key
chinese remainder theorem
smart card
user authentication
low cost
signature scheme
public key
image authentication