Login / Signup

A new key authentication scheme based on discrete logarithms.

Cheng-Chi LeeMin-Shiang HwangLi-Hua Li
Published in: Appl. Math. Comput. (2003)
Keyphrases
  • authentication scheme
  • image encryption
  • smart card
  • user authentication
  • secret key
  • high security
  • security analysis
  • security flaws
  • image authentication
  • real time
  • authentication protocol