Login / Signup
Key authentication scheme for cryptosystems based on discrete logarithms.
Gwoboa Horng
Chuan-Sheng Yang
Published in:
Comput. Commun. (1996)
Keyphrases
</>
authentication scheme
secret key
secure communication
smart card
private key
image encryption
public key
user authentication
high security
elliptic curve cryptography
image authentication
security flaws
key management
signature scheme
authentication protocol
elliptic curve
operating system
real time