[1]
P. Kumaraswamy, C. Rao, V. Janaki, and K. Prashanth, “Key Authentication Scheme-based on Discrete Logarithms and Chinese Remainder Theorem”, DSJ, vol. 66, no. 6, pp. 590-593, Oct. 2016.