1.
Kumaraswamy P, Rao CG, Janaki V, Prashanth K. Key Authentication Scheme-based on Discrete Logarithms and Chinese Remainder Theorem. Def. Sc. J. [Internet]. 2016 Oct. 31 [cited 2025 Jun. 15];66(6):590-3. Available from: https://publications.drdo.gov.in/ojs/index.php/dsj/article/view/9649