Cryptanalysis of a Key Authentication Scheme Based on the Chinese Remainder Theorem and Discrete Logarithms | Publicación