Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps (Q1749189): Difference between revisions

From MaRDI portal
Created claim: Wikidata QID (P12): Q114666912, #quickstatements; #temporary_batch_1711486624475
Normalize DOI.
 
(One intermediate revision by one other user not shown)
Property / DOI
 
Property / DOI: 10.1016/j.ins.2015.03.050 / rank
Normal rank
 
Property / cites work
 
Property / cites work: Security of public-key cryptosystems based on Chebyshev polynomials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key agreement protocols and their security analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: A new digital signature scheme based on chaotic maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: A symmetric image encryption scheme based on 3D chaotic cat maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analysis and improvement of a chaos-based hash function construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chaotic maps-based password-authenticated key agreement using smart cards / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure group key agreement protocol based on chaotic hash / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments / rank
 
Normal rank
Property / cites work
 
Property / cites work: An efficient certificateless two-party authenticated key agreement protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: AN EFFICIENT AND SECURE STRONG DESIGNATED VERIFIER SIGNATURE SCHEME WITHOUT BILINEAR PAIRINGS / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design of improved password authentication and update scheme based on elliptic curve cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A speech encryption using fractional chaotic systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: An extended chaotic maps-based key agreement protocol with user anonymity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Enhancing the security of password authenticated key agreement protocols based on chaotic maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: IMPROVING TWO NOVEL THREE-PARTY ENCRYPTED KEY EXCHANGE PROTOCOLS WITH PERFECT FORWARD SECRECY / rank
 
Normal rank
Property / cites work
 
Property / cites work: A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Color image encryption based on one-time keys and robust chaotic maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Examining smart-card security under the threat of power analysis attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: A secure effective key management scheme for dynamic access control in a large leaf class hierarchy / rank
 
Normal rank
Property / cites work
 
Property / cites work: An anonymous key agreement protocol based on chaotic maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: A chaotic maps-based authenticated key agreement protocol with strong anonymity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure chaotic system with application to chaotic ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of public key encryption technique based on multiple chaotic systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: A chaotic image encryption algorithm based on perceptron model / rank
 
Normal rank
Property / cites work
 
Property / cites work: An improved key agreement protocol based on chaos / rank
 
Normal rank
Property / cites work
 
Property / cites work: A block cipher with dynamic S-boxes based on tent map / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using time-stamp to improve the security of a chaotic maps-based key agreement protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: One-way hash function construction based on the chaotic map with changeable-parameter / rank
 
Normal rank
Property / cites work
 
Property / cites work: A chaos-based hash function with both modification detection and localization capabilities / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chaotic maps-based three-party password-authenticated key agreement scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security improvement on an anonymous key agreement protocol based on chaotic maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the public key encryption based on multiple chaotic systems / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.INS.2015.03.050 / rank
 
Normal rank

Latest revision as of 08:03, 11 December 2024

scientific article
Language Label Description Also known as
English
Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
scientific article

    Statements

    Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps (English)
    0 references
    0 references
    16 May 2018
    0 references
    chaotic map
    0 references
    smartcard
    0 references
    password
    0 references
    hash function
    0 references
    session key
    0 references
    key exchange protocol
    0 references
    0 references

    Identifiers