Security of a key agreement protocol based on chaotic maps

From MaRDI portal
Revision as of 18:44, 30 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:953624

DOI10.1016/J.CHAOS.2007.01.017zbMath1146.94304OpenAlexW2034523001MaRDI QIDQ953624

Song Han

Publication date: 6 November 2008

Published in: Chaos, Solitons and Fractals (Search for Journal in Brave)

Full work available at URL: http://hdl.handle.net/20.500.11937/40506




Related Items (21)

Secure group key agreement protocol based on chaotic hashOn the security of a novel key agreement protocol based on chaotic mapsAn extended chaotic maps-based key agreement protocol with user anonymityCryptanalysis and improvement of an extended chaotic maps-based key agreement protocolThe three-party quantum key agreement protocol with quantum Fourier transformA new identity based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields \(Z_p\)Efficiency and security problems of anonymous key agreement protocol based on chaotic mapsSecurity improvement on an anonymous key agreement protocol based on chaotic mapsCryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomialsChaotic maps-based three-party password-authenticated key agreement schemeCryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cardsEnhancing the security of password authenticated key agreement protocols based on chaotic mapsUsing time-stamp to improve the security of a chaotic maps-based key agreement protocolCryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testingChaotic map based key agreement with/out clock synchronizationAn anonymous key agreement protocol based on chaotic mapsAn efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic mapAn improved key agreement protocol based on chaosDesign and analysis of a chaotic maps-based three-party authenticated key agreement protocolA revised key agreement protocol based on chaotic mapsProvably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model




Cites Work




This page was built for publication: Security of a key agreement protocol based on chaotic maps