Cryptanalysis of the public key encryption based on multiple chaotic systems
From MaRDI portal
Publication:2425485
DOI10.1016/j.chaos.2006.09.047zbMath1134.94371OpenAlexW1982179579WikidataQ123127705 ScholiaQ123127705MaRDI QIDQ2425485
Publication date: 5 May 2008
Published in: Chaos, Solitons and Fractals (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.chaos.2006.09.047
Related Items (31)
A signature algorithm based on chaotic maps and factoring problems ⋮ Provably secure extended chaotic map-based three-party key agreement protocols using password authentication ⋮ A provable privacy-protection system for multi-server environment ⋮ A provable authenticated key agreement protocol with privacy protection using smart card based on chaotic maps ⋮ Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy ⋮ Color image encryption based on one-time keys and robust chaotic maps ⋮ Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol ⋮ Efficiency and security problems of anonymous key agreement protocol based on chaotic maps ⋮ A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps ⋮ Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials ⋮ Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol ⋮ A new digital signature scheme based on chaotic maps ⋮ Chaotic maps-based three-party password-authenticated key agreement scheme ⋮ A new three-party-authenticated key agreement scheme based on chaotic maps without password table ⋮ Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards ⋮ A novel quantum dragonfly multi-key exchange protocol beyond conventional attacks ⋮ Enhancing the security of password authenticated key agreement protocols based on chaotic maps ⋮ Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps ⋮ An efficient online/offline ID-based short signature procedure using extended chaotic maps ⋮ Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing ⋮ An anonymous key agreement protocol based on chaotic maps ⋮ An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map ⋮ An improved key agreement protocol based on chaos ⋮ An extended chaotic-maps-based protocol with key agreement for multiserver environments ⋮ Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol ⋮ An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services ⋮ An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem ⋮ Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table ⋮ A revised key agreement protocol based on chaotic maps ⋮ Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol ⋮ Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
Cites Work
- Unnamed Item
- Security analysis of chaotic communication systems based on Volterra--Wiener--Korenberg model
- Cryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithm
- A combined chaotic cryptographic and hashing scheme
- Cryptography with chaos
- Baptista-type chaotic cryptosystems: problems and countermeasures
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- A block cipher based on a suitable use of the chaotic standard map
- Additive mixing modulation for public key encryption based on distributed dynamics
- Security of public-key cryptosystems based on Chebyshev polynomials
- Public-key encryption with chaos
This page was built for publication: Cryptanalysis of the public key encryption based on multiple chaotic systems