Cryptanalysis of the public key encryption based on multiple chaotic systems

From MaRDI portal
Revision as of 21:02, 2 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2425485

DOI10.1016/j.chaos.2006.09.047zbMath1134.94371OpenAlexW1982179579WikidataQ123127705 ScholiaQ123127705MaRDI QIDQ2425485

Linhua Zhang

Publication date: 5 May 2008

Published in: Chaos, Solitons and Fractals (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.chaos.2006.09.047




Related Items (31)

A signature algorithm based on chaotic maps and factoring problemsProvably secure extended chaotic map-based three-party key agreement protocols using password authenticationA provable privacy-protection system for multi-server environmentA provable authenticated key agreement protocol with privacy protection using smart card based on chaotic mapsRobust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacyColor image encryption based on one-time keys and robust chaotic mapsCryptanalysis and improvement of an extended chaotic maps-based key agreement protocolEfficiency and security problems of anonymous key agreement protocol based on chaotic mapsA three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic mapsCryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomialsApplying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocolA new digital signature scheme based on chaotic mapsChaotic maps-based three-party password-authenticated key agreement schemeA new three-party-authenticated key agreement scheme based on chaotic maps without password tableCryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cardsA novel quantum dragonfly multi-key exchange protocol beyond conventional attacksEnhancing the security of password authenticated key agreement protocols based on chaotic mapsDesign and analysis of a three party password-based authenticated key exchange protocol using extended chaotic mapsAn efficient online/offline ID-based short signature procedure using extended chaotic mapsCryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testingAn anonymous key agreement protocol based on chaotic mapsAn efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic mapAn improved key agreement protocol based on chaosAn extended chaotic-maps-based protocol with key agreement for multiserver environmentsDesign and analysis of a chaotic maps-based three-party authenticated key agreement protocolAn extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage servicesAn efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystemImprovement in new three-party-authenticated key agreement scheme based on chaotic maps without password tableA revised key agreement protocol based on chaotic mapsCryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocolProvably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model



Cites Work


This page was built for publication: Cryptanalysis of the public key encryption based on multiple chaotic systems