Chaotic maps-based three-party password-authenticated key agreement scheme
From MaRDI portal
Publication:2441996
DOI10.1007/s11071-013-1020-7zbMath1284.94148OpenAlexW2010397518WikidataQ114689444 ScholiaQ114689444MaRDI QIDQ2441996
Qi Xie, Jianmin Zhao, Xiu Yuan Yu
Publication date: 31 March 2014
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-013-1020-7
Related Items
Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card, Provably secure extended chaotic map-based three-party key agreement protocols using password authentication, A provable authenticated key agreement protocol with privacy protection using smart card based on chaotic maps, Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy, The three-party quantum key agreement protocol with quantum Fourier transform, Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card, A new three-party-authenticated key agreement scheme based on chaotic maps without password table, Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps, A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps, Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol, Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table, An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps, Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
Uses Software
Cites Work
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- Chaotic maps-based password-authenticated key agreement using smart cards
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- Chaos-based cryptography.
- On the security of a novel key agreement protocol based on chaotic maps
- Cryptography based on chaotic random maps with position dependent weighting probabilities
- Chaotic map based key agreement with/out clock synchronization
- An anonymous key agreement protocol based on chaotic maps
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- A chaos-based hash function with both modification detection and localization capabilities
- An improved key agreement protocol based on chaos
- Security of a key agreement protocol based on chaotic maps
- An efficient entire chaos-based scheme for deniable authentication
- Discrete chaotic cryptography using external key
- Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol
- Cryptography with chaos
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
- Security problems with a chaos-based deniable authentication scheme
- Secure group key agreement protocol based on chaotic hash
- Security of public-key cryptosystems based on Chebyshev polynomials