Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
From MaRDI portal
Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Cryptography (94A60) Dynamical systems involving maps of the interval (37E05) Communication networks in operations research (90B18) Network design and communication in computer systems (68M10) Authentication, digital signatures and secret sharing (94A62)
Recommendations
- Chaotic maps-based password-authenticated key agreement using smart cards
- Improved chaotic maps-based password-authenticated key agreement using smart cards
- Enhancing the security of password authenticated key agreement protocols based on chaotic maps
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
Cites work
- scientific article; zbMATH DE number 1722690 (Why is no real title available?)
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- scientific article; zbMATH DE number 2009973 (Why is no real title available?)
- scientific article; zbMATH DE number 1759313 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A block cipher with dynamic S-boxes based on tent map
- A chaotic image encryption algorithm based on perceptron model
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- A new identity based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields \(Z_p\)
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- An anonymous key agreement protocol based on chaotic maps
- An extended chaotic maps-based key agreement protocol with user anonymity
- An improved chaotic cryptosystem with external key
- An improved key agreement protocol based on chaos
- Analysis and improvement of a chaos-based hash function construction
- Authenticated key exchange secure against dictionary attacks
- Breaking a chaotic image encryption algorithm based on perceptron model
- Chaotic maps-based password-authenticated key agreement using smart cards
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos
- Cryptanalysis of a provably secure cross-realm client-to-client password-authenticated key agreement protocol of CANS '09
- Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- Examining smart-card security under the threat of power analysis attacks
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
- On Establishing and Fixing a Parallel Session Attack in a Security Protocol
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- Security of a key agreement protocol based on chaotic maps
- Security of public-key cryptosystems based on Chebyshev polynomials
- Three weaknesses in a simple three-party key exchange protocol
Cited in
(9)- Improved chaotic maps-based password-authenticated key agreement using smart cards
- Enhancing the security of password authenticated key agreement protocols based on chaotic maps
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- Chaotic maps-based password-authenticated key agreement using smart cards
- Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
- scientific article; zbMATH DE number 5507095 (Why is no real title available?)
- Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card
- A provable authenticated key agreement protocol with privacy protection using smart card based on chaotic maps
- Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
This page was built for publication: Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q493916)