Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
From MaRDI portal
Recommendations
- Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
- A new three-party-authenticated key agreement scheme based on chaotic maps without password table
- Chaotic maps-based three-party password-authenticated key agreement scheme
- Enhancing the security of password authenticated key agreement protocols based on chaotic maps
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
Cites work
- A block cipher with dynamic S-boxes based on tent map
- A chaos-based hash function with both modification detection and localization capabilities
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- A logic of authentication
- A speech encryption using fractional chaotic systems
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- An anonymous key agreement protocol based on chaotic maps
- An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- An efficient certificateless two-party authenticated key agreement protocol
- An extended chaotic maps-based key agreement protocol with user anonymity
- An extended chaotic-maps-based protocol with key agreement for multiserver environments
- An improved key agreement protocol based on chaos
- An improved two-party identity-based authenticated key agreement protocol using pairings
- Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol
- Chaotic map based key agreement with/out clock synchronization
- Chaotic maps-based three-party password-authenticated key agreement scheme
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- Group key agreement for secure group communication in dynamic peer systems
- On the security of a novel key agreement protocol based on chaotic maps
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- Security of a key agreement protocol based on chaotic maps
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
Cited in
(9)- A new three-party-authenticated key agreement scheme based on chaotic maps without password table
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Enhancing the security of password authenticated key agreement protocols based on chaotic maps
- A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
- Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
- A provable authenticated key agreement protocol with privacy protection using smart card based on chaotic maps
- Chaotic maps-based three-party password-authenticated key agreement scheme
- An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
- The design of keyed hash function based on CNN-MD structure
This page was built for publication: Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2520636)