Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
From MaRDI portal
Publication:1749189
DOI10.1016/J.INS.2015.03.050zbMATH Open1387.94084OpenAlexW1982339016WikidataQ114666912 ScholiaQ114666912MaRDI QIDQ1749189FDOQ1749189
Authors: SK Hafizul Islam
Publication date: 16 May 2018
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2015.03.050
Recommendations
- An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
- Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
- A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
- Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
Cites Work
- Key agreement protocols and their security analysis
- Title not available (Why is that?)
- A symmetric image encryption scheme based on 3D chaotic cat maps
- A speech encryption using fractional chaotic systems
- One-way hash function construction based on the chaotic map with changeable-parameter
- An extended chaotic maps-based key agreement protocol with user anonymity
- Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol
- An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- A new digital signature scheme based on chaotic maps
- Chaotic maps-based three-party password-authenticated key agreement scheme
- Chaotic maps-based password-authenticated key agreement using smart cards
- Security of public-key cryptosystems based on Chebyshev polynomials
- Color image encryption based on one-time keys and robust chaotic maps
- Analysis and improvement of a chaos-based hash function construction
- An anonymous key agreement protocol based on chaotic maps
- A chaos-based hash function with both modification detection and localization capabilities
- An improved key agreement protocol based on chaos
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- A chaotic image encryption algorithm based on perceptron model
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
- Secure group key agreement protocol based on chaotic hash
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- Examining smart-card security under the threat of power analysis attacks
- Enhancing the security of password authenticated key agreement protocols based on chaotic maps
- A block cipher with dynamic S-boxes based on tent map
- An efficient certificateless two-party authenticated key agreement protocol
- On the security of public key protocols
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- Security of public key encryption technique based on multiple chaotic systems
- An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
- An efficient and secure strong designated verifier signature without bilinear pairings
- Secure chaotic system with application to chaotic ciphers
- A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
- Design of improved password authentication and update scheme based on elliptic curve cryptography
- Improving two novel three-party encrypted key exchange protocols with perfect forward secrecy
Cited In (11)
- A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
- Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
- Security on ``Secure remote login scheme with password and smart card update facilities
- A new three-party-authenticated key agreement scheme based on chaotic maps without password table
- Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol
- Secure and efficient two-factor authentication protocol using RSA signature for multi-server environments
- Chaos synchronization of fractional chaotic maps based on the stability condition
- An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
Uses Software
This page was built for publication: Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1749189)