Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
From MaRDI portal
Publication:1749189
DOI10.1016/j.ins.2015.03.050zbMath1387.94084OpenAlexW1982339016WikidataQ114666912 ScholiaQ114666912MaRDI QIDQ1749189
Publication date: 16 May 2018
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2015.03.050
Related Items (3)
Chaos synchronization of fractional chaotic maps based on the stability condition ⋮ Security on “Secure Remote Login Scheme with Password and Smart Card Update Facilities” ⋮ Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments
Uses Software
Cites Work
- Unnamed Item
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- An efficient certificateless two-party authenticated key agreement protocol
- Chaotic maps-based password-authenticated key agreement using smart cards
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
- Enhancing the security of password authenticated key agreement protocols based on chaotic maps
- Color image encryption based on one-time keys and robust chaotic maps
- A block cipher with dynamic S-boxes based on tent map
- Analysis and improvement of a chaos-based hash function construction
- An anonymous key agreement protocol based on chaotic maps
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- A chaos-based hash function with both modification detection and localization capabilities
- An improved key agreement protocol based on chaos
- A speech encryption using fractional chaotic systems
- Security of public key encryption technique based on multiple chaotic systems
- One-way hash function construction based on the chaotic map with changeable-parameter
- A symmetric image encryption scheme based on 3D chaotic cat maps
- An extended chaotic maps-based key agreement protocol with user anonymity
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol
- An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- A chaotic image encryption algorithm based on perceptron model
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- A new digital signature scheme based on chaotic maps
- Chaotic maps-based three-party password-authenticated key agreement scheme
- Design of improved password authentication and update scheme based on elliptic curve cryptography
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
- Secure chaotic system with application to chaotic ciphers
- A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
- Secure group key agreement protocol based on chaotic hash
- IMPROVING TWO NOVEL THREE-PARTY ENCRYPTED KEY EXCHANGE PROTOCOLS WITH PERFECT FORWARD SECRECY
- On the security of public key protocols
- Key agreement protocols and their security analysis
- Examining smart-card security under the threat of power analysis attacks
- Security of public-key cryptosystems based on Chebyshev polynomials
- AN EFFICIENT AND SECURE STRONG DESIGNATED VERIFIER SIGNATURE SCHEME WITHOUT BILINEAR PAIRINGS
This page was built for publication: Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps