An efficient entire chaos-based scheme for deniable authentication
From MaRDI portal
Publication:1776630
DOI10.1016/j.chaos.2004.06.069zbMath1070.94023OpenAlexW2014783154MaRDI QIDQ1776630
Publication date: 12 May 2005
Published in: Chaos, Solitons and Fractals (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.chaos.2004.06.069
Data encryption (aspects in computer science) (68P25) Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Authentication, digital signatures and secret sharing (94A62)
Related Items (13)
Secure group key agreement protocol based on chaotic hash ⋮ On the security of a novel key agreement protocol based on chaotic maps ⋮ Applications of tripled chaotic maps in cryptography ⋮ Algebraic generalization of Diffie-Hellman key exchange ⋮ An extended chaotic maps-based key agreement protocol with user anonymity ⋮ Chaotic maps-based three-party password-authenticated key agreement scheme ⋮ Security of public key encryption technique based on multiple chaotic systems ⋮ A novel algorithm for image encryption based on mixture of chaotic maps ⋮ Security of a key agreement protocol based on chaotic maps ⋮ Security problems with a chaos-based deniable authentication scheme ⋮ Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing ⋮ Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers ⋮ Security analysis of chaotic communication systems based on Volterra--Wiener--Korenberg model
Cites Work
This page was built for publication: An efficient entire chaos-based scheme for deniable authentication