An efficient entire chaos-based scheme for deniable authentication
From MaRDI portal
Publication:1776630
DOI10.1016/j.chaos.2004.06.069zbMath1070.94023MaRDI QIDQ1776630
Publication date: 12 May 2005
Published in: Chaos, Solitons and Fractals (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.chaos.2004.06.069
68P25: Data encryption (aspects in computer science)
37D45: Strange attractors, chaotic dynamics of systems with hyperbolic behavior
94A62: Authentication, digital signatures and secret sharing
Related Items
On the security of a novel key agreement protocol based on chaotic maps, Applications of tripled chaotic maps in cryptography, Security analysis of chaotic communication systems based on Volterra--Wiener--Korenberg model, Security of public key encryption technique based on multiple chaotic systems, Security of a key agreement protocol based on chaotic maps, An extended chaotic maps-based key agreement protocol with user anonymity, Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing, Algebraic generalization of Diffie-Hellman key exchange, Chaotic maps-based three-party password-authenticated key agreement scheme, A novel algorithm for image encryption based on mixture of chaotic maps, Security problems with a chaos-based deniable authentication scheme, Secure group key agreement protocol based on chaotic hash, Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers
Cites Work