Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
From MaRDI portal
Publication:2259603
DOI10.1007/s11071-013-1204-1zbMath1306.94102OpenAlexW2083746992MaRDI QIDQ2259603
Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari
Publication date: 5 March 2015
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-013-1204-1
Related Items (4)
Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation ⋮ GPUs and chaos: a new true random number generator ⋮ Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card ⋮ Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table
Cites Work
- Unnamed Item
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- A new image encryption algorithm based on hyper-chaos
- Vulnerability of two multiple-key agreement protocols
- Cryptography based on chaotic random maps with position dependent weighting probabilities
- A fast image encryption scheme based on chaotic standard map
- Chaotic map based key agreement with/out clock synchronization
- A block cipher with dynamic S-boxes based on tent map
- Analysis and improvement of a chaos-based hash function construction
- An anonymous key agreement protocol based on chaotic maps
- A chaos-based hash function with both modification detection and localization capabilities
- A speech encryption using fractional chaotic systems
- Security of public key encryption technique based on multiple chaotic systems
- Security of a key agreement protocol based on chaotic maps
- One-way hash function construction based on the chaotic map with changeable-parameter
- An efficient entire chaos-based scheme for deniable authentication
- Protocols for authentification and key establishment
- A symmetric image encryption scheme based on 3D chaotic cat maps
- An extended chaotic maps-based key agreement protocol with user anonymity
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- Chaos-based image encryption algorithm
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- A chaotic image encryption algorithm based on perceptron model
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
- Security problems with a chaos-based deniable authentication scheme
- Secure group key agreement protocol based on chaotic hash
- Security of public-key cryptosystems based on Chebyshev polynomials
This page was built for publication: Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing