A revised key agreement protocol based on chaotic maps
From MaRDI portal
Publication:2346824
DOI10.1007/s11071-014-1467-1zbMath1314.94103OpenAlexW1966441419MaRDI QIDQ2346824
Abdollah Jabbari, Jamshid Bagherzadeh
Publication date: 4 June 2015
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-014-1467-1
Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card ⋮ Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table
Cites Work
- Unnamed Item
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- On the security of a novel key agreement protocol based on chaotic maps
- Chaotic map based key agreement with/out clock synchronization
- Analysis and improvement of a chaos-based hash function construction
- An anonymous key agreement protocol based on chaotic maps
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- A chaos-based hash function with both modification detection and localization capabilities
- A new compound mode of confusion and diffusion for block encryption of image based on chaos
- An improved key agreement protocol based on chaos
- A speech encryption using fractional chaotic systems
- Security of public key encryption technique based on multiple chaotic systems
- Security of a key agreement protocol based on chaotic maps
- An extended chaotic maps-based key agreement protocol with user anonymity
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- A chaotic image encryption algorithm based on perceptron model
- Secure group key agreement protocol based on chaotic hash
- Security of public-key cryptosystems based on Chebyshev polynomials
This page was built for publication: A revised key agreement protocol based on chaotic maps