Cryptanalysis of the public key encryption based on multiple chaotic systems
From MaRDI portal
Publication:2425485
Recommendations
Cites work
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- A block cipher based on a suitable use of the chaotic standard map
- A combined chaotic cryptographic and hashing scheme
- Additive mixing modulation for public key encryption based on distributed dynamics
- Baptista-type chaotic cryptosystems: problems and countermeasures
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Cryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithm
- Cryptography with chaos
- Public-key encryption with chaos
- Security analysis of chaotic communication systems based on Volterra--Wiener--Korenberg model
- Security of public-key cryptosystems based on Chebyshev polynomials
Cited in
(36)- A new three-party-authenticated key agreement scheme based on chaotic maps without password table
- Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
- Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- Enhancing the security of password authenticated key agreement protocols based on chaotic maps
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- A signature algorithm based on chaotic maps and factoring problems
- Cryptanalysis of multiple chaotic systems based public key encryption technique
- An efficient online/offline ID-based short signature procedure using extended chaotic maps
- Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- An extended chaotic-maps-based protocol with key agreement for multiserver environments
- CRYPTANALYSIS OF A NEW CHAOTIC CRYPTOSYSTEM BASED ON ERGODICITY
- An anonymous key agreement protocol based on chaotic maps
- Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol
- An improved key agreement protocol based on chaos
- A revised key agreement protocol based on chaotic maps
- A novel quantum dragonfly multi-key exchange protocol beyond conventional attacks
- Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table
- Security of public key encryption technique based on multiple chaotic systems
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- Color image encryption based on one-time keys and robust chaotic maps
- A provable privacy-protection system for multi-server environment
- Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
- A provable authenticated key agreement protocol with privacy protection using smart card based on chaotic maps
- A new digital signature scheme based on chaotic maps
- Chaotic maps-based three-party password-authenticated key agreement scheme
- An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services
- Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
- Public-key encryption with chaos
- Cryptanalysis of a chaotic encryption system
This page was built for publication: Cryptanalysis of the public key encryption based on multiple chaotic systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2425485)