Cryptanalysis of the public key encryption based on multiple chaotic systems
From MaRDI portal
Publication:2425485
DOI10.1016/J.CHAOS.2006.09.047zbMATH Open1134.94371OpenAlexW1982179579WikidataQ123127705 ScholiaQ123127705MaRDI QIDQ2425485FDOQ2425485
Publication date: 5 May 2008
Published in: Chaos, Solitons and Fractals (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.chaos.2006.09.047
Cites Work
- Title not available (Why is that?)
- Cryptography with chaos
- A block cipher based on a suitable use of the chaotic standard map
- A combined chaotic cryptographic and hashing scheme
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Security of public-key cryptosystems based on Chebyshev polynomials
- Public-key encryption with chaos
- Baptista-type chaotic cryptosystems: problems and countermeasures
- Security analysis of chaotic communication systems based on Volterra--Wiener--Korenberg model
- Additive mixing modulation for public key encryption based on distributed dynamics
- Cryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithm
Cited In (34)
- Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- An extended chaotic-maps-based protocol with key agreement for multiserver environments
- An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services
- Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
- A novel quantum dragonfly multi-key exchange protocol beyond conventional attacks
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- Security of public key encryption technique based on multiple chaotic systems
- A revised key agreement protocol based on chaotic maps
- A provable privacy-protection system for multi-server environment
- Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
- A provable authenticated key agreement protocol with privacy protection using smart card based on chaotic maps
- Color image encryption based on one-time keys and robust chaotic maps
- Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
- An anonymous key agreement protocol based on chaotic maps
- An improved key agreement protocol based on chaos
- A new three-party-authenticated key agreement scheme based on chaotic maps without password table
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Enhancing the security of password authenticated key agreement protocols based on chaotic maps
- Cryptanalysis of a chaotic encryption system
- A signature algorithm based on chaotic maps and factoring problems
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table
- CRYPTANALYSIS OF A NEW CHAOTIC CRYPTOSYSTEM BASED ON ERGODICITY
- Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- An efficient online/offline ID-based short signature procedure using extended chaotic maps
- Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- A new digital signature scheme based on chaotic maps
- Chaotic maps-based three-party password-authenticated key agreement scheme
This page was built for publication: Cryptanalysis of the public key encryption based on multiple chaotic systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2425485)