Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
From MaRDI portal
Publication:2436975
DOI10.1007/S11071-013-0979-4zbMath1281.94067OpenAlexW2025782749MaRDI QIDQ2436975
Mingguan Li, Peng Gong, Ping Li, Shuai Li, Fengjun Zhao
Publication date: 27 February 2014
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-013-0979-4
Cryptography (94A60) Orthogonal polynomials and functions of hypergeometric type (Jacobi, Laguerre, Hermite, Askey scheme, etc.) (33C45)
Related Items (14)
Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card ⋮ Provably secure extended chaotic map-based three-party key agreement protocols using password authentication ⋮ Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy ⋮ Chaotic maps-based three-party password-authenticated key agreement scheme ⋮ Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card ⋮ A new three-party-authenticated key agreement scheme based on chaotic maps without password table ⋮ Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards ⋮ Compressive sensing using chaotic sequence based on Chebyshev map ⋮ Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps ⋮ A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps ⋮ Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol ⋮ Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table ⋮ An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps ⋮ Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
Cites Work
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- An efficient certificateless two-party authenticated key agreement protocol
- A new two-round certificateless authenticated key agreement protocol without bilinear pairings
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- Strongly secure identity-based authenticated key agreement protocols
- A block cipher with dynamic S-boxes based on tent map
- An anonymous key agreement protocol based on chaotic maps
- A chaos-based hash function with both modification detection and localization capabilities
- A speech encryption using fractional chaotic systems
- Security of a key agreement protocol based on chaotic maps
- A symmetric image encryption scheme based on 3D chaotic cat maps
- An extended chaotic maps-based key agreement protocol with user anonymity
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- Note on: ``Design of improved password authentication and update scheme based on elliptic curve cryptography
- Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- A chaotic image encryption algorithm based on perceptron model
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
- Identity-based authenticated key agreement protocol based on Weil pairing
- New directions in cryptography
This page was built for publication: Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials