Security problems with a chaos-based deniable authentication scheme
From MaRDI portal
Publication:2484726
DOI10.1016/j.chaos.2004.12.023zbMath1077.94019arXivnlin/0412023OpenAlexW2042416300MaRDI QIDQ2484726
Publication date: 1 August 2005
Published in: Chaos, Solitons and Fractals (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/nlin/0412023
Related Items (14)
Improved digital signature protocol using iterated function systems ⋮ Secure group key agreement protocol based on chaotic hash ⋮ On the security of a novel key agreement protocol based on chaotic maps ⋮ Applications of tripled chaotic maps in cryptography ⋮ Cryptanalysis of a computer cryptography scheme based on a filter bank ⋮ Comparison of different chaotic maps in particle swarm optimization algorithm for long-term cascaded hydroelectric system scheduling ⋮ Hash function based on piecewise nonlinear chaotic map ⋮ Chaotic maps-based three-party password-authenticated key agreement scheme ⋮ Security of public key encryption technique based on multiple chaotic systems ⋮ Security of a key agreement protocol based on chaotic maps ⋮ Using time-stamp to improve the security of a chaotic maps-based key agreement protocol ⋮ Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing ⋮ Chaotic map based key agreement with/out clock synchronization ⋮ Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers
Cites Work
- Unnamed Item
- Cryptography with cycling chaos
- A fast chaotic cryptographic scheme with dynamic look-up table
- Cryptosystem using chaotic keys
- An efficient entire chaos-based scheme for deniable authentication
- Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems
- A combined chaotic cryptographic and hashing scheme
- Cryptanalysis of an ergodic chaotic cipher
- Cryptography with chaos
- Baptista-type chaotic cryptosystems: problems and countermeasures
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Chaos and cryptography
- Analysis of some recently proposed chaos-based encryption algorithms
This page was built for publication: Security problems with a chaos-based deniable authentication scheme