An improved secure and efficient password and chaos-based two-party key agreement protocol
DOI10.1007/S11071-015-2506-2zbMATH Open1354.94039OpenAlexW2280931376WikidataQ114689435 ScholiaQ114689435MaRDI QIDQ332780FDOQ332780
Authors: Kaiping Xue, Yu Liu
Publication date: 9 November 2016
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-015-2506-2
Recommendations
- Comments on ``An improved secure and efficient password and chaos-based two-party key agreement protocol
- Enhancing the security of password authenticated key agreement protocols based on chaotic maps
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- A revised key agreement protocol based on chaotic maps
Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Applications of dynamical systems (37N99)
Cites Work
- New directions in cryptography
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- Cryptography with chaos
- A new compound mode of confusion and diffusion for block encryption of image based on chaos
- One-way hash function construction based on the chaotic map with changeable-parameter
- An improved chaotic cryptosystem based on circular bit shift and XOR operations
- Security of public-key cryptosystems based on Chebyshev polynomials
- A chaos-based hash function with both modification detection and localization capabilities
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
- Secure group key agreement protocol based on chaotic hash
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- Chaos and cryptography
- A new three-party-authenticated key agreement scheme based on chaotic maps without password table
- Enhancing the security of password authenticated key agreement protocols based on chaotic maps
Cited In (3)
This page was built for publication: An improved secure and efficient password and chaos-based two-party key agreement protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q332780)