An improved secure and efficient password and chaos-based two-party key agreement protocol
From MaRDI portal
Publication:332780
DOI10.1007/s11071-015-2506-2zbMath1354.94039OpenAlexW2280931376WikidataQ114689435 ScholiaQ114689435MaRDI QIDQ332780
Publication date: 9 November 2016
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-015-2506-2
Cryptography (94A60) Applications of dynamical systems (37N99) Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
A new authentication scheme based on chaotic maps and factoring problems ⋮ Comments on ``An improved secure and efficient password and chaos-based two-party key agreement protocol
Cites Work
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- A new three-party-authenticated key agreement scheme based on chaotic maps without password table
- Enhancing the security of password authenticated key agreement protocols based on chaotic maps
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- A chaos-based hash function with both modification detection and localization capabilities
- A new compound mode of confusion and diffusion for block encryption of image based on chaos
- One-way hash function construction based on the chaotic map with changeable-parameter
- An improved chaotic cryptosystem based on circular bit shift and XOR operations
- Cryptography with chaos
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
- Secure group key agreement protocol based on chaotic hash
- New directions in cryptography
- Chaos and cryptography
- Security of public-key cryptosystems based on Chebyshev polynomials
This page was built for publication: An improved secure and efficient password and chaos-based two-party key agreement protocol