Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
From MaRDI portal
Publication:434814
DOI10.1016/J.CNSNS.2011.11.010zbMATH Open1242.68014OpenAlexW2045898252MaRDI QIDQ434814FDOQ434814
Authors: Eun-Jun Yoon
Publication date: 16 July 2012
Published in: Communications in Nonlinear Science and Numerical Simulation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.cnsns.2011.11.010
Recommendations
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- An anonymous key agreement protocol based on chaotic maps
- A revised key agreement protocol based on chaotic maps
- An extended chaotic maps-based key agreement protocol with user anonymity
Cites Work
- Cryptography with chaos
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- Security of public-key cryptosystems based on Chebyshev polynomials
- Analysis and improvement of a chaos-based hash function construction
- An anonymous key agreement protocol based on chaotic maps
- A chaos-based hash function with both modification detection and localization capabilities
- An improved key agreement protocol based on chaos
- Security of a key agreement protocol based on chaotic maps
- Chaotic map based key agreement with/out clock synchronization
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- Security of public key encryption technique based on multiple chaotic systems
Cited In (14)
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- Security of a key agreement protocol based on chaotic maps
- Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
- A revised key agreement protocol based on chaotic maps
- A new authentication scheme based on chaotic maps and factoring problems
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- An anonymous key agreement protocol based on chaotic maps
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- A new three-party-authenticated key agreement scheme based on chaotic maps without password table
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card
- An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- Chaotic maps-based three-party password-authenticated key agreement scheme
This page was built for publication: Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q434814)