Security of public-key cryptosystems based on Chebyshev polynomials
From MaRDI portal
Publication:4590397
DOI10.1109/TCSI.2005.851701zbMATH Open1374.94775OpenAlexW2105709923MaRDI QIDQ4590397FDOQ4590397
Paolo D'Arco, Ljupco Kocarev, Pina Bergamo, Alfredo De Santis
Publication date: 20 November 2017
Published in: IEEE Transactions on Circuits and Systems I: Regular Papers (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tcsi.2005.851701
Cited In (47)
- Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
- Security of polynomial transformations of the Diffie-Hellman key.
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
- On the security of a novel key agreement protocol based on chaotic maps
- An extended chaotic-maps-based protocol with key agreement for multiserver environments
- Secure group key agreement protocol based on chaotic hash
- Security of a key agreement protocol based on chaotic maps
- Secure Communication Systems Based on the Synchronization of Chaotic Systems
- Self-generated-certificate public key encryption without pairing and its application
- An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services
- Counteracting the dynamical degradation of digital chaos via hybrid control
- On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field $Z_N$
- Three theorems on odd degree Chebyshev polynomials and more generalized permutation polynomials over a ring of module \(2^w\)
- Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring \(Z_{N}\)
- ECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor Networks
- Chaotic map based key agreement with/out clock synchronization
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- CRYPTANALYSIS OF CHAOS-BASED ELGAMAL PUBLIC-KEY ENCRYPTION
- A revised key agreement protocol based on chaotic maps
- Improved chaotic maps-based password-authenticated key agreement using smart cards
- Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
- Title not available (Why is that?)
- A back-iteration method for reconstructing chaotic sequences in finite-precision machines
- An improved secure and efficient password and chaos-based two-party key agreement protocol
- Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- A new way to produce key streams based on chaotic sequences
- A novel combined cryptographic and hash algorithm based on chaotic control character
- An anonymous key agreement protocol based on chaotic maps
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- An improved key agreement protocol based on chaos
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Enhancing the security of password authenticated key agreement protocols based on chaotic maps
- Cryptanalysis of Multiplicative Coupled Cryptosystems Based on the Chebyshev Polynomials
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
- Compressive sensing using chaotic sequence based on Chebyshev map
- Theoretical design and circuit implementation of novel digital chaotic systems via hybrid control
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- On \((\beta,\gamma)\)-Chebyshev functions and points of the interval
- A Note on the Insecurity of Cryptosystems Based on Chebyshev Polynomials
- An extended chaotic maps-based key agreement protocol with user anonymity
- Public-key encryption based on Chebyshev polynomials over \(\mathrm{GF}(q)\)
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- Chaotic maps-based three-party password-authenticated key agreement scheme
This page was built for publication: Security of public-key cryptosystems based on Chebyshev polynomials
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4590397)