Security of public-key cryptosystems based on Chebyshev polynomials

From MaRDI portal
Publication:4590397

DOI10.1109/TCSI.2005.851701zbMath1374.94775OpenAlexW2105709923MaRDI QIDQ4590397

Paolo D'Arco, Ljupčo Kocarev, Pina Bergamo, Alfredo De Santis

Publication date: 20 November 2017

Published in: IEEE Transactions on Circuits and Systems I: Regular Papers (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1109/tcsi.2005.851701




Related Items (44)

A new way to produce key streams based on chaotic sequencesTheoretical design and circuit implementation of novel digital chaotic systems via hybrid controlSecure group key agreement protocol based on chaotic hashProvably secure extended chaotic map-based three-party key agreement protocols using password authenticationA Note on the Insecurity of Cryptosystems Based on Chebyshev PolynomialsAn improved secure and efficient password and chaos-based two-party key agreement protocolCryptanalysis of Multiplicative Coupled Cryptosystems Based on the Chebyshev PolynomialsRobust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacyA chaotic maps-based authenticated key agreement protocol with strong anonymityOn the security of a novel key agreement protocol based on chaotic mapsAn extended chaotic maps-based key agreement protocol with user anonymityCRYPTANALYSIS OF CHAOS-BASED ELGAMAL PUBLIC-KEY ENCRYPTIONCryptanalysis of the public key encryption based on multiple chaotic systemsPublic-key encryption based on Chebyshev polynomials over \(\mathrm{GF}(q)\)Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring \(Z_{N}\)Efficiency and security problems of anonymous key agreement protocol based on chaotic mapsSecurity improvement on an anonymous key agreement protocol based on chaotic mapsA three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic mapsChaotic maps-based three-party password-authenticated key agreement schemeCryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cardsCompressive sensing using chaotic sequence based on Chebyshev mapOn \((\beta,\gamma)\)-Chebyshev functions and points of the intervalThree theorems on odd degree Chebyshev polynomials and more generalized permutation polynomials over a ring of module \(2^w\)Enhancing the security of password authenticated key agreement protocols based on chaotic mapsDesign and analysis of a three party password-based authenticated key exchange protocol using extended chaotic mapsSecurity of a key agreement protocol based on chaotic mapsUsing time-stamp to improve the security of a chaotic maps-based key agreement protocolCryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testingSelf-generated-certificate public key encryption without pairing and its applicationChaotic map based key agreement with/out clock synchronizationA novel combined cryptographic and hash algorithm based on chaotic control characterAn anonymous key agreement protocol based on chaotic mapsAn efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic mapAn improved key agreement protocol based on chaosECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor NetworksImproved chaotic maps-based password-authenticated key agreement using smart cardsA novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic mapsAn extended chaotic-maps-based protocol with key agreement for multiserver environmentsAn extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage servicesSecure Communication Systems Based on the Synchronization of Chaotic SystemsCounteracting the dynamical degradation of digital chaos via hybrid controlA back-iteration method for reconstructing chaotic sequences in finite-precision machinesAn efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystemA revised key agreement protocol based on chaotic maps






This page was built for publication: Security of public-key cryptosystems based on Chebyshev polynomials