Security of public-key cryptosystems based on Chebyshev polynomials
From MaRDI portal
Publication:4590397
DOI10.1109/TCSI.2005.851701zbMath1374.94775OpenAlexW2105709923MaRDI QIDQ4590397
Paolo D'Arco, Ljupčo Kocarev, Pina Bergamo, Alfredo De Santis
Publication date: 20 November 2017
Published in: IEEE Transactions on Circuits and Systems I: Regular Papers (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tcsi.2005.851701
Related Items (44)
A new way to produce key streams based on chaotic sequences ⋮ Theoretical design and circuit implementation of novel digital chaotic systems via hybrid control ⋮ Secure group key agreement protocol based on chaotic hash ⋮ Provably secure extended chaotic map-based three-party key agreement protocols using password authentication ⋮ A Note on the Insecurity of Cryptosystems Based on Chebyshev Polynomials ⋮ An improved secure and efficient password and chaos-based two-party key agreement protocol ⋮ Cryptanalysis of Multiplicative Coupled Cryptosystems Based on the Chebyshev Polynomials ⋮ Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy ⋮ A chaotic maps-based authenticated key agreement protocol with strong anonymity ⋮ On the security of a novel key agreement protocol based on chaotic maps ⋮ An extended chaotic maps-based key agreement protocol with user anonymity ⋮ CRYPTANALYSIS OF CHAOS-BASED ELGAMAL PUBLIC-KEY ENCRYPTION ⋮ Cryptanalysis of the public key encryption based on multiple chaotic systems ⋮ Public-key encryption based on Chebyshev polynomials over \(\mathrm{GF}(q)\) ⋮ Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring \(Z_{N}\) ⋮ Efficiency and security problems of anonymous key agreement protocol based on chaotic maps ⋮ Security improvement on an anonymous key agreement protocol based on chaotic maps ⋮ A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps ⋮ Chaotic maps-based three-party password-authenticated key agreement scheme ⋮ Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards ⋮ Compressive sensing using chaotic sequence based on Chebyshev map ⋮ On \((\beta,\gamma)\)-Chebyshev functions and points of the interval ⋮ Three theorems on odd degree Chebyshev polynomials and more generalized permutation polynomials over a ring of module \(2^w\) ⋮ Enhancing the security of password authenticated key agreement protocols based on chaotic maps ⋮ Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps ⋮ Security of a key agreement protocol based on chaotic maps ⋮ Using time-stamp to improve the security of a chaotic maps-based key agreement protocol ⋮ Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing ⋮ Self-generated-certificate public key encryption without pairing and its application ⋮ Chaotic map based key agreement with/out clock synchronization ⋮ A novel combined cryptographic and hash algorithm based on chaotic control character ⋮ An anonymous key agreement protocol based on chaotic maps ⋮ An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map ⋮ An improved key agreement protocol based on chaos ⋮ ECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor Networks ⋮ Improved chaotic maps-based password-authenticated key agreement using smart cards ⋮ A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps ⋮ An extended chaotic-maps-based protocol with key agreement for multiserver environments ⋮ An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services ⋮ Secure Communication Systems Based on the Synchronization of Chaotic Systems ⋮ Counteracting the dynamical degradation of digital chaos via hybrid control ⋮ A back-iteration method for reconstructing chaotic sequences in finite-precision machines ⋮ An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem ⋮ A revised key agreement protocol based on chaotic maps
This page was built for publication: Security of public-key cryptosystems based on Chebyshev polynomials