Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
DOI10.1007/s11071-014-1704-7zbMath1345.94090OpenAlexW2012855881WikidataQ114689440 ScholiaQ114689440MaRDI QIDQ493916
Raphael C.-W. Phan, Wei-Chuen Yau
Publication date: 7 September 2015
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-014-1704-7
Communication networks in operations research (90B18) Network design and communication in computer systems (68M10) Cryptography (94A60) Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Dynamical systems involving maps of the interval (37E05) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
Uses Software
Cites Work
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- Chaotic maps-based password-authenticated key agreement using smart cards
- A new identity based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields \(Z_p\)
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- A block cipher with dynamic S-boxes based on tent map
- Analysis and improvement of a chaos-based hash function construction
- An anonymous key agreement protocol based on chaotic maps
- An improved chaotic cryptosystem with external key
- An improved key agreement protocol based on chaos
- Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
- Security of a key agreement protocol based on chaotic maps
- An extended chaotic maps-based key agreement protocol with user anonymity
- Breaking a chaotic image encryption algorithm based on perceptron model
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- A chaotic image encryption algorithm based on perceptron model
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- Three weaknesses in a simple three-party key exchange protocol
- Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS ’09
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- On Establishing and Fixing a Parallel Session Attack in a Security Protocol
- Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
- Examining smart-card security under the threat of power analysis attacks
- Security of public-key cryptosystems based on Chebyshev polynomials
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards