Enhancing the security of password authenticated key agreement protocols based on chaotic maps
From MaRDI portal
Publication:508778
DOI10.1016/J.INS.2014.08.041zbMATH Open1355.94080OpenAlexW1969286014WikidataQ114666913 ScholiaQ114666913MaRDI QIDQ508778FDOQ508778
Publication date: 8 February 2017
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.08.041
Recommendations
- Improved chaotic maps-based password-authenticated key agreement using smart cards
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
- Chaotic maps-based password-authenticated key agreement using smart cards
- Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
Cites Work
- Title not available (Why is that?)
- Efficient network authentication protocols: Lower bounds and optimal implementations
- Using encryption for authentication in large networks of computers
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- Chaotic maps-based password-authenticated key agreement using smart cards
- Title not available (Why is that?)
- Security of public-key cryptosystems based on Chebyshev polynomials
- An anonymous key agreement protocol based on chaotic maps
- An improved key agreement protocol based on chaos
- A novel mutual authentication scheme based on quadratic residues for RFID systems
- Secure group key agreement protocol based on chaotic hash
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- Security of a key agreement protocol based on chaotic maps
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
- Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
Cited In (9)
- Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
- Security of a key agreement protocol based on chaotic maps
- Title not available (Why is that?)
- A hybrid-strategy-improved butterfly optimization algorithm applied to the node coverage problem of wireless sensor networks
- Improved chaotic maps-based password-authenticated key agreement using smart cards
- Chaotic maps-based password-authenticated key agreement using smart cards
- A Pseudorandom Number Generator Based on a 4D Piecewise Logistic Map with Coupled Parameters
- An improved secure and efficient password and chaos-based two-party key agreement protocol
- Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
This page was built for publication: Enhancing the security of password authenticated key agreement protocols based on chaotic maps
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q508778)